TABLE OF CONTENTS
TITLE NAME | PAGE NO |
ABOUT InfoPark | 2 |
JAVA IEEE PROJECTS | 3 |
JAVA NON-IEEE PROJECTS | 15 |
J2EE IEEE PROJECTS | 17 |
J2EE NON-IEEE PROJECTS | 19 |
DOTNET IEEE PROJECTS | 20 |
DOTNET NON-IEEE PROJECTS | 32 |
InfoPark Software Technologies is leading Research & Development Organization. Over a decade, we are furnishing individuals in all technologies and domains by fulfilling their desires in Research & Development sector through efficient training methodologies. All our efforts are focused on students to meet industry requirements.
The global presence and reach attained by InfoPark is not only substantiated by its presence, but also by the environment provided for the students. Since our environment is encapsulated with doctorates, professionals and other experts. Accordingly, we created a setting which enables student to recover from the existing learning processes and making them to be an intellect.
In our increasing globalization, InfoPark moves forward to unite the desires of students and challenges of the future in R & D sector by improving the agility and enabling students to achieve sustainable growth over their rivalry. For future enhancement, industry based knowledge’s are provided for students in various levels. To sum up, we are filling student necessities in all possible ways to make career brighter in their desired field.
JAVA
TECHNOLOGY: JAVA
DOMAIN: IEEE TRANSACTIONS ON NETWORKING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJNW01 | Lightweight Online Performance Monitoring and Tuning with Embedded Gossip | In this project, a new performance monitoring approach called Embedded Gossip (EG) is designed to enable lightweight online performance monitoring and tuning. | 2009 |
2 | ITJNW02 | Eventual Clusterer: A Modular Approach to Designing Hierarchical Consensus Protocols in MANETs | In this project, a clustering function, called eventual clusterer is designed for constructing and maintaining the two-layer hierarchy. | 2009 |
3 | ITJNW03 | On the Fly Estimation of the Processes that Are Alive in an Asynchronous Message-Passing System. | In this project, proposes a protocol, plus a second protocol that allows to cope with Heterogeneous communication networks in fault-tolerant-distributed computing. | 2009 |
4 | ITJNW04 | A Case for Continuous Data Protection at Block Level in Disk Array Storages | In this project, we propose a new disk array architecture that provides Timely Recovery to Any Point-in-time, referred to as TRAP. | 2009 |
5 | ITJNW05 | Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems | In this project, we present accessibility-aware resource selection techniques by which it is possible to choose nodes that will have efficient data access to remote data sources. | 2009 |
6 | ITJNW06 | Multipath Dissemination in Regular Mesh Topologies | In this project, we present a scalable approach for dissemination that exploits all the shortest paths between a pair of nodes and improves the QoS | 2009 |
7 | ITJNW07 | Privacy-Aware Collaborative Spam Filtering | In this project, a privacy-aware framework for collaborative spam filtering, preserving message transformation technique that is highly resilient against the latest kinds of spam attacks. | 2009 |
8 | ITJNW08 | Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks | In this project, we propose the dynamic search (DS) algorithm, which is a generalization of flooding and RW. | 2009 |
9 | ITJNW09 | A Decentralized Method for Scaling Up Genome Similarity Search Services | This paper tackles this problem in a novel way, which treats sequence search requests as content requests to both genome databases and similarity detection methods | 2009 |
10 | ITJNW10 | An Efficient Adaptive Transmission Control Scheme for Large-Scale Distributed Simulation Systems | In this project, the aim of DDM is to reduce and control the volume of information exchanged among the simulated entities in a large-scale distributed simulation system. | 2009 |
11 | ITJNW11 | Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search | In this project, Plexus, a peer-to-peer search protocol that provides an efficient mechanism for advertising a bit sequence (pattern), and discovering it using any subset of its 1-bits. | 2009 |
12 | ITJNW12 | Detecting Malicious Packet Losses | In this project, the problem of detecting whether a compromised router is maliciously manipulating its stream of Packets. | 2009 |
13 | ITJNW13 | Cooperative Secondary Authorization Recycling | In this project, an approach where each application server recycles previously received authorizations and shares them with other application servers to mask authorization server failures and network delays. | 2009 |
14 | ITJNW14 | Robust Rate Control for Heterogeneous Network Access in Multihomed Environments | In this project, a novel robust flow control framework for heterogeneous network access by devices with multi-homing capabilities. | 2009 |
15 | ITJNW15 | Optimizing the Throughput of Data-Driven Peer-to-Peer Streaming | In this project, we analytically study the scheduling problem in data-driven streaming system and model it as a classical min-cost network flow problem. | 2009 |
16 | ITJNW16 | Quiver: Consistent Object Sharing for Edge Services | In This project (Quiver), a system that coordinates service proxies placed at the “edge” of the Internet to serve distributed clients accessing a service involving mutable objects. | 2008 |
17 | ITJNW17 | A Model-Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Losses | In this project, we are going to evaluate the efficacy of FEC coding. To evaluate it, we are going to transfer data from Source to Destination. | 2008 |
18 | ITJNW18 | Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction | In this project, we introduce a speculative transmission scheme to significantly reduce the average control-path latency by allowing cells to proceed without waiting for a grant, under certain conditions | 2008 |
19 | ITJNW19 | Two Techniques for Fast Computation of Constrained Shortest Paths | In this project, we propose two techniques that reduce the discrimination errors, reducing the overhead of computing constrained shortest paths is practically important for the successful design of a high-throughput QoS router. | 2008 |
20 | ITJNW20 | Designing Less-Structured P2P Systems for the Expected High Churn | In this project, we propose a number of illustrative query-related strategies and organizational protocols that | 2008 |
TECHNOLOGY: JAVA
DOMAIN: IEEE TRANSACTIONS ON DATA MINING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJDM01 | Interactive Correction and Recommendation for Computer Language Learning and Training | In this project, our automated tutoring system provides a realistic training environment for database programming. Automated tutoring is time and location independent | 2009 |
2 | ITJDM02 | Monitoring Online Tests through Data Visualization | In this project, we present an approach and a system to let tutors monitor several important aspects related to online tests, such as learner behavior and test quality. | 2009 |
3 | ITJDM03 | Effective Collaboration with Information Sharing in Virtual Universities | In this project, information sharing of virtual universities usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure manner poses a difficult and vital challenge. | 2009 |
4 | ITJDM04 | GLIP: A Concurrency Control Protocol for Clipping Indexing | In this project, a new concurrency control Protocol, GLIP, with an improved spatial indexing approach, the ZR+-tree. | 2009 |
5 | ITJDM05 | Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data | In this project, the framework is practical for detecting drifting concepts in time-evolving categorical data. | 2009 |
6 | ITJDM06 | IMine: Index Support for Item Set Mining | The IMine index is a novel index structure that supports efficient item set mining into a relational DBMS. | 2009 |
7 | ITJDM07 | Progressive Parametric Query Optimization | We propose instead to progressively explore the parameter space and build a parametric plan during several executions of the same query. | 2009 |
8 | ITJDM08 | Efficient Processing of Metric Skyline Queries | Skyline query is of great importance in many applications, such as multicriteria decision making and business planning. | 2009 |
9 | ITJDM09 | Comparing Scores Intended for Ranking | This paper has dealt with generalizing measures of discordance for the case when the underlying scores are known. | 2009 |
10 | ITJDM10 | CDNs Content Outsourcing via Generalized Communities | We dealt with the content selection problem which content should be outsourced in CDN’s surrogate servers | 2009 |
11 | ITJDM11 | Truth Discovery with multiple Conflicting Information Providers on the Web. | The aim of the project is to Truth Finder successfully finds true facts among conflicting information, and identifies trustworthy web sites better than the popular search engines. | 2008 |
12 | ITJDM12 | Online Index Recommendation for High-Dimensional Databases Using Query Workloads. | In this project we are going to develop one index for High Dimensional database using user query pattern , by this index we can able to retrieve the data faster, and we make this index adjust itself when the user query pattern change. | 2008 |
13 | ITJDM13 | C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data. | We present our temporal clustering-based technique, discuss its algorithmic implementation and performance, demonstrate applications of the technique by analyzing the data in share market. | 2008 |
14 | ITJDM14 | A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative data’s. | We propose a signature-based indexing method to optimize the storage and retrieval of a relative data’s from the large database. | 2008 |
TECHNOLOGY: JAVA
DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJNS01 | SAT-Solving Approaches to Context-Aware | In this project an approach based on Boolean Satisfiability Solving (SAT Solving) that can reason about attacks, usability requirements, cost of actions, etc. in a unified, logical framework. | 2009 |
2 | ITJNS02 | Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach | In this project Location Guard—a location hiding technique for securing overlay file storage systems from targeted file attacks | 2009 |
3 | ITJNS03 | A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks | In this project a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate With each other? | 2009 |
4 | ITJNS04 | Efficient Node Admission and Certificate less Secure Communication in Short-Lived MANETs | This project, we focus on a common type of MANET that is formed on a temporary basis, and present a secure, efficient, and a fully no interactive admission technique geared for this type of a network. | 2009 |
5 | ITJNS05 | Dynamic Routing with Security Considerations. | In this project a dynamic routing algorithm that could randomize delivery paths for data transmission. | 2009 |
6 | ITJNS06 | A Precise Termination Condition Of The Probabilistic Packet Marking Algorithm | The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of-service attack. | 2008 |
7 | ITJNS07 | Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries. | Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences | 2008 |
8 | ITJNS08 | Security in Large Networks Using Mediator Protocols | This project presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography | 2007 |
TECHNOLOGY: JAVA
DOMAIN: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJSW01 | Maturing Software Engineering Knowledge through Classifications: A Case Study on Unit Testing Techniques | In this project we are providing a systematic description of the techniques and testing techniques by studying the relationships among techniques | 2009 |
2 | ITJSW02 | Carving and Replaying Differential Unit Test Cases from System Test Cases | In this paper, we show that DUTs retain some of the advantages of unit tests, can be automatically generated, and have the potential for revealing faults related to intricate system executions | 2009 |
3 | ITJSW03 | Atomicity Analysis of Service Composition across Organizations | In this paper, our framework enables the analysis of the atomicity sphere for service compositions using these public views instead of their backend processes | 2009 |
4 | ITJSW04 | Engineering Privacy | In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline’s topics. | 2009 |
5 | ITJSW05 | Optimized Resource Allocation for Software Release Planning | In the context of release planning, the question studied in this paper is how to allocate these resources to the tasks of implementing the features such that the value gained from the released features is maximized | 2009 |
6 | ITJSW06 | Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems | In this paper presents the principles and the technology that stand behind the C3 measure. A large case study on three open source software systems is presented which compares the new measure with an extensive set of existing metrics and uses them to construct models that predict software faults | 2008 |
7 | ITJSW07 | Call-Stack Coverage for GUI Test Suite Reduction | In this paper we proposed System unstructural information is retrieved from the source code like comments and identifiers. | 2008 |
TECHNOLOGY: JAVA
DOMAIN: IEEE TRANSACTIONS ON IMAGE PROCESSING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJIM01 | PCA-Based Spatially Adaptive Denoising of CFA Images for Single-Sensor Digital Cameras | In this project a principle component analysis (PCA) based spatially-adaptive denoising algorithm, which works directly on the CFA data using a supporting window to analyze the local image statistics. | 2009 |
2 | ITJIM02 | A No-Reference Objective Image Sharpness Metric Based on the Notion of Just Noticeable Blur (JNB) | This work presents a perceptual-based no-reference objective image sharpness/blurriness metric by integrating the concept of just noticeable blur into a probability summation model. | 2009 |
3 | ITJIM03 | Bayesian Image Recovery for Dendritic Structures Under Low Signal-to-Noise Conditions | In this project, we present a Bayesian approach for estimating the neuronal shape given low-SNR observations. | 2009 |
4 | ITJIM04 | Empirical Capacity of a Recognition Channel for Single- and Multipose Object Recognition Under the Constraint of PCA Encoding | In this project, we evaluate the empirical recognition capacity of PCA-based object recognition systems. The encoded data (templates) and the additive noise in query templates are modeled to be Gaussian distributed with zero mean and estimated variances. | 2009 |
5 | ITJIM05 | High-Fidelity Data Embedding for Image Annotation. | In this project,a visual perception model that aims at quantifying the local tolerance to noise for arbitrary imagery. | 2009 |
6 | ITJIM06 | Image Restoration Using Space Variant Gaussian Scale Mixtures in Over complete Pyramids | In this project, we present an enhancement of the model by introducing a coarser adaptation level, where a larger neighborhood is used to estimate the local signal covariance within every sub band. | 2008 |
7 | ITJIM07 | Incremental Learning of Chunk Data for Online Pattern Classification Systems | In This project ,a pattern classification system in which feature extraction and classifier learning are simultaneously carried out not only online but also in one pass where training samples are presented only once | 2008 |
8 | ITJIM08 | Nonnegative Matrix actorization in Polynomial Feature Space | In this project, we propose a generalization of the NMF algorithm by translating the objective function into a Hilbert space (also called feature space) under nonnegativity constraints. | 2008 |
TECHNOLOGY: JAVA
DOMAIN: IEEE TRANSACTIONS
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1. | ITJMC01 | Message Authentication in Computationally Constrained Environments | In this Project RFID and Wireless Sensor Networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead. | 2009 |
2. | ITJMC02 | Wardrop Routing in Wireless Networks | In this project Routing protocols for multihop wireless networks have traditionally used shortest path routing to obtain paths to destinations and do not consider traffic load or delay as an explicit factor in the choice of routes | 2009 |
3. | ITJMC03 | A Tabu Search Algorithm for | In this project The main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes. | 2009 |
4 | ITJMC04 | Efficient Broadcasting in | In our project two efficient broadcasting algorithms based on 1-hop neighbor information. In the first part of the paper, we consider sender-based broadcasting algorithms, specifically the algorithm proposed by Liu et al. | 2009 |
5 | ITJMC05 | Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in | In this project our goal is to Sharing audio and video resources between Media environments | 2009 |
6. | ITJMC06 | Location-Based Spatial Query Processing In Wireless Broadcast Environments | In this project Our approach is based on peer-to-peer sharing, which enables us to process queries without delay at a mobile host by using query results cached in its neighboring mobile peers | 2008 |
7. | ITJMC07 | Mitigating Performance Degradation In Congested Sensor Network | In this project We propose a class of algorithms that enforce differentiated routing based on the congested areas of a network and data priority. | 2008 |
TECHNOLOGY: JAVA
DOMAIN: IEEE TRANSACTIONS ON GRID COMPUTING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJGC01 | Bi-Criteria Scheduling of Scientific Grid Workflows | In this project we propose a new bi-criteria scheduling specification method defining for the secondary criterion a sliding constraint as a function of the primary criterion. | 2009 |
2 | ITJGC02 | Eight Times Acceleration of Geospatial Data Archiving and Distribution on the Grids | In this project a grid-powered Web Geographical Information Science (GIS)/Web Processing Service (WPS) system has been developed for archiving and distributing large volumes of geospatial data. | 2009 |
3 | ITJGC03 | TCP Performance in Flow-Based Mix Networks: Modeling and Analysis | In this project, we systematically address TCP performance issues of flow-based mix networks. A mix’s batching and reordering schemes can dramatically reduce TCP throughput due to out-of-order packet delivery | 2009 |
4 | ITJGC04 | Cooperative Secondary Authorization Recycling | In this project we propose an approach where each application server recycles previously received authorizations and shares them with other application servers to mask authorization server failures and network delays | 2009 |
5 | ITJGC05 | Adaptive Task Check pointing and Replication: Toward Efficient Fault-Tolerant Grids. | In this project we introduce several heuristics that dynamically adapt to various parameters based on information on grid status to provide high job throughput in the presence of failure while reducing the system overhead | 2009 |
TECHNOLOGY: JAVA
S:NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJMM01 | Segmentation-Driven Image Fusion Based on Alpha-Stable Modeling of Wavelet Coefficients | In this project, A novel region-based image fusion framework based on multiscale image segmentation and statistical feature extraction is proposed | 2009 |
2 | ITJMM02 | Structured Network Coding and Cooperative Wireless Ad-Hoc Peer-to-Peer Repair for WWAN Video Broadcast | In this project, we propose a network-coding-based cooperative repair framework for the ad-hoc peer group to improve broadcast video quality during channel losses. | 2009 |
3 | ITJMM03 | Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents | In this project, a novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations are performed. | 2009 |
DOMAIN: IEEE TRANSACTIONS ON MULTIMEDIA
4 | ITJMM04 | Investigating the Scheduling Sensitivity of P2P Video Streaming: An Experimental Study | In this project, we see several representative P2P streaming designs, ranging from theoretically proved optimal designs to straightforward “naive” designs. | 2009 |
5 | ITJMM05 | Using Visual Context and Region Semantics for High-Level Concept Detection | In this project, we investigate detection of high-level concepts in multimedia content through an integrated approach of visual thesaurus analysis and visual context. | 2009 |
TECHNOLOGY: JAVA
DOMAIN: NON-IEEE BASED PROJECTS
S.NO | PROJECT CODE | DOMAIN | PROJECT TITLES | DESCRIPCTION |
1 | JPEE01 | Software eng | On-Line Java Compiler with Security Editor | This project will Compile and run the java program in on-Line. |
2 | JPEE02 | Networking | Client Server Communication Using Multi-Tasking-Sockets | This project is of client server communication with multi tasking sockets. |
3 | JPEE03 | Network Security | Bit-Plane Complexity Segmentation Steganography in Internet | Steganography is a technique to hide secret information in some other data without leaving any apparent evidence of data alteration. This new Steganography uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. |
4 | JPEE04 | Networking | Self-Interested Routing in Online Environments | To evaluate the performance of selfish routing based on realistic topologies and traffic demands. Such performance benefit comes at the expense of significantly increased congestion. |
5 | JPEE05 | Network Security | Data transmission using Implicit and Explicit Quantum Cryptography | This project is used to provide authenticated secure communication between sender and receiver |
6 | JPEE06 | Networking | Video streaming in multiple system | This project is about transmitting video between system using multi sockets in java. |
7 | JPEE07 | Networking | Data Transmit ion Using RMI | In this project, evaluate the performance by transferring different types of files such as text, image and video using different methods. |
8 | JPEE08 | Networking | Data Management System Using Proxies | In this project, the details of the organization are managed with net enabled technologies. The entire details of the organization like branch details, employee details, job scheduling are maintained using distributed computing technologies |
9 | JPEE09 | Networking | Efficient data Transferring Using TCP/IP | Service prioritization among different traffic classes is an important goal for the Internet. Consider the existing best-effort class as the low-priority class, and attempt to develop mechanisms that provide “better-than-best-effort” service. |
10 | JPEE10 | Network Security | Data Security using Cryptography and Steganography | This project ensures the privacy of the communication between two parties. It uses Audio file Steganography. |
J2EE
TECHNOLOGY: J2EE
DOMAIN: IEEE TRANSACTIONS
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITJ2EE01 | Clustering and Sequential Pattern Mining of Online Collaborative Learning Data | The goal is to enable the groups and their facilitators to see relevant aspects of the group’s operation and provide feedbacks if these are more likely to be associated with positive or negative outcomes and indicate where the problems are. | 2009 |
2 | ITJ2EE02 | Effect of Contact Information on the Credibility of Online Health Information | This study analyzed the effects of publisher contact information on the credibility of online health information. | 2009 |
3 | ITJ2EE03 | Business: A Pragmatic Approach | This project describes an approach to build and use EOs for information system (IS) planning and integration projects with particular focus on real-life eBusiness applications. | 2009 |
4 | ITJ2EE04 | A Semantically Enriched Clinical Guideline Model Enabling Deployment in Heterogeneous Healthcare Environments | In this project, we provide machine-processable mechanisms that express the semantics of clinical guideline interfaces so that automated processes can be used to access the clinical resources for Guideline deployment and execution. | 2009 |
5 | ITJ2EE05 | Improving Personalization Solutions through Optimal Segmentation of Customer Bases | In this project, We present a direct grouping-based approach to computing customer segments that groups customers not based on computed statistics. | 2009 |
6 | ITJ2EE06 | RFID-Enabled Discovery of Supply Networks | This paper aims at providing an innovative solution for organizations to discover their supply networks | 2009 |
7 | ITJ2EE07 | An Efficient and Effective Personalized Recommender System of TV Programs | The proposed hybrid approach(combining content-filtering techniques with those based on collaborative filtering) also provides all typical advantages of any social network as comments, tagging, ratings, etc. | 2009 |
8 | ITJ2EE08 | Guest Editors’ Introduction: Knowledge and Data Engineering for E-Learning | The rapid development of Web-based learning and new concepts like virtual classrooms, virtual laboratories, and virtual universities introduces many new issues to be addressed.. | 2009 |
9 | ITJ2EE09 | The Strategic Implications of Web Technologies: A Process Model of How Web Technologies Enhance Organizational Performance | In this project, A theoretical lens is constructed from five core logics in organizational literature that represent the different possible ways of enhancing organizational Performance. | 2009 |
10 | ITJ2EE10 | WADA Service: An Extension of DICOM WADO Service | The proposed Web Access to DICOM Archives (WADA) service, as opposed to WADO, also includes an extra internal query mechanism and support of medical reports submission. | 2009 |
TECHNOLOGY: J2EE
DOMAIN: NON-IEEE BASED PROJECTS
S.NO | PROJECT CODE | DOMAIN | PROJECT TITLES | DESCRIPTION |
1 | J2PEE01 | Web application | Examination Result Management System | This project is developed for college students to view their semester results and to maintain their information |
2 | J2PEE02 | Web application | Global Web Rating | This project holds the rating procedure of the website. |
3 | J2PEE03 | Web application | Online Employment Scheme | This project is to maintain the information for job seekers. |
4 | J2PEE04 | Web application | Online Application Test For Agent | In this project we proposed an agent based approach for web testing. |
5 | J2PEE05 | Web application | Online Share Trading | In this project we maintain the Share information with the particular share information and the all share details. |
6 | J2PEE06 | Web application | Online Examination for Recruitment process | In this project, Online examination is the process of conducting the exam through online. This web application |
7 | J2PEE07 | Web application | Online Insurance Management System | In this project, Online insurance is web application which is used to tracking the details About insurance policy, customer details and company details. |
8 | J2PEE08 | Web application | Computer Purchase Expert | In this project, the details of the computer peripherals are stored by the vendors for customer reference |
9 | J2PEE09 | Web application | Online Auction And Time Bid Watching | In this project, the user purchase the product based on the auction |
10 | J2PEE10 | Web application | Attraction of customers using Customer relationship management | In this project we collect customer details in order to improve the relation ship between customer and seller. |
DOTNET
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS ON NETWORKING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 |
ITDNW01 | Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces | The constructions presented in this paper (consensus and universal objects) demonstrate that this approach allows the development of simple delegant algorithms, at the cost of defining access policies for the shared memory objects they use. | 2009 |
2 | ITDNW02 | Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems | This project explains load balancing in networks. 1. Maintaining the load information. 2. Redistributing the load if it exceeds the limit. | 2009 |
3 | ITDNW03 | A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand Service | This model proposes improving the scalability of video-on-demand service over Internet by analyzing user behavior. | 2009 |
4 | ITDNW04 | Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks | This project proposes trusted and secured peer to peer application, shortens the search time, reduces the memory requirement, and enhances the chaining accuracy in scalable P2P networks. | 2009 |
5 | ITDNW05 | Reputation-based Resource Allocation in P2P Systems of Rational Users | In this project, File uploading and downloading in peers through backbone network can be done using this project. | 2009 |
6 | ITDNW06 | Effect of Network Quality on Player Departure Behavior in Online Games | In this project improves network quality on player departure behavior in online games | 2009 |
7 | ITDNW07 | A Parameterized Approach to Spam-Resilient Link Analysis of the Web | This paper propose ranking of url based on counting total no. visitors online on the url& counting total no. visitors on the application | 2009 |
8 | ITDNW08 | On the Time Synchronization of Distributed Log Files in Networks With Local Broadcast Media | Computer networks typically contain a set of log files; these clocks are not perfectly accurate and deviate from each other. The project introduces Clock deviations and event time, can be estimated with very high accuracy, without introducing any additional traffic in the network. | 2009 |
9 | ITDNW09 | Measuring Capacity Bandwidth of Targeted Path Segments | In this project we are measuring the capacity of network bandwidth using 1. Single packet probing method. 2. Packet bunch probing method. 3.Uniform packet-pair probing method. 4. Non-Uniform packet pair Probing method. | 2009 |
10 | ITDNW10 | A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree | In this project, We propose a distributed algorithm that efficiently computes all of these swap links, and explain how to route messages across swap edges with a compact routing scheme. Finally, the computation of swap edges in an arbitrary spanning tree, where swap edges are chosen to minimize the time required to adapt routing in case of a failure, and give efficient distributed algorithms for two variants of this problem. | 2009 |
11 | ITDNW11 | Effective Collaboration with Information Sharing in Virtual Universities | This paper aims to build a new rule-based framework to identify and address issues of sharing in virtual university environments through role-based access control (RBAC) management for e-learning systems | 2009 |
12 | ITDNW12 | Node-Capability-Aware Replica Management for Peer-to-Peer Grids
| In this project, We propose a concept called Virat, a node-capability-aware P2P middleware for managing replicas in Large-scale unstructured Peer-to-peer (P2P) systems. | 2009 |
13 | ITDNW13 | The Globus Replica Location Service: Design and Experience | This Project proposes Replica Location Service (RLS) offers a mechanism to maintain and provide information about physical locations of replicas in network. | 2009 |
14 | ITDNW14 | Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission | In this paper, we consider using simultaneous Multiple Packet Transmission (MPT) to improve the downlink performance of Networks. The sender can send two compatible packets simultaneously to two distinct receivers | 2009 |
15 | ITDNW15 | Network-Coding-Based Signal Recovery for Efficient Scheduling in Wireless Networks | In this paper, We propose some practical schemes to recover the useful signal from the collided signals for different types of wireless channels; thus, The throughput and network efficiency can greatly be increased. The proposed schemes are based on the network coding technique and performed on the physical layer | 2009 |
16 | ITDNW16 | Probabilistic Packet Marking for Large-Scale IP Trace back | This project is to send message fragments in a way that is highly scalable. Checksum algorithm is using here. By this checksum, can find the data loss. | 2008 |
17 | ITDNW17 | Efficient Broadcasting using Store-mix- forward Method | In this project we maintain a low energy efficiency broadcasting in all-all communication used to improve the performance of data broadcasting | 2008 |
18 | ITDNW18 | Incentive-Based Scheduling for Market-Like Computational Grids | In this project main objective is to provide incentive for both consumer and provider which intern help both of them to play a vital role in market like computational grid. | 2008 |
19 | ITDNW19 | Rateless Forward Error Correction for Topology-Transparent Scheduling | In this project we are going to find active and inactive systems in the network finally send data to active system using rate less forward error correction | 2008 |
20 | ITDNW20 | Minimizing File Download Time in Stochastic Peer-to-Peer Networks | In this project we minimize the download time of a file by splitting into too many parts and storing in different servers. | 2008 |
21 | ITDNW21 | Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data | In this project we reduce the traffic created in the network by not allowing the bigger files and setup files to transfer. | 2008 |
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS ON DATA MINING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 |
ITDDM01 | Optimal | This project is to Reduce lots (number of items) sizes for online selling or buying. | 2009 |
2 | ITDDM02 | Monitoring Online Tests through Data Visualization | This project is to monitor learner’s behavior through an online test through graphical representation. | 2009 |
3 | ITDDM03 | Distributional Features for Text Categorization | This project is to categorize the text in a document by using compactness based features and distributional features. | 2009 |
4 | ITDDM04 | Communities and Emerging Semantics in Semantic Link Network: Discovery and Learning | This project explains use of the semantic communities and the emerging semantic relations in a dynamic complex network of learning resources | 2009 |
5 | ITDDM05 | Storing and Indexing Spatial Data in P2P Systems | This project is to store and share the spatial information in P2P Systems. | 2009 |
6 | ITDDM06 | Detecting, Assessing, and Monitoring Relevant Topics in Virtual Information Environments | This Project is to assess the relevance of topics and related sources in information-rich environments. | 2009 |
7 | ITDDM07 | Mood Recognition during Online Self-Assessment Tests | This Project illustrates how learner mood may be predicted during online self-assessment tests | 2009 |
8 | ITDDM08 | Predicting Missing Items in Shopping Carts | This project is to predict the missing items in a shopping cart using DS Theory | 2009 |
9 | ITDDM09 | Rough Cluster Quality Index Based on Decision Theory | This Project is to identify the clusters quality using indices based on decision theory. | 2009 |
10 | ITDDM10 | Ranking and Suggesting Popular Items | This Project is to efficiently learn the popularity of items and suggest popular items to users by ranking | 2009 |
11 | ITDDM11 | A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems | In this project, we investigate an approach to adaptive resource management for continuous sliding window queries that adjusts window sizes and time granularities to keep resource usage within bounds. | 2008 |
12 | ITDDM12 | Watermarking Relational Databases Using Optimization-Based Techniques. | In this project three techniques are used that altogether used to detect, determine and trace-back data leaks. | 2008 |
13 | ITDDM13 | Rough sets-based search engine for grid service discovery | In this project we create web services and manipulate it also we search the web services using related and un related sets. | 2008 |
14 | ITDDM14 | Analyzing and Managing Role-Based Access Control Policies. | In this project we analyze and manage role-based access control policies individually to increase efficiency of management system. | 2008 |
15 | ITDDM15 | Hardware-Enhanced Association Rule Mining
| Project proposes a Hash-based and Pipelined architecture for hardware-enhanced association rule mining. | 2008 |
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 |
ITDNS01 | Enhanced Security for Online Exams Using Group Cryptography. | This project proposes enhanced secure online exam management environment mediated by group cryptography using remote monitoring and control of ports. | 2009 |
2 | ITDNS02 | The Effectiveness of Checksums for Embedded Control Networks. | This project is to detect data transmission errors by using checksum computations and Embedded Control Networks. | 2009 |
3 | ITDNS03 | Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens. | In this project, we explored private-information-sharing Behavior of preteen and early teen internet users by Social Cognitive Theory and Protection Motivation Theory. | 2009 |
4 | ITDNS04 | A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors. | This project is to achieve early attack detection and filtering for the application layer-based DDOS attack by using extended Hidden semi-Markov model. | 2009 |
5 | ITDNS05 | A Secure Mobile Healthcare System using Trust-Based Multicast Scheme. | This project shows about the technique of trust evaluation without a centralized trust management authority and propose a trust evaluation model that can efficiently calculate the trustworthiness of mobile healthcare. | 2009 |
6 | ITDNS06 | Credit Card Fraud Detection Using Hidden Markov Model. | In this project we are going to find the fraud in the credit card through hidden markov model. | 2008 |
7 | ITDNS07 | An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting | In this project data’s are organized and encrypted using symmetric key algorithms according to predefined time periods and user privileges and then broadcast to users. | 2008 |
8 | ITDNS08 | SSL Backend Forwarding scheme in Cluster-Based Web Servers | In this project, data can encrypt from server and store in multiple system. Encrypted data can download from in decrypted form. This will reduce the load of the server while the server is being busy. These are the advantages of our proposed system. | 2007 |
9 | ITDNS09 | Efficient Approximate Query Processing In Peer-to-Peer Networks | This project is to perform all the queries in a network. Two phase sampling is a key factor here. We then retrieve certain information from the visited peers, such as the number of tuples, the aggregate of tuples (for example, SUM, COUNT, AVG, and so forth) that satisfy the selection condition, and send this information back to the query node. |
2007 |
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 |
ITDSW01 | Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the Same System | This paper proposes increasing Reproducibility and Quality in Software product | 2009 |
2 | ITDSW02 | What Types of Defects Are Really Discovered in Code Reviews? | This Project, Detecting code evolvability defects using code review is included in this project. | 2009 |
3 | ITDSW03 | An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules | This Project, Analyze class level size and defect proneness in software Modules | 2009 |
4 | ITDSW04 | Predicting Project Velocity in XP Using a Learning Dynamic Bayesian Network Model | This Project, Accurate prediction and risk assessment in XP using Bayesian Network Model | 2009 |
5 | ITDSW05 | Development of a Software Engineering Ontology for Multisite Software Development | This project develops the ontology model to recover knowledge | 2009 |
6 | ITDSW06 | Semantics-Based Design for Secure Web Services | In this project we introduce a cryptography designing and verifying the security policies of service oriented applications. | 2008 |
7 | ITDSW07 | The Effect of Pairs in Program Design Tasks | In this project efficiency of pairs in program design tasks is identified by using pair programming concept. Pair programming involves two developers simultaneously collaborating with each other on the same programming task to design and code a solution. | 2008 |
8 | ITDSW08 | A Realistic Empirical Evaluation of the Costs And Benefits of UML in Software Maintenance | In this project we provide very clear insights in terms of the kinds of (minimum) benefits that can be expected from using UML and the factors limiting or boosting such benefits | 2008 |
9 | ITDSW09 | Effective Software Merging in the Presence of Object-Oriented refractoriness | In this project we include C# supported files and it can be merged and replaced using re-factoring method. | 2008 |
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS ON IMAGE PROCESSING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITDIP01 | Gradient Estimation Using Wide Support Operators | This Project proposes Removing noise from picture by detecting edges. | 2009 |
3 | ITDIP03 | Sharpening Dermatological Color Images in the Wavelet Domain | This Project proposes Finding boundaries in the image and Adaptive image demising. | 2009 |
4 | ITDIP04 | Interpolation Artifacts in Sub-Pixel Image Registration | In this Project, we Comparing two images by image pixel by pixels. | 2009 |
5 | ITDIP05 | Continuous Glass Patterns for Painterly Rendering. | In this Project, We are Converting digital photograph into painting image. | 2009 |
6 | ITDIP06 | Active Learning Methods for Interactive Image Retrieval | In this project, we search a image with respect to RGB combination and the difference is plotted in a graph. | 2008 |
7 | ITDIP07 | Detection and removal of cracks and in digitized paintings | In this proposed project, system involves exact crack detection and filling procedure. It involves top-hat transformation, region-growing algorithm (grassfire algorithm) and median filter procedures. | 2007 |
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITDMC01 | Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks | Project proposed for enhancing network throughput through transferring content to station (source to destination) is done by transferring data through nearby nodes. | 2009 |
2 | ITDMC02 | Information Density Estimation for Content Retrieval in MANETs | Project proposed mobile nodes sharing information without intervention of servers. | 2009 |
3 | ITDMC03 | Two-Factor User Authentication in Wireless Sensor Networks | In this project, Accessing the data using two-factor user authentication and session key in web. | 2009 |
4 | ITDMC04 | Consistency Management Strategies for Data Replication in | This Project Replication of data to region to region if user moves to corresponding region is proposed in this project. | 2009 |
5 | ITDMC05 | Signaling for Multimedia Conferencing in Stand-Alone | This Project, Passing data through invitation of neighboring nodes and an algorithm proposed for the same. | 2009 |
6 | ITDMC06 | Benefit based Data caching in Ad hoc Networks. | This project, proposes to improve the efficiency of information access in a wireless ad hoc network by reducing the access latency and bandwidth usage. | 2008 |
7 | ITDMC07 | A Self-Repairing Tree Topology Enabling Content-Based Routing in | This project, proposes to improve the efficiency of the CBR network by minimize the number of routers. | 2008 |
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS ON GRID COMPUTING
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 |
ITDGC01 | Shortest Path Tree Computation in Dynamic Graphs | This project is to evaluate performance, in terms of both the CPU execution time and the total number of operations. We also compared them with the well-known static algorithm Dijkstra and to determine the best algorithms for different graph Sizes and for various mixes of modified edges. | 2009 |
2 | ITDGC02 | An Ant Colony Optimization Approach to a Grid Workflow Scheduling Problem With Various QoS Requirements. | This project aims at proposing an ant colony optimization (ACO) algorithm to schedule large-scale workflows with various QoS parameters. This algorithm enables users to specify their QoS preferences as well as define the minimum QoS thresholds for a certain application. | 2009 |
3 | ITDGC03 | Mirador: A Simple Fast Search Interface for Global Remote Sensing Data Sets | This Project, provide free-text (FT) search in the general domain led the Goddard Earth Sciences Data and Information Services Center to develop an FT search interface named Mirador that supports space–time queries, including a gazetteer and geophysical event gazetteer. | 2009 |
4 | ITDGC04 | Fusion of Multispectral and Panchromatic Images Using a Restoration-Based Method | This project, proposes an image fusion algorithm based on image restoration is proposed to combine multispectral and panchromatic images. For remote-sensing satellites, the wavelength of the panchromatic band usually covers the wavelengths of the multispectral bands. | 2009 |
5 | ITDGC05 | Data Flow and Workflow Organization—The Data Management for the TerraSAR-X Payload Ground Segment | This project, investigates features of the TerraSAR-X PGS that enable the reuse in a multimission environment. It summarizes the achieved enhancements and extensions of DIMS to support the TerraSAR-X mission. | 2009 |
TECHNOLOGY: DOTNET
DOMAIN: IEEE TRANSACTIONS ON MULTIMEDIA
S.NO | PROJECT CODE | PROJECT TITLES | DESCRIPTION | YEAR |
1 | ITDMM01 | Performance Analysis for Overlay Multimedia Multicast on r-ary Tree and m-D Mesh Topologies | This Project, Sending binary information to multicast network and find out average, worst, best performance. | 2009 |
2 | ITDMM02 | Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks | This Project, Splitting the videos into so many chunks and Sending video files based on the chuck request and response. | 2009 |
3 | ITDMM03 | WMA: A Marking-Based Synchronized Multimedia Tutoring System for English Composition Studies | This Project, Typing words based on the admin voice. | 2009 |
4 | ITDMM04 | Automated Bidding for Media Services at the Edge of a Content Delivery Network | This Project, Downloading and transmitting data’s depending on user accounts. | 2009 |
5 | ITDMM05 | Content-Based Attention Ranking Using Visual and Contextual Attention Model for Baseball Videos | This Project, Ranking of multimedia files depends on the user interest and feedback. | 2009 |
6 | ITDMM06 | Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High- Capacity Approach | In this project a picture given as input and a text is embedded by encrypting and decrypting the picture to get the appropriate image | 2008 |
7 | ITDMM07 | A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video | In this project various images are displayed on clicking the respective image we get the appropriate videos with respect to that image. | 2008 |
8 | ITDMM08 | Video Annotation Based on Kernel Linear Neighborhood Propagation | In this project a description about the video is stored in the database. When the video runs the corresponding description runs below the video. | 2008 |
9 | ITDMM09 | High resolution Animated Scenes from Stills | In this project a scene animation system that can easily generate a video or video texture from a small collection of stills. | 2007 |
TECHNOLOGY: DOTNET
DOMAIN: NON-IEEE BASED PROJECTS
S.NO | PROJECT CODE | DOMAIN | TITLE | DESCRIPTION |
1 | DPEE01 | Network Security | A Secure Communication Network Protocol | This project mainly provides Security for the users in a website by using Encryption and Decryption process. And Key byte is generated without user interaction. |
2 | DPEE02 | Networking | Distributed Flow Monitoring tool | The project aims at distributing the processes to various machines processors in the network. It contains both server and client applications. When the client starts running; the processor name is stored in the database. The server application checks and updates the client list in its application continuously. |
3 | DPEE03 | Data Mining | The rapeutic Management System | In this project, we decided to develop a MEDICAL MANAGEMENT SYSTEM to ease the operation. This system is required which is being capable of elimination of all the problems and become useful common both to patient, hospital and the doctors |
4 | DPEE04 | Network Security | Insurance Design And Development Of Unemployment Insurance | This project shows how the delivered solution will meet the business and technical needs of the Unemployment Insurance (UI) Program, both now and in the future. |
5 | DPEE05 | Networking | E-book supervision and management | In this project, readers can access website very effectively. Site only contains what the reader wish to see. This website can attract more readers and can serve an effective reading. |
6 | DPEE06 | Software engineering | Development of a Campaign Information System | This Project shows how best to interpret and retrieve information over land from the eventual Systems, the campaigns also provided a glimpse of the future applications that would lead to a better understanding of our environment. . |
7 | DPEE07 | Networking | Contemporary approach for Group Discussion in Intranet | This project included a system which required being capable of eliminating all the problems and become useful to users and thus the new system is derived. Here we get a different view from different users by the group discussion. |
8 | DPEE08 | Networking | Hierarchical promotion judgment system | In this project we can create new idea on Multi level marketing. Each Person (Tree Node) can have two sub-nodes (person) only. At last you should pay the Joining fees to the Admin. After registering he can able to shop the product. An Admin have the rights to view all the customer profile, Commission details, Customer Performance, and Send money to customer and manage the every activity behind the marketing |
9 | DPEE09 | Network Security | Patron complaints Maintaining scheme | In this project customer complaints are queried through logging their phone calls and assigning the complaints to service engineers. The project contains administrator and service engineer modules. |
10 | DPEE10 | Network Security | Computerized Banking Sector | This project involves computerized transactions through the private intranet solution through the Internet. The administrator enters all the branch details and provides username and password to the respective branches. The staffs in the respective branch enter the account creation details through their logins. |
11 | DPEE11 | Data Mining | Web census System | This project handles the rating process of the website. There are so many websites around the world which distribute the information given by their owners. It is an effective and easy way to reach the information to the people. There are different types of websites and their pages are with attractive information and design. |
12 | DPEE12 | Data Mining | Share Marketing Review | In this project, we enhanced a market risk system to cover equity derivatives. Pricing risk exposure was reduced by introducing common data and analytics for the front and middle office. This system used a genetic algorithm to generate thousands of trading strategies and simulated profit and loss under multiple constraints. |
13 | DPEE13 | Data Mining | Virtual knowledge sharing | In this project we are going to analyze Grid computing and identify its requirements for knowledge management, this has six problems in knowledge life cycle. That is acquiring, modeling, retrieving, reusing, publishing, and maintaining knowledge. And we are going to develop a website to solve these problems. |
14 | DPEE14 | Networking | Dispensary of hope from electronic communication | This project Provides an integrated Solution for the Hospital, which Helps in Efficient Management of the Hospital, Enhance Patient Care, Improve work efficiency, Improve Fiscal Control Information. |
15 | DPEE15 | Network security | Intelligent transport system | This project is to have a better understanding of the operation in container haulage industry as a transport as it will be the dynamic sector of the 21st century. Sophisticated automobile and freeway System is a user functions for Intelligent Transport System (ITS). The System Development Life Cycle (SDLC) is the chosen method for this project |
16 | DPEE16 | Data mining | A scheme of vendor capital fund and Indian economy | In this project the objective of this system is to assist financial analyst and related users to make company’s financial analysis according to their financial statements using computer system approaches. Trial Balance, Balance Sheet and Income Statement will be displayed for reference. |
17 | DPEE17 | Network Security | Essential Business Sever Administration | This project maintains information about students, their details from address to result. The time has Task durations, dependencies, and critical path. The scope has Project size, goals and requirements. |
18 | DPEE18 | Data mining | Economic and financial forecast model | This project helps to generate processed data including an illustration representing the life insurance contract encumbered by an indenture agreement as a means of refunding for future employee benefits. |
19 | DPEE19 | data mining | Modern architecture for exam results | This project is a pilot study on how the client/server system operates. The distributed Examination Result Information System will allow students to write the exam by registering and to view their respective exam result from any workstation in the network. |
20 | DPEE20 | networking | System observer and organizer in a Connected network | This project is route observer and organizer for both home and far-off machinery. This set the maximum instance per day. To protect the system in run time error, we need to set the time for closing the process. So in this time we need for proposed system. |