8/7/2019 B.TECH PROJECTS LIST 2010
1/14
B.TECH PROJECTS LIST 2010
1
Knowledge and Data Engineering
Sl.No Project Title Year
1. Anonymous Query Processing in Road Networks 20102. Closing the Loop in Webpage Understanding 20103. Closeness: A New Privacy Measure for Data Publishing 20104. Deriving Concept-Based User Profiles from Search Engine Logs 20105. False Negative Problem of Counting Bloom Filter 20106. Filtering Data Streams for Entity-Based Continuous Queries 20107. Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor
Networks2010
8. Incremental and General Evaluation of Reverse Nearest Neighbors 20109. Incremental Evaluation of Visible Nearest Neighbor Queries 201010. Logic-Based Pattern Discovery 201011. Learning with Positive and Unlabeled Examples Using Topic-SensitivePLSA
2010
12. LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Schemeover DHTs
2010
13. P2P Reputation Management Using Distributed Identities andDecentralized Recommendation Chains
2010
14. Projective Distribution of XQuery with Updates 201015. Ranked Query Processing in Uncertain Databases 201016. Record Matching over Query Results from Multiple Web Databases 201017. The Dynamic Bloom Filters 201018. The Tiled Bitmap Forensic Analysis Algorithm 201019. Towards an Effective XML Keyword Search 201020. ViDE: A Vision-Based Approach for Deep Web Data Extraction 201021. XCDSearch: An XML Context-Driven Search Engine 201022. Interactive Correction And Recommendation For Computer Language
Learning And Training
2009/.NET
8/7/2019 B.TECH PROJECTS LIST 2010
2/14
B.TECH PROJECTS LIST 2010
2
23. Learning Image-Text Associations 2009/.NET24. A Relation-Based Page Rank Algorithm For Semantic Web Search
Engines2009/.NET
25. English To Spanish Translation Of Signboard Images From MobilePhone Camera
2009/.NET
26. GLIP: A Concurrency Control Protocol For Clipping Indexing 2009/JAVA27. Histogram-Based Global Load Balancing In Structured Peer-To-Peer
Systems2009/JAVA
28. A Generic Local Algorithm For Mining Data Streams 2009/JAVA29. Predicting Missing Items In Shopping Carts 2009/JAVA30. Distributional Features For Text Categorization 2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
3/14
B.TECH PROJECTS LIST 2010
3
Mobile Computing
Sl.No Project Title Year
1. A Scalable and Energy-Efficient Context Monitoring Framework forMobile Personal Sensor Networks
2010
2. A Multichannel Scheduler for High-Speed Wireless Backhaul Linkswith Packet Concatenation
2010
3. BSMR: Byzantine-Resilient Secure Multicast Routing in MultihopWireless Networks
2010
4. Distributed Localization Scheme for Mobile Sensor Networks 20105. Energy-Efficient Reprogramming of a Swarm of Mobile Sensors 20106. Energy-Efficient VoIP over Wireless LANs 2010/.NET7. Efficient Load-Aware Routing Scheme for Wireless Mesh Networks 20108. Exploiting and Defending Opportunistic Scheduling in Cellular Data
Networks2010
9. Fault-Tolerant Relay Node Placement in Heterogeneous WSN 201010. Joint Routing, Channel Assignment, and Scheduling for Throughput
Maximization in General Interference Models2010
11. Local Barrier Coverage in Wireless Sensor Networks 201012. MABS: Multicast Authentication Based on Batch Signature 2010/JAVA13. Maximizing the Lifetime of Wireless Sensor Networks with Mobile
Sink in Delay-Tolerant Applications2010
14. Radio Tomographic Imaging with Wireless Networks 201015. Secure Data Collection in Wireless Sensor Networks Using
Randomized Dispersive Routes
2010
16. VEBEK: Virtual Energy-Based Encryption and Keying for WirelessSensor Networks
2010
17. Message Authentication In Computationally Constrained Environment 2009/.NET18. Biased Random Walks in Uniform Wireless Networks 2009/.NET19. Energy Maps for Mobile Wireless Networks: Coherence Time versus
Spreading Period2009/.NET
8/7/2019 B.TECH PROJECTS LIST 2010
4/14
B.TECH PROJECTS LIST 2010
4
20. Greedy Routing with Anti-Void Traversal for WSN 2009/.NET21. On the Security of Route Discovery in MANETs 2009/.NET22. Route Stability in MANETs under the Random Direction Mobility
Model
2009/.NET
23. Multicasting With Localized Control In Wireless Ad Hoc Networks 2009/.NET24. A Flexible Privacy-Enhanced Location-Based Services SystemFramework and Practice
2009/.NET
25. Localized Sensor Area Coverage with Low Communication Overhead 2009/.NET26. Efficient Resource Allocation For Wireless Multicast 2009/.NET27. A Gen2 Based RFID Authentication Protocol for Security and Privacy 2009/.NET28. Intrusion Detection In Homogeneous and Heterogeneous WSN 2009/JAVA29. PDCS: Security And Privacy Support For Data-Centric Sensor
Networks
2009/JAVA
30. Efficient Broadcasting In Mobile Ad Hoc Networks 2009/JAVA31. SOAR: Simple Opportunistic Adaptive Routing Protocol for WirelessMesh Networks
2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
5/14
B.TECH PROJECTS LIST 2010
5
Networking
Sl.No Project Title Year
1. Always Acyclic Distributed Path Computation 20102. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual
Authentication and Key Exchange in Mobile Communications2010
3. The Design Trade-Offs Of Bit-torrent-Like File Sharing Protocols 2009/.NET4. Multiple Routing Configurations For Fast IP Network Recovery 2009/.NET5. Resource Allocation in OFDMA Wireless Communications Systems
Supporting Multimedia Services
2009/.NET
6. Two Blocking Algorithms on Adaptive Binary Splitting: Single and PairResolutions for RFID Tag Identification
2009/.NET
7. Analysis of Shortest Path Routing for Large Multi-Hop WirelessNetworks
2009/.NET
8. Aggregation With Fragment Retransmission For Very High-SpeedWLANS
2009/.NET
9. A Traffic Engineering Approach For Placement And Selection OfNetwork Services
2009/.NET
10. A Distributed and Scalable Routing Table Manager 2009/.NET11. Efficient Routing in Intermittently Connected Mobile Networks The
Multiple copy Case
2009/.NET
12. Monitoring the Application-Layer DDoS Attacks for Popular Websites 2009/JAVA13. Capturing Router Congestion and Delay 2009/JAVA14. Multiple Routing Configuration For Fast IP Network
Recovery(Networking)
2009/JAVA
15. Minimizing file downloading time in stochastic peer to peernetworks(Networking)
2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
6/14
B.TECH PROJECTS LIST 2010
6
Dependable and Secure Computing
Sl.No Project Title Year
1. A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory
2010/.NET
2. A Rigorous, Compositional, and Extensible Framework for DynamicFault Tree Analysis
2010
3. A Survey on the Encryption of Convergecast Traffic with In-NetworkProcessing
2010/.NET
4. An Advanced Hybrid Peer-to-Peer Botnet 20105. Conformance Testing of Temporal Role-Based Access Control Systems 20106. Dual-Quorum: A Highly Available and Consistent Replication System
for Edge Services2010
7. In-Depth Packet Inspection Using a Hierarchical Pattern MatchingAlgorithm
2010
8. KTR: An Efficient Key Management Scheme for Secure Data AccessControl in Wireless Broadcast Services 20109. Layered Approach Using Conditional Random Fields for Intrusion
Detection2010
10. On the Survivability of Wireless Ad Hoc Networks with NodeMisbehaviors and Failures
2010
11. On the Thermal Attack in Instruction Caches 201012. Opportunities in White-Box Cryptography 201013. Secure Data Objects Replication in Data Grid 201014.
Shifting Inference Control to User Side: Architecture and Protocol 2010
15. SigFree: A Signature-Free Buffer Overflow Attack Blocker 201016. Using Web-Referral Architectures to Mitigate Denial-of-Service Threat 201017. The Effectiveness of Checksums for Embedded Control Networks 2009/.NET18. Credit card fraud detection using hidden Markov model 2009/.NET19. Evaluating the Vulnerability of Network Traffic Using Joint Security
and Routing Analysis2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
7/14
B.TECH PROJECTS LIST 2010
7
20. Flexible Rollback Recovery in Dynamic Heterogeneous GridComputing
2009/JAVA
21. Analysis of the SASI Protocol 2009/JAVA22. Cryptanalysis Of A Generalized Ring Signature Scheme 2009/JAVA23. Security In Open Source Web Content Management Systems 2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
8/14
B.TECH PROJECTS LIST 2010
8
Software Engineering
Sl.No Project Title Year
1. A Framework for Programming Robust Context-Aware Applications 20102. An Experience in Testing the Security of Real-World Electronic Voting
Systems2010
3. An Attack Surface Metric 20104. Better Debugging via Output Tracing and Callstack-Sensitive Slicing 20105. DECOR: A Method for the Specification and Detection of Code and
Design Smells
2010/.NET
6. Discovering Services during Service-Based System Design Using UML 2010/JAVA7. Exception Handling Patterns for Process Modeling 2010/JAVA8. Exception Handling for Repair in Service-Based Processes 20109. Learning Communicating Automata from MSCs 201010. Program Behavior Discovery and Verification: A Graph Grammar
Approach
2010
11. On Event-Based Middleware for Location-Aware Mobile Applications 201012. The Effects of Time Constraints on Test Case Prioritization: A Series of
Controlled Experiments
2010
13. Vulnerability Discovery with Attack Injection 201014. What Makes a Good Bug Report? 201015. A Modified Model for Private Data Security Facing E-commerce 2009/.NET16. Optimized Resource Allocation For Software Release Planning 2009/.NET17. NDT A Model-Driven Approach 2009/JAVA18. CHARMY: A Framework for Designing and Verifying Architectural
Specifications2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
9/14
B.TECH PROJECTS LIST 2010
9
Parallel and Distributed Systems
Sl.No Project Title Year
1. Anchor-Free Localization through Flip-Error-Resistant Map Stitching inWireless Sensor Network
2010
2. A Dynamic Performance-Based Flow Control Method for High-SpeedData Transfer
2010
3. A Queuing Model for Evaluating the Transfer Latency of Peer-to-PeerSystems
2010
4. An ISP-Friendly File Distribution Protocol: Analysis, Design, andImplementation
2010
5. An Analytical Approach to Optimizing Parallel ImageRegistration/Retrieval
2010
6. Cooperative Secondary Authorization Recycling 20107. Detecting Application Denial-of-Service Attacks: A Group-Testing-
Based Approach
2010
8. Flexible Cache Consistency Maintenance over Wireless Ad HocNetworks
2010
9. Impact of Feature Reduction on the Efficiency of Wireless IntrusionDetection Systems
2010
10. Improving Reliability for Application-Layer Multicast Overlays 201011. Optimal Resource Placement in Structured Peer-to-Peer Networks 201012. Predictable High Performance Computing using Feedback Control and
Admission Control2010
13. Robust Load Delegation in Service Grid Environments 201014. Secure Synchronization of Periodic Updates in Ad Hoc Networks 201015. SocioNet: A Social-Based Multimedia Access System for Unstructured
P2P Networks2010
16. Toward Systematical Data Scheduling for Layered Streaming in Peer-to-Peer Networks: Can We Go Farther?
2010
17. pFusion: A P2P Architecture for Internet-Scale Content-Based Searchand Retrieval
2009/.NET
8/7/2019 B.TECH PROJECTS LIST 2010
10/14
B.TECH PROJECTS LIST 2010
10
18. Dynamic routing with security considerations 2009/JAVA19. FDPM: An IP Trace back system to find the real source of attacks 2009/JAVA20. Distributed algorithms for constructing approximate minimum spanning
trees in WSN
2009/JAVA
21. Building Small-World Peer-to-Peer Networks Based on HierarchicalStructures
2009/JAVA
22. Detecting Malicious Packet Losses 2009/JAVA23. Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks 2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
11/14
B.TECH PROJECTS LIST 2010
11
Pattern Analysis and Machine Intelligence
Sl.No Project Title Year
1. Local-Learning-Based Feature Selection for High-Dimensional DataAnalysis
2010
2. Object Detection with Discriminatively Trained Part-Based Models 20103. Online Empirical Evaluation of Tracking Algorithms 20104. Range Flow in Varying Illumination: Algorithms and Comparisons 20105. Resolution Enhancement in Multi-Image Stereo 20106. Stereo Matching with Mumford-Shah Regularization and Occlusion
Handling2010
7. Survey of Pedestrian Detection for Advanced Driver AssistanceSystems
2010
8. Adaptive Multi versioning for Open MP parallelization via machineLearning
2009/.NET
9. Medical Data Mining Using BGA & RGA For Weighting Of FeaturesIn Fuzzy K-NN Classification 2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
12/14
B.TECH PROJECTS LIST 2010
12
Computers
Sl.No Project Title Year
1. A Novel Cryptoprocessor Architecture for the McEliece Public-KeyCryptosystem
2010
2. A Study of k-Coverage and Measures of Connectivity in 3D WSN 20103. Adaptation of Reputation Management Systems to Dynamic Network
Conditions in Ad Hoc Networks2010
4. Algorithmic Aspects of Hardware/Software Partitioning: 1D SearchAlgorithms
2010
5. An Interleaving Structure for Guaranteed QoS in Real-TimeBroadcasting Systems
2010
6. An Optimal Encoding to Represent a Single Set in an ROBDD 20107. Authenticated Group Key Transfer Protocol Based on Secret Sharing 20108. An Application-Level Data Transparent Authentication Scheme without
Communication Overhead
2010
9. Concurrent Structure-Independent Fault Detection Schemes for theAdvanced Encryption Standard
2010
10. Coverage and Detection of a Randomized Scheduling Algorithm inWireless Sensor Networks
2010
11. Design and Analysis of On-Chip Networks for Large-Scale CacheSystems
2010
12. Efficient Microarchitectural Vulnerabilities Prediction Using BoostedRegression Trees and Patient Rule Inductions
2010
13. Minimizing the Maximum Firewall Rule Set in a Network withMultiple Firewalls
2010
14. PERFECTORY: A Fault-Tolerant Directory Memory Architecture 201015. Predictive Temperature-Aware DVFS 201016. Secure and Efficient Broadcast Authentication in WSN 201017. Trade-Offs between Latency, Complexity, and Load Balancing with
Multicast Algorithms2010
8/7/2019 B.TECH PROJECTS LIST 2010
13/14
B.TECH PROJECTS LIST 2010
13
Learning Technologies
Sl.No Project Title Year
1. Deploying a Wearable Computing Platform for Computing Education 20102. Mobile Learning in School Contexts: Can Teachers Alone Make It
Happen?2010
3. To Flow and Not to Freeze: Applying Flow Experience to MobileLearning
2010
4. An Enhanced Ant Colony Optimization Applied to Capacitated VehicleRouting Problem
2009/.NET
5. Information System Of Relay Protection For Fault Record Analysis 2009/JAVA
8/7/2019 B.TECH PROJECTS LIST 2010
14/14
B.TECH PROJECTS LIST 2010
14
Sl.No Project Title Domain Year
1.Network Coding-Based Protectionof Many-to-One Wireless Flows
WirelessCommunications
2009/.NET
2.Increasing Packet Delivery in AdHoc On-Demand Distance Vector
Routing Protocol
WirelessCommunications
2009/JAVA
3.Coding Documents usingAlternative Techniques
Cryptography
2009/.NET
4.Investigating Accuracies of RuleEvaluation Models on RandomizedLabeling
Granular Computing 2009/.NET
5.Protection of Database Security viaCollaborative Inference Detection
Knowledge Discoveryand Data Mining
2009/JAVA
6.Applying Data Mining inPrediction and Classification of
Urban Traffic
Computer Science &
Information Engg.
2009/JAVA
7.A text clustering framework forinformation retrieval
Information Assuranceand Security
2009/JAVA
8.Enhancing Privacy andAuthorization Control Scalability
in the Grid Through Ontology
Information Technologyin Biomedicine
2009/JAVA
9.End-to-End Service Support forMashups
Services Computing 2010
10.Affect Detection: InterdisciplinaryReview of Models, Methods, and
Their Applications
Affective Computing
2010
11.Predictive Network AnomalyDetection and Visualization
Information Forensicsand Security
2010
12.Providing Witness AnonymityUnder Peer-to-Peer Settings
Information Forensicsand Security
2010