Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

B.

TECH PROJECTS LIST 2010


Knowledge and Data Engineering
Sl.No Project Title Year
1. Anonymous Query Processing in Road Networks 2010
2. Closing the Loop in Webpage Understanding 2010
3. Closeness: A New Privacy Measure for Data Publishing 2010
4. Deriving Concept-Based User Profiles from Search Engine Logs 2010
5. False Negative Problem of Counting Bloom Filter 2010
6. Filtering Data Streams for Entity-Based Continuous Queries 2010
7. Iso-Map: Energy-Efficient Contour Mapping in Wireless Sensor 2010
Networks
8. Incremental and General Evaluation of Reverse Nearest Neighbors 2010
9. Incremental Evaluation of Visible Nearest Neighbor Queries 2010
10. Logic-Based Pattern Discovery 2010
11. Learning with Positive and Unlabeled Examples Using Topic-Sensitive 2010
PLSA
12. LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme 2010
over DHTs
13. P2P Reputation Management Using Distributed Identities and 2010
Decentralized Recommendation Chains
14. Projective Distribution of XQuery with Updates 2010
15. Ranked Query Processing in Uncertain Databases 2010
16. Record Matching over Query Results from Multiple Web Databases 2010
17. The Dynamic Bloom Filters 2010
18. The Tiled Bitmap Forensic Analysis Algorithm 2010
19. Towards an Effective XML Keyword Search 2010
20. ViDE: A Vision-Based Approach for Deep Web Data Extraction 2010
21. XCDSearch: An XML Context-Driven Search Engine 2010
22. Interactive Correction And Recommendation For Computer Language 2009/.NET
Learning And Training
23. Learning Image-Text Associations 2009/.NET

1
B.TECH PROJECTS LIST 2010
24. A Relation-Based Page Rank Algorithm For Semantic Web Search 2009/.NET
Engines
25. English To Spanish Translation Of Signboard Images From Mobile 2009/.NET
Phone Camera
26. GLIP: A Concurrency Control Protocol For Clipping Indexing 2009/JAVA
27. Histogram-Based Global Load Balancing In Structured Peer-To-Peer 2009/JAVA
Systems
28. A Generic Local Algorithm For Mining Data Streams 2009/JAVA
29. Predicting Missing Items In Shopping Carts 2009/JAVA
30. Distributional Features For Text Categorization 2009/JAVA

Mobile Computing

2
B.TECH PROJECTS LIST 2010
Sl.No Project Title Year

3
B.TECH PROJECTS LIST 2010
1. A Scalable and Energy-Efficient Context Monitoring Framework for 2010
Mobile Personal Sensor Networks
2. A Multichannel Scheduler for High-Speed Wireless Backhaul Links 2010
with Packet Concatenation
3. BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop 2010
Wireless Networks
4. Distributed Localization Scheme for Mobile Sensor Networks 2010
5. Energy-Efficient Reprogramming of a Swarm of Mobile Sensors 2010
6. Energy-Efficient VoIP over Wireless LANs 2010/.NET
7. Efficient Load-Aware Routing Scheme for Wireless Mesh Networks 2010
8. Exploiting and Defending Opportunistic Scheduling in Cellular Data 2010
Networks
9. Fault-Tolerant Relay Node Placement in Heterogeneous WSN 2010
10. Joint Routing, Channel Assignment, and Scheduling for Throughput 2010
Maximization in General Interference Models
11. Local Barrier Coverage in Wireless Sensor Networks 2010
12. MABS: Multicast Authentication Based on Batch Signature 2010/JAVA
13. Maximizing the Lifetime of Wireless Sensor Networks with Mobile 2010
Sink in Delay-Tolerant Applications
14. Radio Tomographic Imaging with Wireless Networks 2010
15. Secure Data Collection in Wireless Sensor Networks Using 2010
Randomized Dispersive Routes
16. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless 2010
Sensor Networks
17. Message Authentication In Computationally Constrained Environment 2009/.NET
18. Biased Random Walks in Uniform Wireless Networks 2009/.NET
19. Energy Maps for Mobile Wireless Networks: Coherence Time versus 2009/.NET
Spreading Period
20. Greedy Routing with Anti-Void Traversal for WSN 2009/.NET
21. On the Security of Route Discovery in MANETs 2009/.NET
22. Route Stability in MANETs under the Random Direction Mobility 2009/.NET
Model

4
B.TECH PROJECTS LIST 2010
23. Multicasting With Localized Control In Wireless Ad Hoc Networks 2009/.NET
24. A Flexible Privacy-Enhanced Location-Based Services System 2009/.NET
Framework and Practice
25. Localized Sensor Area Coverage with Low Communication Overhead 2009/.NET
26. Efficient Resource Allocation For Wireless Multicast 2009/.NET
27. A Gen2 Based RFID Authentication Protocol for Security and Privacy 2009/.NET
28. Intrusion Detection In Homogeneous and Heterogeneous WSN 2009/JAVA
29. PDCS: Security And Privacy Support For Data-Centric Sensor 2009/JAVA
Networks
30. Efficient Broadcasting In Mobile Ad Hoc Networks 2009/JAVA
31. SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless 2009/JAVA
Mesh Networks

Networking
Sl.No Project Title Year
1. Always Acyclic Distributed Path Computation 2010
2. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual 2010

5
B.TECH PROJECTS LIST 2010
Authentication and Key Exchange in Mobile Communications
3. The Design Trade-Offs Of Bit-torrent-Like File Sharing Protocols 2009/.NET
4. Multiple Routing Configurations For Fast IP Network Recovery 2009/.NET
5. Resource Allocation in OFDMA Wireless Communications Systems 2009/.NET
Supporting Multimedia Services
6. Two Blocking Algorithms on Adaptive Binary Splitting: Single and Pair 2009/.NET
Resolutions for RFID Tag Identification
7. Analysis of Shortest Path Routing for Large Multi-Hop Wireless 2009/.NET
Networks
8. Aggregation With Fragment Retransmission For Very High-Speed 2009/.NET
WLANS
9. A Traffic Engineering Approach For Placement And Selection Of 2009/.NET
Network Services
10. A Distributed and Scalable Routing Table Manager 2009/.NET
11. Efficient Routing in Intermittently Connected Mobile Networks The 2009/.NET
Multiple copy Case
12. Monitoring the Application-Layer DDoS Attacks for Popular Websites 2009/JAVA
13. Capturing Router Congestion and Delay 2009/JAVA
14. Multiple Routing Configuration For Fast IP Network 2009/JAVA
Recovery(Networking)
15. Minimizing file downloading time in stochastic peer to peer 2009/JAVA
networks(Networking)

Dependable and Secure Computing


Sl.No Project Title Year
1. A Puzzle-Based Defense Strategy Against Flooding Attacks Using 2010/.NET
Game Theory

6
B.TECH PROJECTS LIST 2010
2. A Rigorous, Compositional, and Extensible Framework for Dynamic 2010
Fault Tree Analysis
3. A Survey on the Encryption of Convergecast Traffic with In-Network 2010/.NET
Processing
4. An Advanced Hybrid Peer-to-Peer Botnet 2010
5. Conformance Testing of Temporal Role-Based Access Control Systems 2010
6. Dual-Quorum: A Highly Available and Consistent Replication System 2010
for Edge Services
7. In-Depth Packet Inspection Using a Hierarchical Pattern Matching 2010
Algorithm
8. KTR: An Efficient Key Management Scheme for Secure Data Access 2010
Control in Wireless Broadcast Services
9. Layered Approach Using Conditional Random Fields for Intrusion 2010
Detection
10. On the Survivability of Wireless Ad Hoc Networks with Node 2010
Misbehaviors and Failures
11. On the Thermal Attack in Instruction Caches 2010
12. Opportunities in White-Box Cryptography 2010
13. Secure Data Objects Replication in Data Grid 2010
14. Shifting Inference Control to User Side: Architecture and Protocol 2010
15. SigFree: A Signature-Free Buffer Overflow Attack Blocker 2010
16. Using Web-Referral Architectures to Mitigate Denial-of-Service Threat 2010
17. The Effectiveness of Checksums for Embedded Control Networks 2009/.NET
18. Credit card fraud detection using hidden Markov model 2009/.NET
19. Evaluating the Vulnerability of Network Traffic Using Joint Security 2009/JAVA
and Routing Analysis
20. Flexible Rollback Recovery in Dynamic Heterogeneous Grid 2009/JAVA
Computing
Securit
21. Analysis of the SASI Protocol 2009/JAVA
22. Cryptanalysis Of A Generalized Ring Signature Scheme 2009/JAVA
23. Security In Open Source Web Content Management Systems 2009/JAVA

7
B.TECH PROJECTS LIST 2010

Software Engineering
Sl.No Project Title Year
1. A Framework for Programming Robust Context-Aware Applications 2010
2. An Experience in Testing the Security of Real-World Electronic Voting 2010
Systems
3. An Attack Surface Metric 2010

8
B.TECH PROJECTS LIST 2010
4. Better Debugging via Output Tracing and Callstack-Sensitive Slicing 2010
5. DECOR: A Method for the Specification and Detection of Code and 2010/.NET
Design Smells
6. Discovering Services during Service-Based System Design Using UML 2010/JAVA
7. Exception Handling Patterns for Process Modeling 2010/JAVA
8. Exception Handling for Repair in Service-Based Processes 2010
9. Learning Communicating Automata from MSCs 2010
10. Program Behavior Discovery and Verification: A Graph Grammar 2010
Approach
11. On Event-Based Middleware for Location-Aware Mobile Applications 2010
12. The Effects of Time Constraints on Test Case Prioritization: A Series of 2010
Controlled Experiments
13. Vulnerability Discovery with Attack Injection 2010
14. What Makes a Good Bug Report? 2010
15. A Modified Model for Private Data Security Facing E-commerce 2009/.NET
16. Optimized Resource Allocation For Software Release Planning 2009/.NET
17. NDT A Model-Driven Approach 2009/JAVA
18. CHARMY: A Framework for Designing and Verifying Architectural 2009/JAVA
Specifications

Parallel and Distributed Systems


Sl.No Project Title Year
1. Anchor-Free Localization through Flip-Error-Resistant Map Stitching in 2010
Wireless Sensor Network
2. A Dynamic Performance-Based Flow Control Method for High-Speed 2010
Data Transfer
3. A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer 2010

9
B.TECH PROJECTS LIST 2010
Systems
4. An ISP-Friendly File Distribution Protocol: Analysis, Design, and 2010
Implementation
5. An Analytical Approach to Optimizing Parallel Image 2010
Registration/Retrieval
6. Cooperative Secondary Authorization Recycling 2010
7. Detecting Application Denial-of-Service Attacks: A Group-Testing- 2010
Based Approach
8. Flexible Cache Consistency Maintenance over Wireless Ad Hoc 2010
Networks
9. Impact of Feature Reduction on the Efficiency of Wireless Intrusion 2010
Detection Systems
10. Improving Reliability for Application-Layer Multicast Overlays 2010
11. Optimal Resource Placement in Structured Peer-to-Peer Networks 2010
12. Predictable High Performance Computing using Feedback Control and 2010
Admission Control
13. Robust Load Delegation in Service Grid Environments 2010
14. Secure Synchronization of Periodic Updates in Ad Hoc Networks 2010
15. SocioNet: A Social-Based Multimedia Access System for Unstructured 2010
P2P Networks
16. Toward Systematical Data Scheduling for Layered Streaming in Peer- 2010
to-Peer Networks: Can We Go Farther?
17. pFusion: A P2P Architecture for Internet-Scale Content-Based Search 2009/.NET
and Retrieval
18. Dynamic routing with security considerations 2009/JAVA
19. FDPM: An IP Trace back system to find the real source of attacks 2009/JAVA
20. Distributed algorithms for constructing approximate minimum spanning 2009/JAVA
trees in WSN
21. Building Small-World Peer-to-Peer Networks Based on Hierarchical 2009/JAVA
Structures
22. Detecting Malicious Packet Losses 2009/JAVA
23. Dynamic Search Algorithm In Unstructured Peer-To-Peer Networks 2009/JAVA

10
B.TECH PROJECTS LIST 2010

Pattern Analysis and Machine Intelligence


Sl.No Project Title Year
1. Local-Learning-Based Feature Selection for High-Dimensional Data 2010
Analysis
2. Object Detection with Discriminatively Trained Part-Based Models 2010
3. Online Empirical Evaluation of Tracking Algorithms 2010
4. Range Flow in Varying Illumination: Algorithms and Comparisons 2010
5. Resolution Enhancement in Multi-Image Stereo 2010

11
B.TECH PROJECTS LIST 2010
6. Stereo Matching with Mumford-Shah Regularization and Occlusion 2010
Handling
7. Survey of Pedestrian Detection for Advanced Driver Assistance 2010
Systems
8. Adaptive Multi versioning for Open MP parallelization via machine 2009/.NET
Learning
9. Medical Data Mining Using BGA & RGA For Weighting Of Features 2009/JAVA
In Fuzzy K-NN Classification

Computers
Sl.No Project Title Year
1. A Novel Cryptoprocessor Architecture for the McEliece Public-Key 2010
Cryptosystem
2. A Study of k-Coverage and Measures of Connectivity in 3D WSN 2010
3. Adaptation of Reputation Management Systems to Dynamic Network 2010
Conditions in Ad Hoc Networks
4. Algorithmic Aspects of Hardware/Software Partitioning: 1D Search 2010
Algorithms

12
B.TECH PROJECTS LIST 2010
5. An Interleaving Structure for Guaranteed QoS in Real-Time 2010
Broadcasting Systems
6. An Optimal Encoding to Represent a Single Set in an ROBDD 2010
7. Authenticated Group Key Transfer Protocol Based on Secret Sharing 2010
8. An Application-Level Data Transparent Authentication Scheme without 2010
Communication Overhead
9. Concurrent Structure-Independent Fault Detection Schemes for the 2010
Advanced Encryption Standard
10. Coverage and Detection of a Randomized Scheduling Algorithm in 2010
Wireless Sensor Networks
11. Design and Analysis of On-Chip Networks for Large-Scale Cache 2010
Systems
12. Efficient Microarchitectural Vulnerabilities Prediction Using Boosted 2010
Regression Trees and Patient Rule Inductions
13. Minimizing the Maximum Firewall Rule Set in a Network with 2010
Multiple Firewalls
14. PERFECTORY: A Fault-Tolerant Directory Memory Architecture 2010
15. Predictive Temperature-Aware DVFS 2010
16. Secure and Efficient Broadcast Authentication in WSN 2010
17. Trade-Offs between Latency, Complexity, and Load Balancing with 2010
Multicast Algorithms

Learning Technologies
Sl.No Project Title Year
1. Deploying a Wearable Computing Platform for Computing Education 2010
2. Mobile Learning in School Contexts: Can Teachers Alone Make It 2010
Happen?
3. To Flow and Not to Freeze: Applying Flow Experience to Mobile 2010
Learning
4. An Enhanced Ant Colony Optimization Applied to Capacitated Vehicle 2009/.NET
Routing Problem

13
B.TECH PROJECTS LIST 2010
5. Information System Of Relay Protection For Fault Record Analysis 2009/JAVA

Sl.N Project Title Domain Year


o
1. Network Coding-Based Protection Wireless 2009/.NET
of Many-to-One Wireless Flows Communications
2. Increasing Packet Delivery in Ad Wireless 2009/JAVA
Hoc On-Demand Distance Vector Communications
Routing Protocol
3. Coding Documents using Cryptography 2009/.NET
Alternative Techniques

14
B.TECH PROJECTS LIST 2010
4. Investigating Accuracies of Rule Granular Computing 2009/.NET
Evaluation Models on Randomized
Labeling
5. Protection of Database Security via Knowledge Discovery 2009/JAVA
Collaborative Inference Detection and Data Mining
6. Applying Data Mining in Computer Science & 2009/JAVA
Prediction and Classification of Information Engg.
Urban Traffic
7. A text clustering framework for Information Assurance 2009/JAVA
information retrieval and Security
8. Enhancing Privacy and Information Technology 2009/JAVA
Authorization Control Scalability in Biomedicine
in the Grid Through Ontology
9. End-to-End Service Support for Services Computing 2010
Mashups
10. Affect Detection: Interdisciplinary Affective Computing 2010
Review of Models, Methods, and
Their Applications
11. Predictive Network Anomaly Information Forensics 2010
Detection and Visualization and Security
12. Providing Witness Anonymity Information Forensics 2010
Under Peer-to-Peer Settings and Security

15

You might also like