COMPUTER SCIENCE ENGINEERING – Titles
ANDROID
VAND1 | An Android Application For Next Generation Disaster Management
|
VAND2 | Multi user Bluetooth based Android Chat Application |
VAND3 | Implementation of Android application to convert the Text to Voice |
VAND4 | IPROB- an Emergency Responder Android Application for Monitoring, tracking and Responding |
JAVA
VJ1 | A Precise Termination Condition of the Probabilistic Packet Marking Algorithm |
VJ2 | Efficient transfer of data among the nodes by Dynamic Network Load Balancing |
VJ3 | Maximizing P2P File Access Availability in Networks though Replication for Efficient File Sharing |
VJ4 | Software Puzzle: A Countermeasure to Denial-of-Service Attacks |
VJ5 | Ensuring Data Storage Security in Cloud Computing |
VJ6 | Improving packet loss measurement in a network |
VJ7 | Histogram Based Global Load Balancing in Structured Peer-to-Peer Systems |
VJ8 | Congestion control using network based protocol |
VJ9 | Graphical User Interface Supported Game Application in Java |
VJ10 | Virtual Private Network- A highly Efficient and Secured Network |
VJ11 | Evaluating the vulnerability of network traffic using joint security and outing analysis |
DOT NET
VDN1 | Secure data transfer over Internet using Image Stegnography |
VDN2 | Improving Security and efficiency in data sharing by using encryption of data |
VDN3 | Enhanced Security of real world electronic voting system |
VDN4 | Implementation of Apriori Algorithm |
VDN5 | Staff Attendance & Payroll Management System |
VDN6 | E-Billing System for retailer |
VDN7 | Meteosat Images Encryption based on RSA Algorithms |
VDN8 | Reversible data hiding in encrypted JPEG streaming |
VDN9 | Card payment security using Public Key cryptographic Algorithms |
VDN10 | E-Authentication system using OTP |
VDN11 | Robust Face-Name Graph Matching for Movie Character Identification |
VDN12 | random cast energy efficient Communication scheme for MANET |
VDN13 | An efficient secure data transmission for cluster based WSN |
VDN14 | Adaptive traffic engineering system based on virtual routing topology |
VDN15 | EXAMP-Expedite Message Authentication Protocol for Vehicle Ad hoc Network |
DATA MINING
VDM1 | Automatic Defect tracking and Summarization of Bug Reports |
VDM2 | Web based approach for recruitment Process |
VDM3 | Facilitating Effective User Navigation through Website Structure Improvement |
VDM4 | Website Evaluation using Web mining |
VDM5 | Weather forecasting using data mining |
VDM6 | Development of a feature-rich on-request course coordination system |
VDM7 | E-Commerce Product rating based on customer review mining |
VDM8 | Text Mining-Supported Information Extraction |
VDM9 | SafeNote Encryption and Stegnography Application |
VDM10 | The Role of Apriori Algorithm for Finding the Association Rules in Data Mining |
VDM11 | Implementation of RSA Network Algorithm |
VDM12 | Domain specific search of nearest hospital for health care management scheme |
VDM13 | Opinion Mining for Restaurant Reviews |
VDM14 | Customer behavior prediction using Web usage Mining |
VDM15 | Cancer / Disease Prediction using data mining |
VDM16 | Mining E-Business to enhance Marketing Strategies of company |
CLOUD COMPUTING
VCC1 | CDA Generation and Integration for Health Information Exchange Based on Cloud Computing |
VCC2 | A secure authentication and data security for online banking in cloud environment |
VCC3 | Cloud-Assisted Mobile-Access for Student Performance Evaluation |
VCC4 | E-Learning platform using Cloud Computing |
VCC5 | Advanced Intelligent tourist guide in Cloud Infrastructure |
VCC6 | Cloud Based Blood Requirement and Blood Availability Support for Blood bank |
VCC7 | Online Book store system in cloud Infrastructure |
VCC8 | Cloud based Career Guidance System |
VCC9 | Secured Electronic fund transfer over Internet using Cryptographic Algorithm |
VCC10 | Security issues of cloud based storage |
NETWORKING (NS2)
VNS1 | Secure routing protocols for mobile ad hoc networks |
VNS2 | Implementation and Security against DOS Attacks in network |
VNS3 | Seamless Network Access by Moving Vehicle in Heterogeneous Network for VANET |
VNS4 | Provenance Forgery and Packet Drop Attacks Detection in Wireless Networks |
VNS5 | Effective Congestion Control And Scheduling For Wireless Networks Using Prioritized Queuing Mechanism |
VNS6 | Enhanced Adaptive Acknowledgement A Special Intrusion Detection System For MANET |
VNS7 | Simulation comparison and analysis of DSR and AODV protocols in MANETs |
VNS8 | A Hybrid Multipath Routing Protocol To Prevent The Malicious Node Attacks In Wireless Networks |
VNS9 | Resource Partitioning and User Association With Sleep-Mode Base Stations in Heterogeneous Cellular Networks |
VNS10 | Priority-Based Timeslot Assignment In Mac Protocol For Heterogeneous Traffic In Wireless Sensor Networks |
VNS11 | Enhancing Performance Of MANET By Using Protocol For Unified Multicasting Through Announcement(Puma) |
VNS12 | A Study on Secure Intrusion Detection System in Wireless MANETs to Increase the Performance of Eaack |
IMAGE PROCESSING (MATLAB)
VIMP1 | Fast Retinal Vessel Detection and Measurement Using Wavelets and Edge Location Refinement |
VIMP2 | Crack Detection and Classification Based on New Edge Detection Method |
VIMP3 | Nearest Neighbor on iris recognition using randomized partitioning |
VIMP4 | Color based multiple object tracking using Matlab |
VIMP5 | Image segmentation based on markov random fields |
VIMP6 | Segmentation of pet images based on affinity propagation clustering
|
VIMP7 | Feature extraction for character recognition in matlab
|
VIMP8 | Soft thresholding for image segmentation
|
VIMP9 | Face detection based on Support Vector Machine Classifier |
VB, .NET, WEB APPLICATION
VAP1 | Web based Library Book Availability Enquiry and finder |
VAP2 | Payroll and Trip Monitoring System for Travel Agency |
VAP3 | Railway tracking and Arrival Time Prediction |
VAP4 | Criminal Investigation Tracker with support prediction |
VAP5 | Internet based courier tracking and delivery system |
VAP6 | Telephone Connection Management and Bill Payment System |
VAP7 | Efficient methodology for College Automation and Scheduling process |
VAP8 | Smart ticket booking system using RFID |
VAP9 | University Result analysis system |
VAP10 | Time sheet tracker |
VAP11 | Secure E- Shopping System |
VAP12 | Design and Implementation of Web based Examination System |
VAP13 | Online Job Portal |
VAP14 | Design and Implementation of E-Secure Transaction |
VAP15 | Online customer service application |
VAP16 | RFID based Toll Plaza Management System |
VAP17 | Super Market Management system |
VAP18 | Controlling Desktop activities |
VAP19 | Framework for Retail Pharmacy Management System |
VAP20 | Automobile Dealer Management System |
VAP21 | Education Assignment Dashboard |
VAP22 | Airline/ Railway Ticket Booking System |
VAP23 | Cyber Café Management System |
VAP24 | Intelligent Hospital Management System |
VAP25 | Inventory and Order Processing System |
VAP26 | School/ College Management System |
VAP27 | Staff Attendance & Payroll Management System |
VAP28 | Development of feature rich practical online Leave Management scheme (LMS) |
- VEHICLE DETECTION IN AERIAL SURVEILLANCE USING DYNAMIC BAYESIAN NETWORKS
- DESIGN AND IMPLEMENTATION OF TARF: A TRUST-AWARE ROUTING FRAMEWORK FOR WSNS
- HORIZONTAL AGGREGATIONS IN SQL TO PREPARE DATA SETS FOR DATA MINING ANALYSIS
- DATA-PROVENANCE VERIFICATION FOR SECURE HOSTS
- TRANSPORT MANAGEMENT SYSTEM
JAVA DATA MINING
- A FRAMEWORK FOR PERSONAL MOBILE COMMERCE PATTERN MINING AND PREDICTION
- EFFICIENT EXTENDED BOOLEAN RETRIEVAL
- IMPROVING AGGREGATE RECOMMENDATION DIVERSITY USING RANKING-BASED TECHNIQUES
- BIBPRO: A CITATION PARSER BASED ON SEQUENCE ALIGNMENT
- EXTENDING ATTRIBUTE INFORMATION FOR SMALL DATA SET CLASSIFICATION
- ENABLING MULTILEVEL TRUST IN PRIVACY PRESERVING DATA MINING
8.USING RULE ONTOLOGY IN REPEATED RULE ACQUISITION FROM SIMILAR WEB SITES
DOTNET DATAMINING
- SLICING: A NEW APPROACH FOR PRIVACY PRESERVING DATA PUBLISHING DOTNET
THREE TIER SECURITY SYSTEM
JAVA NETWORKING
- LATENCY EQUALIZATION AS A NEW NETWORK SERVICE PRIMITIVE
- ADAPTIVE OPPORTUNISTIC ROUTING FOR WIRELESS AD HOC NETWORKS
- REVISITING DYNAMIC QUERY PROTOCOLS IN UNSTRUCTURED PEER-TO-PEER NETWORKS OPPORTUNISTIC FLOW-LEVEL LATENCY ESTIMATION USING CONSISTENT NETFLOW NETWORKING 2012 JAVA DETECTING SPAM ZOMBIES BY MONITORING OUTGOING MESSAGES. A HYBRID APPROACH TO PRIVATE RECORD MATCHING NETWORK SECURITY 2012 JAVA
- ES-MPICH2: A MESSAGE PASSING INTERFACE WITH ENHANCED SECURITY NETWORK SECURITY 2012 JAVA
JAVA IMAGE PROCESSING
A SECRET-SHARING-BASED METHOD FOR AUTHENTICATION OF GRAYSCALE DOCUMENT IMAGES VIA THE USE OF THE PNG IMAGE WITH A DATA REPAIR CAPABILITY
JAVA MOBILE COMPUTING
- HANDLING SELFISHNESS IN REPLICA ALLOCATION OVER A MOBILE AD HOC NETWORK
- ACKNOWLEDGMENT-BASED BROADCAST PROTOCOL FOR RELIABLE AND EFFICIENT DATA DISSEMINATION IN VEHICULAR AD HOC NETWORKS
- TOWARD RELIABLE DATA DELIVERY FOR HIGHLY DYNAMIC MOBILE AD HOC NETWORKS
- PROTECTING LOCATION PRIVACY IN SENSOR NETWORKS AGAINST A GLOBAL EAVESDROPPER
DOTNET NETWORK SECURITY
- REVISITING DEFENSES AGAINST LARGE-SCALE ONLINE PASSWORD GUESSING ATTACKS
- SECUREDTRUST: A DYNAMIC TRUST COMPUTATION MODEL FOR SECURED COMMUNICATION IN MULTIAGENT SYSTEMS
- ENHANCED PRIVACY ID: A DIRECT ANONYMOUS ATTESTATION SCHEME WITH ENHANCED REVOCATION CAPABILITIES 2012 DOTNET NETWORK SECURITY
- EXTENDING ATTACK GRAPH-BASED SECURITY METRICS AND AGGREGATING THEIR APPLICATION 2012 DOTNET NETWORK SECURITY
DOTNET NETWORKING
- THROUGHPUT AND ENERGY EFFICIENCY IN WIRELESS AD HOC NETWORKS WITH GAUSSIAN CHANNELS
- CROSS-LAYER ANALYSIS OF THE END-TO-END DELAY DISTRIBUTION IN WIRELESS SENSOR NETWORKS
- ROUTING FOR POWER MINIMIZATION IN THE SPEED SCALING MODEL
JAVA CLOUDCOMPUTING
- A GOSSIP PROTOCOL FOR DYNAMIC RESOURCE MANAGEMENT IN LARGE CLOUD ENVIRONMENTS
- 2.OPTIMIZATION OF RESOURCE PROVISIONING COST IN CLOUD COMPUTING
- A SECURE ERASURE CODE-BASED CLOUD STORAGE SYSTEM WITH SECURE DATA FORWARDING
- HASBE: A HIERARCHICAL ATTRIBUTE-BASED SOLUTION FOR FLEXIBLE AND SCALABLE ACCESS CONTROL IN CLOUD COMPUTING
- A DISTRIBUTED ACCESS CONTROL ARCHITECTURE FOR CLOUD COMPUTING
- CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS