B.TECH PROJECTS LIST 2010

Embed Size (px)

Citation preview

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    1/14

    B.TECH PROJECTS LIST 2010

    1

    Knowledge and Data Engineering

    Sl.No Project Title Year

    1. Anonymous Query Processing in Road Networks 20102. Closing the Loop in Webpage Understanding 20103. Closeness: A New Privacy Measure for Data Publishing 20104. Deriving Concept-Based User Profiles from Search Engine Logs 20105. False Negative Problem of Counting Bloom Filter 20106. Filtering Data Streams for Entity-Based Continuous Queries 20107. Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor

    Networks2010

    8. Incremental and General Evaluation of Reverse Nearest Neighbors 20109. Incremental Evaluation of Visible Nearest Neighbor Queries 201010. Logic-Based Pattern Discovery 201011. Learning with Positive and Unlabeled Examples Using Topic-SensitivePLSA

    2010

    12. LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Schemeover DHTs

    2010

    13. P2P Reputation Management Using Distributed Identities andDecentralized Recommendation Chains

    2010

    14. Projective Distribution of XQuery with Updates 201015. Ranked Query Processing in Uncertain Databases 201016. Record Matching over Query Results from Multiple Web Databases 201017. The Dynamic Bloom Filters 201018. The Tiled Bitmap Forensic Analysis Algorithm 201019. Towards an Effective XML Keyword Search 201020. ViDE: A Vision-Based Approach for Deep Web Data Extraction 201021. XCDSearch: An XML Context-Driven Search Engine 201022. Interactive Correction And Recommendation For Computer Language

    Learning And Training

    2009/.NET

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    2/14

    B.TECH PROJECTS LIST 2010

    2

    23. Learning Image-Text Associations 2009/.NET24. A Relation-Based Page Rank Algorithm For Semantic Web Search

    Engines2009/.NET

    25. English To Spanish Translation Of Signboard Images From MobilePhone Camera

    2009/.NET

    26. GLIP: A Concurrency Control Protocol For Clipping Indexing 2009/JAVA27. Histogram-Based Global Load Balancing In Structured Peer-To-Peer

    Systems2009/JAVA

    28. A Generic Local Algorithm For Mining Data Streams 2009/JAVA29. Predicting Missing Items In Shopping Carts 2009/JAVA30. Distributional Features For Text Categorization 2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    3/14

    B.TECH PROJECTS LIST 2010

    3

    Mobile Computing

    Sl.No Project Title Year

    1. A Scalable and Energy-Efficient Context Monitoring Framework forMobile Personal Sensor Networks

    2010

    2. A Multichannel Scheduler for High-Speed Wireless Backhaul Linkswith Packet Concatenation

    2010

    3. BSMR: Byzantine-Resilient Secure Multicast Routing in MultihopWireless Networks

    2010

    4. Distributed Localization Scheme for Mobile Sensor Networks 20105. Energy-Efficient Reprogramming of a Swarm of Mobile Sensors 20106. Energy-Efficient VoIP over Wireless LANs 2010/.NET7. Efficient Load-Aware Routing Scheme for Wireless Mesh Networks 20108. Exploiting and Defending Opportunistic Scheduling in Cellular Data

    Networks2010

    9. Fault-Tolerant Relay Node Placement in Heterogeneous WSN 201010. Joint Routing, Channel Assignment, and Scheduling for Throughput

    Maximization in General Interference Models2010

    11. Local Barrier Coverage in Wireless Sensor Networks 201012. MABS: Multicast Authentication Based on Batch Signature 2010/JAVA13. Maximizing the Lifetime of Wireless Sensor Networks with Mobile

    Sink in Delay-Tolerant Applications2010

    14. Radio Tomographic Imaging with Wireless Networks 201015. Secure Data Collection in Wireless Sensor Networks Using

    Randomized Dispersive Routes

    2010

    16. VEBEK: Virtual Energy-Based Encryption and Keying for WirelessSensor Networks

    2010

    17. Message Authentication In Computationally Constrained Environment 2009/.NET18. Biased Random Walks in Uniform Wireless Networks 2009/.NET19. Energy Maps for Mobile Wireless Networks: Coherence Time versus

    Spreading Period2009/.NET

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    4/14

    B.TECH PROJECTS LIST 2010

    4

    20. Greedy Routing with Anti-Void Traversal for WSN 2009/.NET21. On the Security of Route Discovery in MANETs 2009/.NET22. Route Stability in MANETs under the Random Direction Mobility

    Model

    2009/.NET

    23. Multicasting With Localized Control In Wireless Ad Hoc Networks 2009/.NET24. A Flexible Privacy-Enhanced Location-Based Services SystemFramework and Practice

    2009/.NET

    25. Localized Sensor Area Coverage with Low Communication Overhead 2009/.NET26. Efficient Resource Allocation For Wireless Multicast 2009/.NET27. A Gen2 Based RFID Authentication Protocol for Security and Privacy 2009/.NET28. Intrusion Detection In Homogeneous and Heterogeneous WSN 2009/JAVA29. PDCS: Security And Privacy Support For Data-Centric Sensor

    Networks

    2009/JAVA

    30. Efficient Broadcasting In Mobile Ad Hoc Networks 2009/JAVA31. SOAR: Simple Opportunistic Adaptive Routing Protocol for WirelessMesh Networks

    2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    5/14

    B.TECH PROJECTS LIST 2010

    5

    Networking

    Sl.No Project Title Year

    1. Always Acyclic Distributed Path Computation 20102. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual

    Authentication and Key Exchange in Mobile Communications2010

    3. The Design Trade-Offs Of Bit-torrent-Like File Sharing Protocols 2009/.NET4. Multiple Routing Configurations For Fast IP Network Recovery 2009/.NET5. Resource Allocation in OFDMA Wireless Communications Systems

    Supporting Multimedia Services

    2009/.NET

    6. Two Blocking Algorithms on Adaptive Binary Splitting: Single and PairResolutions for RFID Tag Identification

    2009/.NET

    7. Analysis of Shortest Path Routing for Large Multi-Hop WirelessNetworks

    2009/.NET

    8. Aggregation With Fragment Retransmission For Very High-SpeedWLANS

    2009/.NET

    9. A Traffic Engineering Approach For Placement And Selection OfNetwork Services

    2009/.NET

    10. A Distributed and Scalable Routing Table Manager 2009/.NET11. Efficient Routing in Intermittently Connected Mobile Networks The

    Multiple copy Case

    2009/.NET

    12. Monitoring the Application-Layer DDoS Attacks for Popular Websites 2009/JAVA13. Capturing Router Congestion and Delay 2009/JAVA14. Multiple Routing Configuration For Fast IP Network

    Recovery(Networking)

    2009/JAVA

    15. Minimizing file downloading time in stochastic peer to peernetworks(Networking)

    2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    6/14

    B.TECH PROJECTS LIST 2010

    6

    Dependable and Secure Computing

    Sl.No Project Title Year

    1. A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory

    2010/.NET

    2. A Rigorous, Compositional, and Extensible Framework for DynamicFault Tree Analysis

    2010

    3. A Survey on the Encryption of Convergecast Traffic with In-NetworkProcessing

    2010/.NET

    4. An Advanced Hybrid Peer-to-Peer Botnet 20105. Conformance Testing of Temporal Role-Based Access Control Systems 20106. Dual-Quorum: A Highly Available and Consistent Replication System

    for Edge Services2010

    7. In-Depth Packet Inspection Using a Hierarchical Pattern MatchingAlgorithm

    2010

    8. KTR: An Efficient Key Management Scheme for Secure Data AccessControl in Wireless Broadcast Services 20109. Layered Approach Using Conditional Random Fields for Intrusion

    Detection2010

    10. On the Survivability of Wireless Ad Hoc Networks with NodeMisbehaviors and Failures

    2010

    11. On the Thermal Attack in Instruction Caches 201012. Opportunities in White-Box Cryptography 201013. Secure Data Objects Replication in Data Grid 201014.

    Shifting Inference Control to User Side: Architecture and Protocol 2010

    15. SigFree: A Signature-Free Buffer Overflow Attack Blocker 201016. Using Web-Referral Architectures to Mitigate Denial-of-Service Threat 201017. The Effectiveness of Checksums for Embedded Control Networks 2009/.NET18. Credit card fraud detection using hidden Markov model 2009/.NET19. Evaluating the Vulnerability of Network Traffic Using Joint Security

    and Routing Analysis2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    7/14

    B.TECH PROJECTS LIST 2010

    7

    20. Flexible Rollback Recovery in Dynamic Heterogeneous GridComputing

    2009/JAVA

    21. Analysis of the SASI Protocol 2009/JAVA22. Cryptanalysis Of A Generalized Ring Signature Scheme 2009/JAVA23. Security In Open Source Web Content Management Systems 2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    8/14

    B.TECH PROJECTS LIST 2010

    8

    Software Engineering

    Sl.No Project Title Year

    1. A Framework for Programming Robust Context-Aware Applications 20102. An Experience in Testing the Security of Real-World Electronic Voting

    Systems2010

    3. An Attack Surface Metric 20104. Better Debugging via Output Tracing and Callstack-Sensitive Slicing 20105. DECOR: A Method for the Specification and Detection of Code and

    Design Smells

    2010/.NET

    6. Discovering Services during Service-Based System Design Using UML 2010/JAVA7. Exception Handling Patterns for Process Modeling 2010/JAVA8. Exception Handling for Repair in Service-Based Processes 20109. Learning Communicating Automata from MSCs 201010. Program Behavior Discovery and Verification: A Graph Grammar

    Approach

    2010

    11. On Event-Based Middleware for Location-Aware Mobile Applications 201012. The Effects of Time Constraints on Test Case Prioritization: A Series of

    Controlled Experiments

    2010

    13. Vulnerability Discovery with Attack Injection 201014. What Makes a Good Bug Report? 201015. A Modified Model for Private Data Security Facing E-commerce 2009/.NET16. Optimized Resource Allocation For Software Release Planning 2009/.NET17. NDT A Model-Driven Approach 2009/JAVA18. CHARMY: A Framework for Designing and Verifying Architectural

    Specifications2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    9/14

    B.TECH PROJECTS LIST 2010

    9

    Parallel and Distributed Systems

    Sl.No Project Title Year

    1. Anchor-Free Localization through Flip-Error-Resistant Map Stitching inWireless Sensor Network

    2010

    2. A Dynamic Performance-Based Flow Control Method for High-SpeedData Transfer

    2010

    3. A Queuing Model for Evaluating the Transfer Latency of Peer-to-PeerSystems

    2010

    4. An ISP-Friendly File Distribution Protocol: Analysis, Design, andImplementation

    2010

    5. An Analytical Approach to Optimizing Parallel ImageRegistration/Retrieval

    2010

    6. Cooperative Secondary Authorization Recycling 20107. Detecting Application Denial-of-Service Attacks: A Group-Testing-

    Based Approach

    2010

    8. Flexible Cache Consistency Maintenance over Wireless Ad HocNetworks

    2010

    9. Impact of Feature Reduction on the Efficiency of Wireless IntrusionDetection Systems

    2010

    10. Improving Reliability for Application-Layer Multicast Overlays 201011. Optimal Resource Placement in Structured Peer-to-Peer Networks 201012. Predictable High Performance Computing using Feedback Control and

    Admission Control2010

    13. Robust Load Delegation in Service Grid Environments 201014. Secure Synchronization of Periodic Updates in Ad Hoc Networks 201015. SocioNet: A Social-Based Multimedia Access System for Unstructured

    P2P Networks2010

    16. Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther?

    2010

    17. pFusion: A P2P Architecture for Internet-Scale Content-Based Searchand Retrieval

    2009/.NET

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    10/14

    B.TECH PROJECTS LIST 2010

    10

    18. Dynamic routing with security considerations 2009/JAVA19. FDPM: An IP Trace back system to find the real source of attacks 2009/JAVA20. Distributed algorithms for constructing approximate minimum spanning

    trees in WSN

    2009/JAVA

    21. Building Small-World Peer-to-Peer Networks Based on HierarchicalStructures

    2009/JAVA

    22. Detecting Malicious Packet Losses 2009/JAVA23. Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks 2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    11/14

    B.TECH PROJECTS LIST 2010

    11

    Pattern Analysis and Machine Intelligence

    Sl.No Project Title Year

    1. Local-Learning-Based Feature Selection for High-Dimensional DataAnalysis

    2010

    2. Object Detection with Discriminatively Trained Part-Based Models 20103. Online Empirical Evaluation of Tracking Algorithms 20104. Range Flow in Varying Illumination: Algorithms and Comparisons 20105. Resolution Enhancement in Multi-Image Stereo 20106. Stereo Matching with Mumford-Shah Regularization and Occlusion

    Handling2010

    7. Survey of Pedestrian Detection for Advanced Driver AssistanceSystems

    2010

    8. Adaptive Multi versioning for Open MP parallelization via machineLearning

    2009/.NET

    9. Medical Data Mining Using BGA & RGA For Weighting Of FeaturesIn Fuzzy K-NN Classification 2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    12/14

    B.TECH PROJECTS LIST 2010

    12

    Computers

    Sl.No Project Title Year

    1. A Novel Cryptoprocessor Architecture for the McEliece Public-KeyCryptosystem

    2010

    2. A Study of k-Coverage and Measures of Connectivity in 3D WSN 20103. Adaptation of Reputation Management Systems to Dynamic Network

    Conditions in Ad Hoc Networks2010

    4. Algorithmic Aspects of Hardware/Software Partitioning: 1D SearchAlgorithms

    2010

    5. An Interleaving Structure for Guaranteed QoS in Real-TimeBroadcasting Systems

    2010

    6. An Optimal Encoding to Represent a Single Set in an ROBDD 20107. Authenticated Group Key Transfer Protocol Based on Secret Sharing 20108. An Application-Level Data Transparent Authentication Scheme without

    Communication Overhead

    2010

    9. Concurrent Structure-Independent Fault Detection Schemes for theAdvanced Encryption Standard

    2010

    10. Coverage and Detection of a Randomized Scheduling Algorithm inWireless Sensor Networks

    2010

    11. Design and Analysis of On-Chip Networks for Large-Scale CacheSystems

    2010

    12. Efficient Microarchitectural Vulnerabilities Prediction Using BoostedRegression Trees and Patient Rule Inductions

    2010

    13. Minimizing the Maximum Firewall Rule Set in a Network withMultiple Firewalls

    2010

    14. PERFECTORY: A Fault-Tolerant Directory Memory Architecture 201015. Predictive Temperature-Aware DVFS 201016. Secure and Efficient Broadcast Authentication in WSN 201017. Trade-Offs between Latency, Complexity, and Load Balancing with

    Multicast Algorithms2010

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    13/14

    B.TECH PROJECTS LIST 2010

    13

    Learning Technologies

    Sl.No Project Title Year

    1. Deploying a Wearable Computing Platform for Computing Education 20102. Mobile Learning in School Contexts: Can Teachers Alone Make It

    Happen?2010

    3. To Flow and Not to Freeze: Applying Flow Experience to MobileLearning

    2010

    4. An Enhanced Ant Colony Optimization Applied to Capacitated VehicleRouting Problem

    2009/.NET

    5. Information System Of Relay Protection For Fault Record Analysis 2009/JAVA

  • 8/7/2019 B.TECH PROJECTS LIST 2010

    14/14

    B.TECH PROJECTS LIST 2010

    14

    Sl.No Project Title Domain Year

    1.Network Coding-Based Protectionof Many-to-One Wireless Flows

    WirelessCommunications

    2009/.NET

    2.Increasing Packet Delivery in AdHoc On-Demand Distance Vector

    Routing Protocol

    WirelessCommunications

    2009/JAVA

    3.Coding Documents usingAlternative Techniques

    Cryptography

    2009/.NET

    4.Investigating Accuracies of RuleEvaluation Models on RandomizedLabeling

    Granular Computing 2009/.NET

    5.Protection of Database Security viaCollaborative Inference Detection

    Knowledge Discoveryand Data Mining

    2009/JAVA

    6.Applying Data Mining inPrediction and Classification of

    Urban Traffic

    Computer Science &

    Information Engg.

    2009/JAVA

    7.A text clustering framework forinformation retrieval

    Information Assuranceand Security

    2009/JAVA

    8.Enhancing Privacy andAuthorization Control Scalability

    in the Grid Through Ontology

    Information Technologyin Biomedicine

    2009/JAVA

    9.End-to-End Service Support forMashups

    Services Computing 2010

    10.Affect Detection: InterdisciplinaryReview of Models, Methods, and

    Their Applications

    Affective Computing

    2010

    11.Predictive Network AnomalyDetection and Visualization

    Information Forensicsand Security

    2010

    12.Providing Witness AnonymityUnder Peer-to-Peer Settings

    Information Forensicsand Security

    2010