COMPUTER SCIENCE ENGINEERING – Titles

 

ANDROID

 

VAND1

An Android Application For Next Generation Disaster Management

 

VAND2

Multi user Bluetooth based Android Chat Application

VAND3

Implementation of Android application to convert the Text to Voice

VAND4

IPROB- an Emergency Responder Android Application for Monitoring, tracking and Responding

 

JAVA

 

VJ1

A Precise Termination Condition of the Probabilistic Packet Marking Algorithm

VJ2

Efficient transfer of data among the nodes by Dynamic Network Load Balancing

VJ3

Maximizing P2P File Access Availability in Networks though Replication for Efficient File Sharing

VJ4

Software Puzzle: A Countermeasure to Denial-of-Service Attacks

VJ5

Ensuring Data Storage Security in Cloud Computing

VJ6

Improving packet loss measurement in a network

VJ7

Histogram Based Global Load Balancing   in Structured Peer-to-Peer Systems

VJ8

Congestion control using network based protocol

VJ9

Graphical User Interface Supported Game Application in Java

VJ10

Virtual Private Network- A highly Efficient and Secured Network

VJ11

Evaluating the vulnerability of network traffic using joint security and outing analysis

 

 

DOT NET

 

VDN1

Secure data transfer over Internet using Image Stegnography

VDN2

Improving Security and efficiency in data sharing by using encryption of data

VDN3

Enhanced Security of real world electronic voting system

VDN4

Implementation of Apriori Algorithm

VDN5

Staff Attendance & Payroll Management System

VDN6

E-Billing System for retailer

VDN7

Meteosat Images Encryption based on  RSA Algorithms

VDN8

Reversible data hiding in encrypted JPEG streaming

VDN9

Card payment security using Public Key cryptographic  Algorithms

VDN10

E-Authentication system using OTP

VDN11

Robust Face-Name Graph Matching for Movie Character Identification

VDN12

random cast energy efficient Communication scheme for MANET

VDN13

An efficient secure data transmission for cluster based WSN

VDN14

Adaptive traffic engineering system based on virtual routing topology

VDN15

EXAMP-Expedite Message Authentication Protocol for Vehicle Ad hoc Network

 

 

DATA MINING

 

VDM1

Automatic Defect tracking and Summarization of Bug Reports

VDM2

Web based approach for recruitment Process

VDM3

Facilitating Effective User Navigation through Website Structure Improvement

VDM4

Website Evaluation using Web mining

VDM5

Weather forecasting using data mining

VDM6

Development of a feature-rich on-request course coordination system

VDM7

E-Commerce Product rating based on customer review mining

VDM8

Text Mining-Supported Information Extraction

VDM9

SafeNote Encryption and Stegnography Application

VDM10

The Role of Apriori Algorithm for Finding the Association Rules in Data Mining

VDM11

Implementation of RSA Network Algorithm

VDM12

Domain specific search of nearest hospital for health care management scheme

VDM13

Opinion Mining for Restaurant Reviews

VDM14

Customer behavior prediction using Web usage Mining

VDM15

Cancer / Disease Prediction using data mining

VDM16

Mining E-Business to enhance Marketing Strategies of company

 

 

CLOUD COMPUTING

 

VCC1

CDA Generation and Integration for Health Information Exchange

Based on Cloud Computing

VCC2

A secure authentication and data security for online banking in cloud environment

VCC3

Cloud-Assisted Mobile-Access for Student Performance Evaluation

VCC4

E-Learning platform using Cloud Computing

VCC5

Advanced Intelligent tourist guide in Cloud Infrastructure

VCC6

Cloud Based Blood Requirement and Blood Availability Support for Blood bank

VCC7

Online Book store system in cloud Infrastructure

VCC8

Cloud based Career Guidance System

VCC9

Secured Electronic fund transfer over Internet using Cryptographic Algorithm

VCC10

Security issues of cloud based storage

 

 

NETWORKING (NS2)

 

VNS1

Secure routing protocols for mobile ad hoc networks

VNS2

Implementation and Security against DOS Attacks in network

VNS3

Seamless Network Access by Moving Vehicle in Heterogeneous Network for VANET

VNS4

Provenance Forgery and Packet Drop Attacks Detection in Wireless Networks

VNS5

Effective Congestion Control And Scheduling For Wireless Networks Using Prioritized Queuing Mechanism

VNS6

Enhanced Adaptive Acknowledgement A Special Intrusion Detection System For MANET

VNS7

Simulation comparison and analysis of DSR and AODV protocols in MANETs

VNS8

A Hybrid Multipath Routing Protocol To Prevent The Malicious Node Attacks In Wireless Networks

VNS9

Resource Partitioning and User Association With Sleep-Mode Base Stations in

Heterogeneous Cellular Networks

VNS10

Priority-Based Timeslot Assignment  In Mac Protocol For Heterogeneous Traffic In Wireless Sensor Networks

VNS11

Enhancing  Performance Of MANET By Using  Protocol For Unified Multicasting Through Announcement(Puma)

VNS12

A Study on Secure Intrusion Detection System in Wireless MANETs to Increase the Performance of Eaack

 

 

IMAGE PROCESSING (MATLAB)

 

VIMP1

Fast Retinal Vessel Detection and Measurement Using Wavelets and Edge Location Refinement

VIMP2

Crack Detection and Classification Based on New Edge Detection Method

VIMP3

Nearest Neighbor on iris recognition using randomized partitioning

VIMP4

Color based multiple object tracking using Matlab

VIMP5

Image segmentation based on markov random fields

VIMP6

Segmentation of pet images based on affinity propagation clustering

 

VIMP7

Feature extraction for character recognition in matlab

 

VIMP8

Soft thresholding for image segmentation

 

VIMP9

Face detection based on Support Vector Machine Classifier

 

 

VB, .NET, WEB APPLICATION

 

VAP1

Web based Library Book Availability Enquiry and finder

VAP2

Payroll and Trip Monitoring System for Travel Agency

VAP3

Railway tracking and Arrival Time Prediction

VAP4

Criminal Investigation Tracker with support prediction

VAP5

Internet based courier tracking and delivery system

VAP6

Telephone Connection Management and Bill Payment System

VAP7

Efficient methodology for College Automation and Scheduling process

VAP8

Smart ticket booking system using RFID

VAP9

University Result analysis system

VAP10

Time sheet tracker

VAP11

Secure E- Shopping System

VAP12

Design and Implementation of Web based Examination System

VAP13

Online Job Portal

VAP14

Design and Implementation of E-Secure Transaction

VAP15

Online customer service application

VAP16

RFID based Toll Plaza Management System

VAP17

Super Market Management system

VAP18

Controlling Desktop activities

VAP19

Framework for Retail Pharmacy  Management System

VAP20

Automobile Dealer Management System

VAP21

Education Assignment Dashboard

VAP22

Airline/ Railway Ticket Booking System

VAP23

Cyber Café Management System

VAP24

Intelligent Hospital Management System

VAP25

Inventory and Order Processing System

VAP26

School/ College Management System

VAP27

Staff Attendance & Payroll Management System

VAP28

Development of feature rich practical online Leave Management scheme (LMS)

 

 

 

 

 

  1. VEHICLE DETECTION IN AERIAL SURVEILLANCE USING DYNAMIC BAYESIAN NETWORKS
  2. DESIGN AND IMPLEMENTATION OF TARF: A TRUST-AWARE ROUTING FRAMEWORK FOR WSNS
  3. HORIZONTAL AGGREGATIONS IN SQL TO PREPARE DATA SETS FOR  DATA MINING ANALYSIS
  4. DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS
  5. TRANSPORT  MANAGEMENT SYSTEM

JAVA DATA MINING

  1. A FRAMEWORK FOR PERSONAL MOBILE COMMERCE PATTERN MINING AND PREDICTION
  2. EFFICIENT EXTENDED BOOLEAN RETRIEVAL
  3. IMPROVING AGGREGATE RECOMMENDATION DIVERSITY USING RANKING-BASED TECHNIQUES
  4. BIBPRO: A CITATION PARSER BASED ON SEQUENCE ALIGNMENT
  5. EXTENDING ATTRIBUTE INFORMATION FOR SMALL DATA SET CLASSIFICATION
  6. ENABLING MULTILEVEL TRUST IN PRIVACY PRESERVING DATA MINING

8.USING RULE ONTOLOGY IN REPEATED RULE ACQUISITION FROM SIMILAR WEB SITES

DOTNET DATAMINING

  1. SLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING  DOTNET

THREE TIER SECURITY SYSTEM

JAVA NETWORKING

  1. LATENCY EQUALIZATION AS A NEW NETWORK SERVICE PRIMITIVE
  2. ADAPTIVE OPPORTUNISTIC ROUTING FOR WIRELESS AD HOC NETWORKS
  3. REVISITING DYNAMIC QUERY PROTOCOLS IN UNSTRUCTURED PEER-TO-PEER NETWORKS OPPORTUNISTIC FLOW-LEVEL LATENCY ESTIMATION USING CONSISTENT NETFLOW NETWORKING 2012 JAVA DETECTING SPAM ZOMBIES BY MONITORING OUTGOING MESSAGES. A HYBRID APPROACH TO PRIVATE RECORD MATCHING   NETWORK SECURITY 2012 JAVA
  4. ES-MPICH2: A MESSAGE PASSING INTERFACE WITH ENHANCED SECURITY  NETWORK SECURITY 2012 JAVA

JAVA IMAGE PROCESSING

A SECRET-SHARING-BASED METHOD FOR AUTHENTICATION OF GRAYSCALE DOCUMENT IMAGES VIA THE USE OF THE PNG IMAGE WITH A DATA REPAIR CAPABILITY

JAVA MOBILE COMPUTING

  1. HANDLING SELFISHNESS IN REPLICA ALLOCATION OVER A MOBILE AD HOC NETWORK
  2. ACKNOWLEDGMENT-BASED BROADCAST PROTOCOL FOR RELIABLE AND EFFICIENT DATA DISSEMINATION IN VEHICULAR AD HOC NETWORKS
  3. TOWARD RELIABLE DATA DELIVERY FOR HIGHLY DYNAMIC MOBILE AD HOC NETWORKS
  4. PROTECTING LOCATION PRIVACY IN SENSOR NETWORKS AGAINST A GLOBAL EAVESDROPPER

 

 

 

DOTNET NETWORK SECURITY

  1. REVISITING DEFENSES AGAINST LARGE-SCALE ONLINE PASSWORD GUESSING ATTACKS
  2. SECUREDTRUST: A DYNAMIC TRUST COMPUTATION MODEL FOR SECURED COMMUNICATION IN MULTIAGENT SYSTEMS
  3. ENHANCED PRIVACY ID: A DIRECT ANONYMOUS ATTESTATION SCHEME WITH ENHANCED REVOCATION CAPABILITIES  2012 DOTNET NETWORK SECURITY
  4. EXTENDING ATTACK GRAPH-BASED SECURITY METRICS AND AGGREGATING THEIR APPLICATION  2012 DOTNET NETWORK SECURITY

DOTNET NETWORKING

  1. THROUGHPUT AND ENERGY EFFICIENCY IN WIRELESS AD HOC NETWORKS WITH GAUSSIAN CHANNELS
  2. CROSS-LAYER ANALYSIS OF THE END-TO-END DELAY DISTRIBUTION IN WIRELESS SENSOR NETWORKS
  3. ROUTING FOR POWER MINIMIZATION IN THE SPEED SCALING MODEL

JAVA CLOUDCOMPUTING

  1. A GOSSIP PROTOCOL FOR DYNAMIC RESOURCE MANAGEMENT IN LARGE CLOUD ENVIRONMENTS
  2. 2.OPTIMIZATION OF RESOURCE PROVISIONING COST IN CLOUD COMPUTING
  3. A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDING
  4. HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING
  5. A DISTRIBUTED ACCESS CONTROL ARCHITECTURE FOR CLOUD COMPUTING
  6. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS