IEEE 2012 Projects Titles
Data Mining
1.
Scalable Learning of Collective Behavior –
Dot Net
2.
Horizontal Aggregations in SQL to Prepare Data
Sets for Data Mining Analysis –
Dot Net
3.
Outsourced
Similarity Search on Metric Data Assets –
Java/J2EE
4.
Publishing
Search Logs—A Comparative Study of Privacy Guarantees – Java/J2EE
Networking
5.
Independent Directed Acyclic Graphs for
Resilient Multipath Routing–
Java
6.
MeasuRouting: A Framework for Routing Assisted
Traffic Monitoring–Java
7.
Opportunistic Flow-level Latency Estimation
using NetFlow
8.
Router Support for Fine-Grained Latency Measurements– Java
9.
Design, Implementation, and Performance of A
Load Balancer for SIP Server Clusters –
Java
10.
Privacy- and Integrity-Preserving Range Queries
in Sensor Networks
11. An Adaptive Opportunistic Routing
Scheme for Wireless Ad-hoc Networks – Java
Dependable Secure Computing
12.
ZoneTrust: Fast Zone-Based Node Compromise
Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis
Testing –
Java
13.
Design and Implementation of TARF: A Trust-Aware
Routing Framework for WSNs – Java
14. pCloud: A Distributed System for
Practical PIR –
Java/J2EE
15. Packet-Hiding Methods for Preventing
Selective Jamming Attacks –
Java
16. Detecting and Resolving Firewall
Policy Anomalies – Java
17. Risk-Aware Mitigation for MANET
Routing Attacks – Java
Image Processing
18.
Multiple exposure fusion for high dynamic range
image acquisition –
Dot Net
Multimedia
19.
Learn to Personalized Image Search from the
Photo Sharing Websites –
Java/J2EE
Mobile Computing
20.
Energy-Efficient Cooperative Video Distribution
with Statistical QoS Provisions over Wireless Networks -Java
21.
Protecting Location
Privacy in Sensor Networks Against a Global Eavesdropper
Parallel Distributed Systems
22.
Revisiting Dynamic
Query Protocols in Unstructured Peer-to-Peer Networks – Java
23.
Catching Packet
Droppers and Modifiers in Wireless Sensor Networks
24.
Exploiting
Jamming-Caused Neighbor Changes for Jammer Localization – Java
25.
Bounding the Impact of
Unbounded Attacks in Stabilization –
Dot Net
26.
Cut Detection in
Wireless Sensor Networks
27.
Detection and
Localization of Multiple Spoofing Attackers in Wireless Networks – Java
28.
Capacity of Data Collection in Arbitrary
Wireless Sensor Networks –
Java
29. BECAN: A Bandwidth-Efficient
Cooperative Authentication Scheme for Filtering Injected False Data in Wireless
Sensor Networks – Java
30. Cooperative Provable Data Possession
for Integrity Verification in Multi-Cloud Storage – Java/J2EE
31. Balancing the Tradeoffs between Query
Delay and Data Availability in MANETs –
Java
SERVICES COMPUTING
32. Bootstrapping Ontologies for Web
Services –
Java/J2EE
33. Towards Secure and Dependable Storage
Services in Cloud Computing – Java/J2EE
Data Mining/ Knowledge
and Data Engineering
S.No
|
Title & Abstract
|
Technology
|
1
|
Scalable Learning
of Collective Behavior
This study of collective behavior is to understand how
individuals behave in a social networking environment. Aim to learn to
predict collective behavior in social media. In particular, given information
about some individuals, how can we infer the behavior of unobserved
individuals in the same network? A social-dimension-based approach has been
shown effective in addressing the heterogeneity of connections presented in
social media.
|
Dot Net
|
2
|
Horizontal
Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
Preparing a data set for analysis is generally the most
time consuming task in a data mining project, requiring many complex SQL
queries, joining tables and aggregating columns. We propose simple, yet
powerful, methods to generate SQL code to return aggregated columns in a
horizontal tabular layout, returning a set of numbers instead of one number
per row. This new class of functions is called horizontal aggregations.
Horizontal aggregations build data sets with a horizontal denormalized layout
(e.g. point-dimension, observation-variable, instance-feature).
|
Dot Net
|
3
|
Outsourced Similarity Search on
Metric Data Assets
To set cloud computing setting in which similarity querying
of metric data is outsourced to a service provider. The data is to be
revealed only to trusted users. The goal of this research is to develop a
transformation method for converting an original object p in a metric space
into another metric space object. The data owner specifies a key value CK in
order to define the instance to be used, then computes for each object p and
uploads it to the server (i.e., service provider). At query time, the query
user specifies his query object q and then submits the transformed query
object to the server for similarity search.
|
Java/J2EE
|
4
|
Publishing Search Logs—A
Comparative Study of Privacy Guarantees
To publish search logs with privacy. The aim is not to disclose
sensitive information of the users searching the search engines. To implement
ZEALOUS algorithm to publish search logs with privacy.
|
Java/J2EE
|
Networking
S.No
|
Title & Abstract
|
Technology
|
5
|
Independent Directed Acyclic Graphs for Resilient Multipath Routing
To achieve resilient multipath routing, the concept of
Independent Directed Acyclic Graphs (IDAGs) is introduced. Link-independent
(Node-independent) DAGs satisfy the property that any path from a source to
the root on one DAG is link-disjoint (node-disjoint) with any path from the
source to the root on the other DAG. DAGs supports: (1) multipath routing;
(2) use all possible edges; (3) recovery from single link failure; and (4)
one bit per packet as overhead.
|
JAVA
|
6
|
MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
Monitoring transit traffic at one or more points in a
network. This problem is addressed by strategically routing traffic
sub-populations over fixed monitors. This approach is MeasuRouting.
MeasuRouting works within the constraints of existing intra-domain traffic
engineering operations that are geared for efficiently utilizing bandwidth
resources, or meeting Quality of Service (QoS) constraints, or both.
|
JAVA
|
7
|
Opportunistic Flow-level Latency Estimation using NetFlow
The inherent support in routers (SNMP counters or NetFlow)
is not sufficient to diagnose performance problems in IP networks, especially
for flow-specific problems where the aggregate behavior within a router
appears normal. Consistent NetFlow (CNF) architecture is proposed for
measuring per-flow performance measurements within routers. CNF proposes
hash-based sampling to ensure that two adjacent routers record the same
flows.
|
JAVA
|
8
|
Router Support for Fine-Grained Latency Measurements
Datacenter network
applications, including automated trading and high-performance computing,
have stringent end-to-end latency requirements where even microsecond
variations may be intolerable. The resulting fine-grained measurement demands
cannot be met effectively by existing technologies, such as SNMP, NetFlow, or
active probing. Instrumenting routers with a hash-based primitive that we
call a Lossy Difference Aggregator (LDA) to measure latencies down to tens of
microseconds even in the presence of packet loss.
|
JAVA
|
9
|
Design, Implementation, and Performance of A Load Balancer for SIP
Server Clusters
This load balancer improves
both throughput and response time versus a single node, while exposing a
single interface to external clients. The algorithm achieves Transaction Least-Work-Left (TLWL),
achieves its performance by integrating several features: knowledge of the
SIP protocol; dynamic estimates of back-end server load; distinguishing
transactions from calls; recognizing variability in call length; and exploiting
differences in processing costs for different SIP transactions.
|
JAVA
|
10
|
Privacy- and Integrity-Preserving Range Queries in Sensor Networks
The architecture of two-tiered
sensor networks, where storage nodes serve as an intermediate tier between
sensors and a sink for storing data and processing queries, has been widely
adopted. We propose SafeQ, a protocol that prevents attackers from gaining
information from both sensor collected data and sink issued queries. SafeQ
also allows a sink to detect compromised storage nodes when they misbehave.
|
JAVA
|
11
|
An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
A distributed adaptive
opportunistic routing scheme for multi-hop wireless ad-hoc networks is
proposed. The proposed opportunistically route the packets even in the
absence of reliable knowledge about channel statistics and network model. The
proposed routing scheme jointly addresses the issues of learning and routing
in an opportunistic context, where the network structure is characterized by
the transmission success probabilities.
|
JAVA
|
Dependable Secure
Computing / Network Security
S.No
|
Title & Abstract
|
Technology
|
12
|
ZoneTrust: Fast
Zone-Based Node Compromise Detection and Revocation in Wireless Sensor
Networks Using Sequential Hypothesis Testing
In wireless sensor networks, an adversary can physically
capture and compromise sensor nodes and then mount a variety of attacks. To
minimize the damage incurred by compromised nodes, the system should detect
and revoke them as soon as possible. Proposed a zone-based node compromise
detection scheme in sensor networks. The main idea of the proposed scheme is
to use sequential hypothesis testing to detect suspect regions in which
compromised nodes are likely placed.
|
JAVA
|
13
|
Design and Implementation
of TARF: A Trust-Aware Routing Framework for WSNs
The multi-hop routing in wireless sensor networks (WSNs)
offers little protection against identity deception through replaying routing
information. An adversary can exploit this defect to launch various harmful
or even devastating attacks against the routing protocols, including sinkhole
attacks, wormhole attacks and Sybil attacks. To secure the WSNs against
adversaries misdirecting the multi-hop routing, we designed and implemented TARF,
a robust trust-aware routing framework for dynamic WSNs.
|
JAVA
|
14
|
pCloud: A Distributed System for
Practical PIR
Computational Private Information Retrieval (cPIR)
protocols allow a client to retrieve one bit from a database, without the server
inferring any information about the queried bit. pCloud, a distributed system
that constitutes the first attempt towards practical cPIR.
|
Java/J2EE
|
15
|
Packet-Hiding
Methods for Preventing Selective Jamming Attacks
Selective jamming attacks can be launched by performing
real-time packet classification at the physical layer. To mitigate Selective
jamming attacks, three schemes that prevent real-time packet classification
by combining cryptographic primitives with physical-layer attributes to be
proposed.
|
JAVA
|
16
|
Detecting and
Resolving Firewall Policy Anomalies
To provide an innovative policy anomaly management
framework for firewalls, adopting a rule-based segmentation technique to
identify policy anomalies and derive effective anomaly resolutions.
|
JAVA
|
17
|
Risk-Aware Mitigation
for MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable
to attacks due to the dynamic nature of its network infrastructure. Among
these attacks, routing attacks have received considerable attention since it
could cause the most devastating damage to MANET. Proposed a risk-aware
response mechanism to systematically cope with the identified routing
attacks.
|
JAVA
|
Image Processing
S.No
|
Title & Abstract
|
Technology
|
18
|
Multiple exposure
fusion for high dynamic range image acquisition
Multiple exposure fusion to enhance the dynamic range of an
image is proposed. The construction of high dynamic range images (HDRI) is
performed by combining multiple images taken with different exposures and
estimating the irradiance value for each pixel.
|
Dot Net
|
Multi Media
S.No
|
Title & Abstract
|
Technology
|
19
|
Learn to
Personalized Image Search from the Photo Sharing Websites
Personalized search serves are one, where the web search
experience is improved by generating the returned list according to the
modified user search intents. Proposed system considers the user and query
relevance to learn to personalized image search.
|
Dot Net
|
Mobile Computing
S.No
|
Title & Abstract
|
Technology
|
20
|
Energy-Efficient
Cooperative Video Distribution with Statistical QoS Provisions over Wireless
Networks
For real-time video broadcast where multiple users are
interested in the same content, mobile-to-mobile cooperation can be utilized
to improve delivery efficiency and reduce network utilization. The resource
allocation problem for general multihop multicast network flows is considered
and derived the optimal solution that minimizes the total energy consumption
while guaranteeing a statistical end-to-end delay bound on each network path.
|
JAVA
|
21
|
Protecting Location
Privacy in Sensor Networks Against a Global Eavesdropper
The location privacy issue in sensor networks under this
strong adversary model is considered. Proposed two techniques to provide
location privacy to monitored objects (source-location privacy)-periodic
collection and source simulation-and two techniques to provide location
privacy to data sinks (sink-location privacy)-sink simulation and backbone
flooding.
|
JAVA
|
Parallel and
Distributed Systems/ Distributed Networking
S.No
|
Title & Abstract
|
Technology
|
22
|
Revisiting Dynamic
Query Protocols in Unstructured Peer-to-Peer Networks
In unstructured peer-to-peer networks, the average response
latency and traffic cost of a query are two main performance metrics.
Controlled-flooding resource query algorithms are widely used in unstructured
networks such as peer-to-peer networks. Propose Selective Dynamic Query
(SDQ), SDQ calculates the optimal combination of an integer TTL value and a
set of neighbors to control the scope of the next query.
|
JAVA
|
23
|
Catching Packet
Droppers and Modifiers in Wireless Sensor Networks
Packet dropping and modification are common attacks that
can be launched by an adversary to disrupt communication in wireless
multi-hop sensor networks. Proposed a effective scheme, which can identify misbehaving
forwarders that drop or modify packets.
|
|
24
|
Exploiting
Jamming-Caused Neighbor Changes for Jammer Localization
Jamming attacks are especially harmful when ensuring the
dependability of wireless communication. Finding the position of a jammer
will enable the network to actively exploit a wide range of defense
strategies. Proposed system localizes a jammer by exploiting neighbor
changes.
|
|
25
|
Bounding the Impact
of Unbounded Attacks in Stabilization
Self-stabilization is a versatile approach to
fault-tolerance since it permits a distributed system to recover from any
transient fault that arbitrarily corrupts the contents of all memories in the
system. Byzantine tolerance is an attractive feature of distributed systems
that permits to cope with arbitrary malicious behaviors. Combining these two
properties proved difficult: it is impossible to contain the spatial impact
of Byzantine nodes in a self-stabilizing context for global tasks such as
tree orientation and tree construction.
|
DOT NET
|
26
|
Cut Detection in
Wireless Sensor Networks
A wireless sensor network can get separated into multiple
connected components due to the failure of some of its nodes, which is called
a “cut.” Aim is detecting cuts by the remaining nodes of a wireless sensor
network. Proposed algorithm allows 1) every node to detect when the
connectivity to a specially designated node has been lost, and 2) one or more
nodes (that are connected to the special node after the cut) to detect the
occurrence of the cut.
|
|
27
|
Detection and
Localization of Multiple Spoofing Attackers in Wireless Networks
Wireless networks are vulnerable to spoofing attacks. Proposed
a method for both detecting spoofing attacks, and locating the positions of
adversaries performing the attacks.
|
JAVA
|
28
|
Capacity of Data
Collection in Arbitrary Wireless Sensor Networks
How to efficiently collect sensing data from all sensor
nodes is critical to the performance of wireless sensor networks. We derive
the upper and constructive lower bounds for data collection capacity in
arbitrary networks. The proposed data collection method can lead to
order-optimal performance for any arbitrary sensor networks.
|
JAVA
|
29
|
BECAN: A
Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected
False Data in Wireless Sensor Networks
To propose a novel bandwidth-efficient cooperative
authentication (BECAN) scheme for filtering injected false data in wireless
sensor networks. To achieve not only high filtering probability but also high
reliability through BECAN scheme.
|
JAVA
|
30
|
Cooperative
Provable Data Possession for Integrity Verification in Multi-Cloud Storage
Provable data possession (PDP) is a technique for ensuring
the integrity of data in storage outsourcing. The construction of an
efficient PDP scheme for distributed cloud storage is considered, which supports
the scalability of service and data migration. Cooperative PDP (CPDP) scheme
based on homomorphic verifiable response and hash index hierarchy.
|
JAVA/J2EE
|
31
|
Balancing the
Tradeoffs between Query Delay and Data Availability in MANETs
To propose data replication techniques to address query
delay and data availability issues. As both metrics are important for mobile
nodes, propose a technique to balance the tradeoffs between data availability
and query delay under different system settings and requirements.
|
JAVA
|
Service Computing
S.No
|
Title & Abstract
|
Technology
|
32
|
Bootstrapping Ontologies for Web Services
Ontological bootstrapping which aims at automatically
generating concepts and their relations in a given domain is a promising
technique for ontology construction. Bootstrapping an ontology based on a set
of predefined textual sources, such as Web services, must address the problem
of multiple, largely unrelated concepts.
|
JAVA/J2EE
|
33
|
Towards Secure and
Dependable Storage Services in Cloud Computing
Propose an effective and flexible distributed storage
verification scheme with dynamic data support to ensure the correctness and
availability of users’ data in the cloud. Data error localization i.e, to
indentify misbehaving server.
|
JAVA/J2EE
|
No comments:
Post a Comment