TABLE OF CONTENTS

TITLE NAME

PAGE NO

ABOUT InfoPark

2

JAVA IEEE PROJECTS

3

JAVA NON-IEEE PROJECTS

15

J2EE IEEE PROJECTS

17

J2EE NON-IEEE PROJECTS

19

DOTNET IEEE PROJECTS

20

DOTNET NON-IEEE PROJECTS

32

InfoPark Software Technologies is leading Research & Development Organization. Over a decade, we are furnishing individuals in all technologies and domains by fulfilling their desires in Research & Development sector through efficient training methodologies. All our efforts are focused on students to meet industry requirements.

The global presence and reach attained by InfoPark is not only substantiated by its presence, but also by the environment provided for the students. Since our environment is encapsulated with doctorates, professionals and other experts. Accordingly, we created a setting which enables student to recover from the existing learning processes and making them to be an intellect.

In our increasing globalization, InfoPark moves forward to unite the desires of students and challenges of the future in R & D sector by improving the agility and enabling students to achieve sustainable growth over their rivalry. For future enhancement, industry based knowledge’s are provided for students in various levels. To sum up, we are filling student necessities in all possible ways to make career brighter in their desired field.

JAVA

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON NETWORKING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJNW01

Lightweight Online Performance Monitoring and Tuning with Embedded Gossip

In this project, a new performance monitoring approach called Embedded Gossip (EG) is designed to enable lightweight online performance monitoring and tuning.

2009

2

ITJNW02

Eventual Clusterer: A Modular Approach to Designing Hierarchical Consensus

Protocols in MANETs

In this project, a clustering function, called eventual clusterer is designed for constructing and maintaining the two-layer hierarchy.

2009

3

ITJNW03

On the Fly Estimation of the Processes that Are Alive in an Asynchronous Message-Passing System.

In this project, proposes a protocol, plus a second protocol that allows to cope with

Heterogeneous communication networks in fault-tolerant-distributed computing.

2009

4

ITJNW04

A Case for Continuous Data Protection at Block Level in Disk Array Storages

In this project, we propose a new disk array architecture that provides Timely Recovery to Any Point-in-time, referred to as TRAP.

2009

5

ITJNW05

Using Data Accessibility for Resource Selection in Large-Scale Distributed Systems

In this project, we present accessibility-aware resource selection techniques by which it is possible to choose nodes that will have efficient data access to remote data sources.

2009

6

ITJNW06

Multipath Dissemination in Regular Mesh Topologies

In this project, we present a scalable approach for dissemination that

exploits all the shortest paths between a pair of nodes and improves the QoS

2009

7

ITJNW07

Privacy-Aware Collaborative Spam Filtering

In this project, a privacy-aware framework for collaborative spam filtering, preserving message transformation technique that is highly resilient against the latest kinds of spam attacks.

2009

8

ITJNW08

Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks

In this project, we propose the dynamic search (DS) algorithm, which is a generalization of flooding and RW.

2009

9

ITJNW09

A Decentralized Method for Scaling Up Genome Similarity Search Services

This paper tackles this problem in a novel way, which treats sequence search requests as content requests to both genome databases and similarity detection methods

2009

10

ITJNW10

An Efficient Adaptive Transmission Control Scheme for Large-Scale Distributed Simulation Systems

In this project, the aim of DDM is to reduce and control the volume of information exchanged among the simulated entities in a large-scale distributed simulation system.

2009

11

ITJNW11

Plexus: A Scalable Peer-to-Peer Protocol Enabling Efficient Subset Search

In this project, Plexus, a peer-to-peer search protocol that provides an efficient mechanism for advertising a bit sequence (pattern), and discovering it using any subset of its 1-bits.

2009

12

ITJNW12

Detecting Malicious Packet Losses

In this project, the problem of detecting whether a compromised router is maliciously manipulating its stream of Packets.

2009

13

ITJNW13

Cooperative Secondary Authorization Recycling

In this project, an approach where each application server recycles previously received authorizations and shares them with other application servers to mask authorization server failures and network delays.

2009

14

ITJNW14

Robust Rate Control for Heterogeneous Network Access in Multihomed Environments

In this project, a novel robust flow control framework for heterogeneous network access by devices with multi-homing capabilities.

2009

15

ITJNW15

Optimizing the Throughput of Data-Driven Peer-to-Peer Streaming

In this project, we analytically study the scheduling problem in data-driven streaming system and model it as a classical min-cost network flow problem.

2009

16

ITJNW16

Quiver: Consistent Object Sharing for Edge Services

In This project (Quiver), a system that coordinates service proxies placed at the “edge” of the Internet to serve distributed clients accessing a service involving mutable objects.

2008

17

ITJNW17

A Model-Based Approach to Evaluation of the Efficacy of FEC Coding in Combating Network Packet Losses

In this project, we are going to evaluate the efficacy of FEC coding. To evaluate it, we are going to transfer data from Source to Destination.

2008

18

ITJNW18

Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction

In this project, we introduce a speculative transmission scheme to significantly reduce the average control-path latency by allowing cells to proceed without waiting for a grant, under certain conditions

2008

19

ITJNW19

Two Techniques for Fast Computation of Constrained Shortest Paths

In this project, we propose two techniques that reduce the discrimination errors, reducing the overhead of computing constrained shortest paths is practically important for the successful design of a high-throughput QoS router.

2008

20

ITJNW20

Designing Less-Structured P2P Systems for the Expected High Churn

In this project, we propose a number of illustrative query-related strategies and organizational protocols that, taking into consideration the expected session times of peers (their lifespan), yield systems with performance.

2008

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON DATA MINING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJDM01

Interactive Correction and Recommendation for Computer Language Learning and Training

In this project, our automated tutoring system provides a realistic training environment for database programming. Automated tutoring is time and location independent

2009

2

ITJDM02

Monitoring Online Tests through Data Visualization

In this project, we present an approach and a system to let tutors monitor several important aspects related to online tests, such as learner behavior and test quality.

2009

3

ITJDM03

Effective Collaboration with Information Sharing in Virtual Universities

In this project, information sharing of virtual universities usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure manner poses a difficult and vital challenge.

2009

4

ITJDM04

GLIP: A Concurrency Control Protocol for Clipping Indexing

In this project, a new concurrency control Protocol, GLIP, with an improved spatial indexing approach, the ZR+-tree.

2009

5

ITJDM05

Catching the Trend: A Framework for Clustering Concept-Drifting Categorical Data

In this project, the framework is practical for detecting drifting concepts in time-evolving categorical data.

2009

6

ITJDM06

IMine: Index Support for Item Set Mining

The IMine index is a novel index structure that supports efficient item set mining into a relational DBMS.

2009

7

ITJDM07

Progressive Parametric Query Optimization

We propose instead to progressively explore the parameter space and build a parametric plan during several executions of the same query.

2009

8

ITJDM08

Efficient Processing of Metric Skyline Queries

Skyline query is of great importance in many applications, such as multicriteria decision making and business planning.

2009

9

ITJDM09

Comparing Scores Intended for Ranking

This paper has dealt with generalizing measures of discordance for the case when the underlying scores are known.

2009

10

ITJDM10

CDNs Content Outsourcing via Generalized Communities

We dealt with the content selection problem which content should be outsourced in CDN’s surrogate

servers

2009

11

ITJDM11

Truth Discovery with multiple Conflicting Information Providers on the Web.

The aim of the project is to Truth Finder successfully finds true facts among conflicting information, and identifies trustworthy web sites better than the popular search engines.

2008

12

ITJDM12

Online Index Recommendation for High-Dimensional Databases Using Query Workloads.

In this project we are going to develop one index for High Dimensional database using user query pattern , by this index we can able to retrieve the data faster, and we make this index adjust itself when the user query pattern change.

2008

13

ITJDM13

C-TREND: Temporal Cluster Graphs for Identifying and Visualizing Trends in Multiattribute Transactional Data.

We present our temporal clustering-based technique, discuss its algorithmic implementation and performance, demonstrate applications of the technique by analyzing the data in share market.

2008

14

ITJDM14

A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative data’s.

We propose a signature-based indexing method to optimize the storage and retrieval of a relative data’s from the large database.

2008

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJNS01

SAT-Solving Approaches to Context-Aware Enterprise Network Security Management

In this project an approach based on Boolean Satisfiability Solving (SAT Solving) that can reason about attacks, usability requirements, cost of actions, etc. in a unified, logical framework.

2009

2

ITJNS02

Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach

In this project Location Guard—a location hiding technique for securing overlay file storage systems from targeted file attacks

2009

3

ITJNS03

A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

In this project a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate With each other?

2009

4

ITJNS04

Efficient Node Admission and Certificate less Secure Communication in Short-Lived MANETs

This project, we focus on a common type of MANET that is formed on a temporary basis, and present a secure, efficient, and a fully no interactive admission technique geared for this type of a network.

2009

5

ITJNS05

Dynamic Routing with Security Considerations.

In this project a dynamic routing algorithm that could randomize delivery paths for data transmission.

2009

6

ITJNS06

A Precise Termination Condition Of The Probabilistic Packet Marking Algorithm

The probabilistic packet marking (PPM) algorithm is a promising way to discover the Internet map or an attack graph that the attack packets traversed during a distributed denial-of-service attack.

2008

7

ITJNS07

Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries.

Content services such as content filtering and transcoding adapt contents to meet system requirements, display capacities, or user preferences

2008

8

ITJNS08

Security in Large Networks Using Mediator Protocols

This project presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography

2007

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJSW01

Maturing Software Engineering Knowledge through Classifications: A Case Study on Unit Testing Techniques

In this project we are providing a systematic description of the techniques and testing techniques by studying the relationships among techniques

2009

2

ITJSW02

Carving and Replaying Differential Unit Test Cases from System Test Cases

In this paper, we show that DUTs retain some of the advantages of unit tests, can be automatically generated, and have the potential for revealing faults related to intricate system executions

2009

3

ITJSW03

Atomicity Analysis of Service Composition across Organizations

In this paper, our framework enables the analysis of the atomicity sphere for service compositions using these public views instead of their backend processes

2009

4

ITJSW04

Engineering Privacy

In this paper, we integrate insights from diverse islands of research on electronic privacy to offer a holistic view of privacy engineering and a systematic structure for the discipline’s topics.

2009

5

ITJSW05

Optimized Resource Allocation for Software Release Planning

In the context of release planning, the question studied in this paper is how to allocate these resources to the tasks of implementing the features such that the value gained from the released features is maximized

2009

6

ITJSW06

Using the Conceptual Cohesion of Classes for Fault Prediction in Object-Oriented Systems

In this paper presents the principles and the technology that stand behind the C3 measure. A large case study on three open source software systems is presented which compares the new measure with an extensive set of

existing metrics and uses them to construct models that predict software faults

2008

7

ITJSW07

Call-Stack Coverage for GUI Test Suite Reduction

In this paper we proposed System unstructural information is retrieved from the source code like comments and identifiers.

2008

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON IMAGE PROCESSING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJIM01

PCA-Based Spatially Adaptive Denoising of CFA Images for Single-Sensor Digital Cameras

In this project a principle component analysis (PCA) based spatially-adaptive denoising algorithm, which works directly on the CFA data using a supporting window to analyze the local image statistics.

2009

2

ITJIM02

A No-Reference Objective Image Sharpness Metric

Based on the Notion of Just Noticeable Blur (JNB)

This work presents a perceptual-based no-reference objective image sharpness/blurriness metric by integrating the concept of just noticeable blur into a probability summation model.

2009

3

ITJIM03

Bayesian Image Recovery for Dendritic Structures Under Low Signal-to-Noise Conditions

In this project, we present a Bayesian approach for estimating the neuronal shape given low-SNR observations.

2009

4

ITJIM04

Empirical Capacity of a Recognition Channel for Single- and Multipose Object Recognition Under the Constraint of PCA Encoding

In this project, we evaluate

the empirical recognition capacity of PCA-based object recognition systems. The encoded data (templates) and the additive noise in query templates are modeled to be Gaussian distributed with zero mean and estimated variances.

2009

5

ITJIM05

High-Fidelity Data Embedding for Image Annotation.

In this project,a visual perception model that aims at quantifying the local tolerance to noise for arbitrary imagery.

2009

6

ITJIM06

Image Restoration Using Space Variant Gaussian Scale Mixtures in Over complete Pyramids

In this project, we present an enhancement of the model by introducing a coarser adaptation level, where a larger neighborhood is used to estimate the local signal covariance within every sub band.

2008

7

ITJIM07

Incremental Learning of Chunk Data for Online Pattern Classification Systems

In This project ,a pattern classification system in which feature extraction and classifier learning are simultaneously carried out not only online but also in one pass where training samples are presented only once

2008

8

ITJIM08

Nonnegative Matrix actorization in Polynomial Feature Space

In this project, we propose a generalization of the NMF algorithm by translating the objective function into a Hilbert space (also called feature space) under nonnegativity constraints.

2008

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS MOBILE COMPUTING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1.

ITJMC01

Message Authentication in Computationally Constrained Environments

In this Project RFID and Wireless Sensor Networks exemplify computationally constrained environments, where the compact nature of the components cannot support complex computations or high communication overhead.

2009

2.

ITJMC02

Wardrop Routing in Wireless Networks

In this project Routing protocols for multihop wireless networks have traditionally used shortest path routing to obtain paths to destinations and do not consider traffic load or delay as an explicit factor in the choice of routes

2009

3.

ITJMC03

A Tabu Search Algorithm for Cluster Building in Wireless Sensor Networks

In this project The main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data

from sensor nodes.

2009

4

ITJMC04

Efficient Broadcasting in Mobile Ad Hoc Networks

In our project two efficient broadcasting algorithms based on 1-hop neighbor information. In the first part of the paper, we consider sender-based broadcasting algorithms, specifically the algorithm proposed by Liu et al.

2009

5

ITJMC05

Headlight Prefetching and Dynamic Chaining for Cooperative Media Streaming in Mobile Environments

In this project our goal is to Sharing audio and video resources between Media environments

2009

6.

ITJMC06

Location-Based Spatial Query Processing In Wireless Broadcast Environments

In this project Our approach is based on peer-to-peer sharing, which enables us to process queries without delay at a mobile host by using query results cached in its neighboring mobile peers

2008

7.

ITJMC07

Mitigating Performance Degradation In Congested Sensor Network

In this project We propose a class of algorithms that enforce differentiated routing based on the congested areas of a network and data priority.

2008

TECHNOLOGY: JAVA

DOMAIN: IEEE TRANSACTIONS ON GRID COMPUTING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJGC01

Bi-Criteria Scheduling of Scientific Grid Workflows

In this project we propose a new bi-criteria scheduling specification method defining for the secondary criterion a sliding constraint as a function of the primary criterion.

2009

2

ITJGC02

Eight Times Acceleration of Geospatial Data Archiving and Distribution on the Grids

In this project a grid-powered Web Geographical Information Science

(GIS)/Web Processing Service (WPS) system has been developed

for archiving and distributing large volumes of geospatial data.

2009

3

ITJGC03

TCP Performance in Flow-Based Mix Networks: Modeling and Analysis

In this project, we systematically address TCP performance issues of flow-based mix networks. A mix’s batching and reordering schemes can dramatically reduce TCP throughput due to out-of-order packet delivery

2009

4

ITJGC04

Cooperative Secondary Authorization Recycling

In this project we propose an approach where each application server recycles previously received

authorizations and shares them with other application servers to mask authorization server failures and network delays

2009

5

ITJGC05

Adaptive Task Check pointing and Replication: Toward Efficient Fault-Tolerant Grids.

In this project we introduce several heuristics that dynamically adapt to various parameters based on information on grid status to provide high job throughput in the presence of failure while reducing the system overhead

2009

TECHNOLOGY: JAVA

S:NO

PROJECT

CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJMM01

Segmentation-Driven Image Fusion Based on Alpha-Stable Modeling of Wavelet Coefficients

In this project, A novel region-based image fusion framework based on multiscale image segmentation and statistical feature extraction is proposed

2009

2

ITJMM02

Structured Network Coding and Cooperative Wireless Ad-Hoc Peer-to-Peer Repair

for WWAN Video Broadcast

In this project, we propose a network-coding-based cooperative repair framework for the ad-hoc peer group to improve broadcast video quality during channel losses.

2009

3

ITJMM03

Unseen Visible Watermarking: A Novel Methodology for Auxiliary Information Delivery via Visual Contents

In this project, a novel data hiding scheme, denoted as unseen visible watermarking (UVW), is proposed. In UVW schemes, hidden information can be embedded covertly and then directly extracted using the human visual system as long as appropriate operations are performed.

2009

DOMAIN: IEEE TRANSACTIONS ON MULTIMEDIA

4

ITJMM04

Investigating the Scheduling Sensitivity of P2P Video Streaming: An Experimental Study

In this project, we see several representative P2P streaming designs, ranging from theoretically proved optimal designs to straightforward “naive” designs.

2009

5

ITJMM05

Using Visual Context and Region Semantics for High-Level Concept Detection

In this project, we investigate detection of high-level concepts in multimedia content through an integrated approach of visual thesaurus analysis and visual context.

2009

TECHNOLOGY: JAVA

DOMAIN: NON-IEEE BASED PROJECTS

S.NO

PROJECT CODE

DOMAIN

PROJECT TITLES

DESCRIPCTION

1

JPEE01

Software eng

On-Line Java Compiler with Security Editor

This project will Compile and run the java program in on-Line.

2

JPEE02

Networking

Client Server Communication Using Multi-Tasking-Sockets

This project is of client server communication with multi tasking sockets.

3

JPEE03

Network Security

Bit-Plane Complexity Segmentation Steganography in Internet

Steganography is a technique to hide secret information in some other data without leaving any apparent evidence of data alteration. This new Steganography uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel.

4

JPEE04

Networking

Self-Interested Routing in Online Environments

To evaluate the performance of selfish routing based on realistic topologies and traffic demands. Such performance benefit comes at the expense of significantly increased congestion.

5

JPEE05

Network Security

Data transmission using Implicit and Explicit Quantum Cryptography

This project is used to provide authenticated secure communication between sender and receiver

6

JPEE06

Networking

Video streaming in multiple system

This project is about transmitting video between system using multi sockets in java.

7

JPEE07

Networking

Data Transmit ion Using RMI

In this project, evaluate the performance by transferring different types of files such as text, image and video using different methods.

8

JPEE08

Networking

Data Management System Using Proxies

In this project, the details of the organization are managed with net enabled technologies. The entire details of the organization like branch details, employee details, job scheduling are maintained using distributed computing technologies

9

JPEE09

Networking

Efficient data Transferring Using TCP/IP

Service prioritization among different traffic classes is an important goal for the Internet. Consider the existing best-effort class as the low-priority class, and attempt to develop mechanisms that provide “better-than-best-effort” service.

10

JPEE10

Network Security

Data Security using Cryptography and Steganography

This project ensures the privacy of the communication between two parties. It uses Audio file Steganography.

J2EE

TECHNOLOGY: J2EE

DOMAIN: IEEE TRANSACTIONS

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITJ2EE01

Clustering and Sequential Pattern Mining of Online Collaborative Learning Data

The goal is to enable the groups and their facilitators to see relevant aspects of the group’s operation and provide feedbacks if these are more likely to be associated with positive or negative outcomes and indicate where the problems are.

2009

2

ITJ2EE02

Effect of Contact Information on the Credibility of Online

Health Information

This study analyzed the effects of publisher contact information on the credibility of online health information.

2009

3

ITJ2EE03

Enterprise Ontologies for Planning and Integration of

Business: A Pragmatic Approach

This project describes an approach to build and use EOs for information system (IS) planning and integration projects with particular focus

on real-life eBusiness applications.

2009

4

ITJ2EE04

A Semantically Enriched Clinical Guideline Model Enabling Deployment in Heterogeneous Healthcare Environments

In this project, we provide machine-processable mechanisms that express the semantics of clinical guideline interfaces so that automated processes can be used to access the clinical resources for Guideline deployment and execution.

2009

5

ITJ2EE05

Improving Personalization Solutions through Optimal Segmentation of Customer Bases

In this project, We present a direct grouping-based approach to computing customer segments that groups customers not based on computed statistics.

2009

6

ITJ2EE06

RFID-Enabled Discovery of Supply Networks

This paper aims at providing an innovative solution for organizations to discover their supply networks

2009

7

ITJ2EE07

An Efficient and Effective Personalized Recommender System of TV Programs

The proposed hybrid approach(combining content-filtering techniques with those based on collaborative filtering) also provides all typical advantages of any social network as comments, tagging, ratings, etc.

2009

8

ITJ2EE08

Guest Editors’ Introduction: Knowledge and Data Engineering for E-Learning

The rapid development of Web-based learning and new concepts like virtual classrooms, virtual laboratories, and virtual universities introduces many new issues to be addressed..

2009

9

ITJ2EE09

The Strategic Implications of Web Technologies: A Process Model of How Web Technologies Enhance Organizational Performance

In this project, A theoretical lens is constructed from five core logics in organizational literature that represent the different possible ways of enhancing organizational Performance.

2009

10

ITJ2EE10

WADA Service: An Extension of DICOM WADO Service

The proposed Web Access to DICOM Archives (WADA) service, as opposed to WADO, also includes an extra internal query mechanism and support of medical reports submission.

2009

TECHNOLOGY: J2EE

DOMAIN: NON-IEEE BASED PROJECTS

S.NO

PROJECT CODE

DOMAIN

PROJECT TITLES

DESCRIPTION

1

J2PEE01

Web application

Examination Result Management System

This project is developed for college students to view their semester results and to maintain their information

2

J2PEE02

Web application

Global Web Rating

This project holds the rating procedure of the website.

3

J2PEE03

Web application

Online Employment Scheme

This project is to maintain the information for job seekers.

4

J2PEE04

Web application

Online Application Test For Agent

In this project we proposed an agent based approach for web testing.

5

J2PEE05

Web application

Online Share Trading

In this project we maintain the Share information with the particular share information and the all share details.

6

J2PEE06

Web application

Online Examination for Recruitment process

In this project, Online examination is the process of conducting the exam through online. This web application

7

J2PEE07

Web application

Online Insurance Management System

In this project, Online insurance is web application which is used to tracking the details About insurance policy, customer details and company details.

8

J2PEE08

Web application

Computer Purchase Expert

In this project, the details of the computer peripherals are stored by the vendors for customer reference

9

J2PEE09

Web application

Online Auction And Time Bid Watching

In this project, the user purchase the product based on the auction

10

J2PEE10

Web application

Attraction of customers using Customer relationship management

In this project we collect customer details in order to improve the relation ship between customer and seller.

DOTNET

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON NETWORKING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDNW01

Sharing Memory between Byzantine Processes Using Policy-Enforced Tuple Spaces

The constructions presented in this paper (consensus and universal objects) demonstrate that this approach allows the development of simple delegant algorithms, at the cost of defining access policies for the shared memory objects they use.

2009

2

ITDNW02

Histogram-Based Global Load Balancing in Structured Peer-to-Peer Systems

This project explains load balancing in networks.

1. Maintaining the load information.

2. Redistributing the load if it exceeds the limit.

2009

3

ITDNW03

A Trace-Driven Approach to Evaluate the Scalability of P2P-Based Video-on-Demand Service

This model proposes improving the scalability of video-on-demand service over Internet by analyzing user behavior.

2009

4

ITDNW04

Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks

This project proposes trusted and secured peer to peer application, shortens the search time, reduces the memory requirement, and enhances the chaining accuracy in scalable P2P networks.

2009

5

ITDNW05

Reputation-based Resource Allocation in P2P Systems of Rational Users

In this project, File uploading and downloading in peers through backbone network can be done using this project.

2009

6

ITDNW06

Effect of Network Quality on Player Departure Behavior in Online Games

In this project improves network quality on player departure behavior in online games

2009

7

ITDNW07

A Parameterized Approach to Spam-Resilient Link Analysis of the Web

This paper propose ranking of url based on counting total no. visitors online on the url& counting total no. visitors on the application

2009

8

ITDNW08

On the Time Synchronization of Distributed Log Files in Networks With Local Broadcast Media

Computer networks typically contain a set of log files; these clocks are not perfectly accurate and deviate from each other. The project introduces Clock deviations and event time, can be estimated with very high accuracy, without introducing any additional traffic in the network.

2009

9

ITDNW09

Measuring Capacity Bandwidth of Targeted Path Segments

In this project we are measuring the capacity of network bandwidth using

1. Single packet probing method.

2. Packet bunch probing method.

3.Uniform packet-pair probing method.

4. Non-Uniform packet pair Probing method.

2009

10

ITDNW10

A Distributed Algorithm for Finding All Best Swap Edges

of a Minimum Diameter Spanning Tree

In this project, We propose a distributed algorithm that efficiently computes all of these swap links, and explain how to route messages across swap edges with a compact routing scheme. Finally, the computation of swap edges in an arbitrary spanning tree, where swap edges are chosen to minimize the time required to adapt routing in case of a failure, and give efficient distributed algorithms for two variants of this problem.

2009

11

ITDNW11

Effective Collaboration with Information Sharing in Virtual Universities

This paper aims to build a new rule-based framework to identify and address issues of sharing in virtual university environments through role-based access control (RBAC) management for e-learning systems

2009

12

ITDNW12

Node-Capability-Aware Replica Management for Peer-to-Peer Grids

In this project, We propose a concept called Virat, a node-capability-aware P2P middleware for managing replicas in Large-scale unstructured Peer-to-peer (P2P) systems.

2009

13

ITDNW13

The Globus Replica Location Service: Design and Experience

This Project proposes Replica Location Service (RLS) offers a mechanism to maintain and provide information about physical locations of replicas in network.

2009

14

ITDNW14

Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple Packet Transmission

In this paper, we consider using simultaneous Multiple Packet Transmission (MPT) to improve the downlink performance of Networks. The sender can send two compatible packets simultaneously to two distinct receivers

2009

15

ITDNW15

Network-Coding-Based Signal Recovery for Efficient Scheduling in Wireless Networks

In this paper, We propose some practical schemes to recover the useful signal from the collided signals for different types of wireless channels; thus, The throughput and network efficiency can greatly be increased. The proposed schemes are based on the network coding technique and performed on the physical layer

2009

16

ITDNW16

Probabilistic Packet Marking for Large-Scale IP Trace back

This project is to send message fragments in a way that is highly scalable. Checksum algorithm is using here. By this checksum, can find the data loss.

2008

17

ITDNW17

Efficient Broadcasting using Store-mix- forward Method

In this project we maintain a low energy efficiency broadcasting in all-all communication used to improve the performance of data broadcasting

2008

18

ITDNW18

Incentive-Based Scheduling for Market-Like Computational Grids

In this project main objective is to provide incentive for both consumer and provider which intern help both of them to play a vital role in market like computational grid.

2008

19

ITDNW19

Rateless Forward Error Correction for Topology-Transparent Scheduling

In this project we are going to find active and inactive systems in the network finally send data to active system using rate less forward error correction

2008

20

ITDNW20

Minimizing File Download Time in Stochastic Peer-to-Peer Networks

In this project we minimize the download time of a file by splitting into too many parts and storing in different servers.

2008

21

ITDNW21

Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data

In this project we reduce the traffic created in the network by not allowing the bigger files and setup files to transfer.

2008

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON DATA MINING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDDM01

Optimal Lot Sizing Policies for Sequential Online Auctions

This project is to Reduce lots (number of items) sizes for online selling or buying.

2009

2

ITDDM02

Monitoring Online Tests through Data Visualization

This project is to monitor learner’s behavior through an online test through graphical representation.

2009

3

ITDDM03

Distributional Features for Text Categorization

This project is to categorize the text in a document by using compactness based features and distributional features.

2009

4

ITDDM04

Communities and Emerging Semantics in Semantic Link Network: Discovery and Learning

This project explains use of the semantic communities and the emerging semantic relations in a dynamic complex network of learning resources

2009

5

ITDDM05

Storing and Indexing Spatial Data in P2P Systems

This project is to store and share the spatial information in P2P Systems.

2009

6

ITDDM06

Detecting, Assessing, and Monitoring Relevant

Topics in Virtual Information Environments

This Project is to assess the relevance of topics and related sources in information-rich environments.

2009

7

ITDDM07

Mood Recognition during Online Self-Assessment Tests

This Project illustrates how learner mood may be predicted during online self-assessment tests

2009

8

ITDDM08

Predicting Missing Items in Shopping Carts

This project is to predict the missing items in a shopping cart using DS Theory

2009

9

ITDDM09

Rough Cluster Quality Index Based on Decision Theory

This Project is to identify the clusters quality using indices based on decision theory.

2009

10

ITDDM10

Ranking and Suggesting Popular Items

This Project is to efficiently learn the popularity of items and suggest popular items to users by ranking

2009

11

ITDDM11

A Cost-Based Approach to Adaptive Resource Management in Data Stream Systems

In this project, we investigate an approach to adaptive resource management for continuous sliding window queries that adjusts window sizes and time granularities to keep resource usage within bounds.

2008

12

ITDDM12

Watermarking Relational Databases Using Optimization-Based Techniques.

In this project three techniques are used that altogether used to detect, determine and trace-back data leaks.

2008

13

ITDDM13

Rough sets-based search engine for grid service discovery

In this project we create web services and manipulate it also we search the web services using related and un related sets.

2008

14

ITDDM14

Analyzing and Managing Role-Based Access Control Policies.

In this project we analyze and manage role-based access control policies individually to increase efficiency of management system.

2008

15

ITDDM15

Hardware-Enhanced Association Rule Mining
with Hashing and Pipelining

Project proposes a Hash-based and Pipelined architecture for hardware-enhanced association rule mining.

2008

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON NETWORK SECURITY

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDNS01

Enhanced Security for Online Exams Using Group Cryptography.

This project proposes enhanced secure online exam management environment mediated by group cryptography using remote monitoring and control of ports.

2009

2

ITDNS02

The Effectiveness of Checksums for Embedded Control Networks.

This project is to detect data transmission errors by using checksum computations and Embedded Control Networks.

2009

3

ITDNS03

Internet and Online Information Privacy: An Exploratory Study of Preteens and Early Teens.

In this project, we explored private-information-sharing Behavior of preteen and early teen internet users by Social Cognitive Theory and Protection Motivation Theory.

2009

4

ITDNS04

A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors.

This project is to achieve early attack detection and filtering for the application layer-based DDOS attack by using extended Hidden semi-Markov model.

2009

5

ITDNS05

A Secure Mobile Healthcare System using Trust-Based Multicast Scheme.

This project shows about the technique of trust evaluation without a centralized trust management authority and propose a trust evaluation model that can efficiently calculate the trustworthiness of mobile healthcare.

2009

6

ITDNS06

Credit Card Fraud Detection Using Hidden Markov Model.

In this project we are going to find the fraud in the credit card through hidden markov model.

2008

7

ITDNS07

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting

In this project data’s are organized and encrypted using symmetric key algorithms according to predefined time periods and user privileges and then broadcast to users.

2008

8

ITDNS08

SSL Backend Forwarding scheme in Cluster-Based Web Servers

In this project, data can encrypt from server and store in multiple system. Encrypted data can download from in decrypted form. This will reduce the load of the server while the server is being busy. These are the advantages of our proposed system.

2007

9

ITDNS09

Efficient Approximate Query Processing In Peer-to-Peer Networks

This project is to perform all the queries in a network. Two phase sampling is a key factor here. We then retrieve certain information from the visited peers, such as the number of tuples, the aggregate of tuples (for example, SUM, COUNT, AVG, and so forth) that satisfy the selection condition, and send this information back to the query node.

2007

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON SOFTWARE ENGINEERING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDSW01

Variability and Reproducibility in Software Engineering: A Study of Four Companies that Developed the Same System

This paper proposes increasing Reproducibility and Quality in Software product

2009

2

ITDSW02

What Types of Defects Are Really Discovered in Code Reviews?

This Project, Detecting code evolvability defects using code review is included in this project.

2009

3

ITDSW03

An Investigation into the Functional Form of the Size-Defect Relationship for Software Modules

This Project, Analyze class level size and defect proneness in software Modules

2009

4

ITDSW04

Predicting Project Velocity in XP Using a Learning Dynamic Bayesian Network Model

This Project, Accurate prediction and risk assessment in XP using Bayesian Network Model

2009

5

ITDSW05

Development of a Software Engineering Ontology for Multisite Software Development

This project develops the ontology model to recover knowledge

2009

6

ITDSW06

Semantics-Based Design for Secure Web Services

In this project we introduce a cryptography designing and verifying the security policies of service oriented applications.

2008

7

ITDSW07

The Effect of Pairs in Program Design Tasks

In this project efficiency of pairs in program design tasks is identified by using pair programming concept. Pair programming involves two developers simultaneously collaborating with each other on the same programming task to design and code a solution.

2008

8

ITDSW08

A Realistic Empirical Evaluation of the Costs And Benefits of UML in Software Maintenance

In this project we provide very clear insights in terms of the kinds of (minimum) benefits that can be expected from using UML and the factors limiting or boosting such benefits

2008

9

ITDSW09

Effective Software Merging in the Presence of Object-Oriented refractoriness

In this project we include C# supported files and it can be merged and replaced using re-factoring method.

2008

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON IMAGE PROCESSING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDIP01

Gradient Estimation Using Wide Support Operators

This Project proposes Removing noise from picture by detecting edges.

2009

3

ITDIP03

Sharpening Dermatological Color Images in the Wavelet Domain

This Project proposes Finding boundaries in the image and Adaptive image demising.

2009

4

ITDIP04

Interpolation Artifacts in Sub-Pixel Image Registration

In this Project, we Comparing two images by image pixel by pixels.

2009

5

ITDIP05

Continuous Glass Patterns for Painterly Rendering.

In this Project, We are Converting digital photograph into painting image.

2009

6

ITDIP06

Active Learning Methods for Interactive Image Retrieval

In this project, we search a image with respect to RGB combination and the difference is plotted in a graph.

2008

7

ITDIP07

Detection and removal of cracks and in digitized paintings

In this proposed project, system involves exact crack detection and filling procedure. It involves top-hat transformation, region-growing algorithm (grassfire algorithm) and median filter procedures.

2007

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS MOBILE COMPUTING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDMC01

Overlapped Carrier-Sense Multiple Access (OCSMA) in Wireless Ad Hoc Networks

Project proposed for enhancing network throughput through transferring content to station (source to destination) is done by transferring data through nearby nodes.

2009

2

ITDMC02

Information Density Estimation for Content Retrieval in MANETs

Project proposed mobile nodes sharing information without intervention of servers.

2009

3

ITDMC03

Two-Factor User Authentication in Wireless Sensor Networks

In this project, Accessing the data using two-factor user authentication and session key in web.

2009

4

ITDMC04

Consistency Management Strategies for Data

Replication in Mobile Ad Hoc Networks

This Project Replication of data to region to region if user moves to corresponding region is proposed in this project.

2009

5

ITDMC05

Signaling for Multimedia Conferencing in Stand-Alone Mobile Ad Hoc Networks

This Project, Passing data through invitation of neighboring nodes and an algorithm proposed for the same.

2009

6

ITDMC06

Benefit based Data caching in Ad hoc Networks.

This project, proposes to improve the efficiency of information access in a wireless ad hoc network by reducing the access latency and bandwidth usage.

2008

7

ITDMC07

A Self-Repairing Tree Topology Enabling Content-Based Routing in Mobile Ad Hoc Networks

This project, proposes to improve the efficiency of the CBR network by minimize the number of routers.

2008

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON GRID COMPUTING

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDGC01

Shortest Path Tree Computation in Dynamic Graphs

This project is to evaluate performance, in terms of both the CPU execution time and the total number of operations. We also compared them with the well-known static algorithm Dijkstra and to determine the best algorithms for different graph Sizes and for various mixes of modified edges.

2009

2

ITDGC02

An Ant Colony Optimization Approach to a Grid Workflow Scheduling Problem With Various QoS Requirements.

This project aims at proposing an ant colony optimization (ACO) algorithm to schedule large-scale workflows with various QoS parameters. This algorithm enables users to specify their QoS preferences as well as define the minimum QoS thresholds for a certain application.

2009

3

ITDGC03

Mirador: A Simple Fast Search Interface for Global Remote Sensing Data Sets

This Project, provide free-text (FT) search in the general domain led the Goddard Earth Sciences Data and Information Services Center to develop an FT search interface named Mirador that supports space–time queries, including a gazetteer and geophysical event gazetteer.

2009

4

ITDGC04

Fusion of Multispectral and Panchromatic Images Using a Restoration-Based Method

This project, proposes an image fusion algorithm based on image restoration is proposed to combine multispectral and panchromatic images. For remote-sensing satellites, the wavelength of the panchromatic band usually covers the wavelengths of the multispectral bands.

2009

5

ITDGC05

Data Flow and Workflow Organization—The Data Management for the TerraSAR-X Payload Ground Segment

This project, investigates features of the TerraSAR-X PGS that enable the reuse in a multimission environment. It summarizes the achieved enhancements and extensions of DIMS to support the TerraSAR-X mission.

2009

TECHNOLOGY: DOTNET

DOMAIN: IEEE TRANSACTIONS ON MULTIMEDIA

S.NO

PROJECT CODE

PROJECT TITLES

DESCRIPTION

YEAR

1

ITDMM01

Performance Analysis for Overlay Multimedia Multicast on r-ary Tree and m-D Mesh Topologies

This Project, Sending binary information to multicast network and find out average, worst, best performance.

2009

2

ITDMM02

Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks

This Project, Splitting the videos into so many chunks and Sending video files based on the chuck request and response.

2009

3

ITDMM03

WMA: A Marking-Based Synchronized Multimedia Tutoring System for English Composition Studies

This Project, Typing words based on the admin voice.

2009

4

ITDMM04

Automated Bidding for Media Services at the Edge of a Content Delivery Network

This Project, Downloading and transmitting data’s depending on user accounts.

2009

5

ITDMM05

Content-Based Attention Ranking Using Visual and Contextual Attention Model for Baseball Videos

This Project, Ranking of multimedia files depends on the user interest and feedback.

2009

6

ITDMM06

Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High- Capacity Approach

In this project a picture given as input and a text is embedded by encrypting and decrypting the picture to get the appropriate image

2008

7

ITDMM07

A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video

In this project various images are displayed on clicking the respective image we get the appropriate videos with respect to that image.

2008

8

ITDMM08

Video Annotation Based on Kernel Linear Neighborhood Propagation

In this project a description about the video is stored in the database. When the video runs the corresponding description runs below the video.

2008

9

ITDMM09

High resolution Animated Scenes from Stills

In this project a scene animation system that can easily generate a video or video texture from a small collection of stills.

2007

TECHNOLOGY: DOTNET

DOMAIN: NON-IEEE BASED PROJECTS

S.NO

PROJECT CODE

DOMAIN

TITLE

DESCRIPTION

1

DPEE01

Network Security

A Secure Communication Network Protocol

This project mainly provides Security for the users in a website by using Encryption and Decryption process. And Key byte is generated without user interaction.

2

DPEE02

Networking

Distributed Flow Monitoring tool

The project aims at distributing the processes to various machines processors in the network. It contains both server and client applications. When the client starts running; the processor name is stored in the database. The server application checks and updates the client list in its application continuously.

3

DPEE03

Data Mining

The rapeutic Management System

In this project, we decided to develop a MEDICAL MANAGEMENT SYSTEM to ease the operation. This system is required which is being capable of elimination of all the problems and become useful common both to patient, hospital and the doctors

4

DPEE04

Network Security

Insurance Design And Development Of Unemployment Insurance

This project shows how the delivered solution will meet the business and technical needs of the Unemployment Insurance (UI) Program, both now and in the future.

5

DPEE05

Networking

E-book supervision and management

In this project, readers can access website very effectively. Site only contains what the reader wish to see. This website can attract more readers and can serve an effective reading.

6

DPEE06

Software engineering

Development of a Campaign Information System

This Project shows how best to interpret and retrieve information over land from the eventual Systems, the campaigns also provided a glimpse of the future applications that would lead to a better understanding of our environment.

.

7

DPEE07

Networking

Contemporary approach for Group Discussion in Intranet

This project included a system which required being capable of eliminating all the problems and become useful to users and thus the new system is derived. Here we get a different view from different users by the group discussion.

8

DPEE08

Networking

Hierarchical promotion judgment system

In this project we can create new idea on Multi level marketing.

Each Person (Tree Node) can have two sub-nodes (person) only. At last you should pay the Joining fees to the Admin. After registering he can able to shop the product. An Admin have the rights to view all the customer profile, Commission details, Customer Performance, and Send money to customer and manage the every activity behind the marketing

9

DPEE09

Network Security

Patron complaints Maintaining scheme

In this project customer complaints are queried through logging their phone calls and assigning the complaints to service engineers. The project contains administrator and service engineer modules.

10

DPEE10

Network Security

Computerized Banking Sector

This project involves computerized transactions through the private intranet solution through the Internet. The administrator enters all the branch details and provides username and password to the respective branches. The staffs in the respective branch enter the account creation details through their logins.

11

DPEE11

Data Mining

Web census System

This project handles the rating process of the website. There are so many websites around the world which distribute the information given by their owners. It is an effective and easy way to reach the information to the people. There are different types of websites and their pages are with attractive information and design.

12

DPEE12

Data Mining

Share Marketing Review

In this project, we enhanced a market risk system to cover equity derivatives. Pricing risk exposure was reduced by introducing common data and analytics for the front and middle office. This system used a genetic algorithm to generate thousands of trading strategies and simulated profit and loss under multiple constraints.

13

DPEE13

Data Mining

Virtual knowledge sharing

In this project we are going to analyze Grid computing and identify its requirements for knowledge management, this has six problems in knowledge life cycle. That is acquiring, modeling, retrieving, reusing, publishing, and maintaining knowledge. And we are going to develop a website to solve these problems.

14

DPEE14

Networking

Dispensary of hope from electronic communication

This project Provides an integrated Solution for the Hospital, which Helps in Efficient Management of the Hospital, Enhance Patient Care, Improve work efficiency, Improve Fiscal Control Information.

15

DPEE15

Network security

Intelligent transport system

This project is to have a better understanding of the operation in container haulage industry as a transport as it will be the dynamic sector of the 21st century. Sophisticated automobile and freeway System is a user functions for Intelligent Transport System (ITS). The System Development Life Cycle (SDLC) is the chosen method for this project

16

DPEE16

Data mining

A scheme of vendor capital fund and Indian economy

In this project the objective of this system is to assist financial analyst and related users to make company’s financial analysis according to their financial statements using computer system approaches. Trial Balance, Balance Sheet and Income Statement will be displayed for reference.

17

DPEE17

Network Security

Essential Business Sever Administration

This project maintains information about students, their details from address to result. The time has Task durations, dependencies, and critical path. The scope has Project size, goals and requirements.

18

DPEE18

Data mining

Economic and financial forecast model

This project helps to generate processed data including an illustration representing the life insurance contract encumbered by an indenture agreement as a means of refunding for future employee benefits.

19

DPEE19

data mining

Modern architecture for exam results

This project is a pilot study on how the client/server system operates. The distributed Examination Result Information System will allow students to write the exam by registering and to view their respective exam result from any workstation in the network.

20

DPEE20

networking

System observer and organizer in a Connected network

This project is route observer and organizer for both home and far-off machinery. This set the maximum instance per day. To protect the system in run time error, we need to set the time for closing the process. So in this time we need for proposed system.


Hyderabad: ESI (S.R NAGAR), First Floor, St Theresa’s Church Compound,Opp:Rythu Bazaar

Vijayawada: 2nd Floor, Sailok Complex Temple Street, M.G Road, Labbipet

Ph: 9397931234, 9703106913

5 comments:

"Atomicity Analysis of Service Composition
across Organizations" This project is what kind of project i cant understand abstract,what is main them of this project,plz tell,i am wait for ur reply

plz send me the complete doc of
"OPTIMIZING THE THROUGHPUT OF DATA-DRIVEN PEER-TO-PEER STREAMING"
urgent plz.plz.plz

send the documentation for a decentralized method for scaling up genome similarity search services

Pl send d source code its really urgent im running out of time pl help me......
My id is shrivml10@gmail.com

brillant piece of information, I had come to know about your web-page from my friend hardkik, chennai,i have read atleast 9 posts of yours by now, and let me tell you, your webpage gives the best and the most interesting information. This is just the kind of information that i had been looking for, i'm already your rss reader now and i would regularly watch out for the new posts, once again hats off to you!
Thanx a million once again,
Regards,

M.Tech Projects