Você está na página 1de 16

TRANSOFT SYSTEMS Pvt Ltd

Near HUDA , Ameerpet, Hyderabad.

Contact Centre: FRONTIER COMPUTERS


PH : 9246451282, 220572

2010 project list

Dotnet
1. Data Leakage Detection

2. Inference From Aging Information

3. VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks

4. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs.

5. AI AND OPINION MINING.


6. Conditional Shortest Path Routing in Delay Tolerant Networks.

7. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature

8. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing

9. Efficient and Robust Detection of Duplicate Videos in a Large Database

10. .Dynamic Authentication for Cross-Realm SOA-Based Business Processes.

11. A Study for Important Criteria of Feature Selection in Text Categorization .

12. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing.

Java
1. BinRank: Scaling Dynamic Authority-Based Search Using Materialized Subgraphs

2. Closeness: A New Privacy Measure for Data Publishing

3. Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks


4. A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless
Networks

5. Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks

6. Host-to-Host Congestion Control for TCP

7. Layered Approach Using Conditional Random Fields for Intrusion Detection

8. Mesh Based Multicast Routing in MANET: Stable Link Based Approach

9. Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs

10. On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability

11. P2P Reputation Management Using Distributed Identities and Decentralized


Recommendation Chains

12. PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving
Objects

13. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive
Routes

14. Assessing Fingerprint Individuality in Presence of Noisy Minutiae

15. Grid Scheduling based on Collaborative Random Early Detection Strategies

16. A Redundant Audio Watermarking Technique using Discrete Wavelet Transformation

17. Grid Video computing

Java Project Titles


Domine: NETWORKING

S.No Code
Project title Description Type Year
1 SJNW01 Lightweight Online Performance Monitoring In this project , a
and Tuning with Embedded Gossip new performance
monitoring approach IEEE 2009
called Embedded
Gossip (EG) is
designed to enable
lightweight online
performance
monitoring and
tuning.
2 SJNW02 Privacy-Aware Collaborative Spam Filtering In this project, we IEEE 2009
propose a privacy-
aware framework for
collaborative spam
filtering , preserving
message
transformance
technique that is
highly resilient
against the latest
kinds of spam
attacks.
3 SJNW03 Dynamic Search Algorithm in Unstructured In this project, we IEEE 2009
Peer-to-Peer Networks propose the dynamic
serach(DS)
algorithm which is a
generalization of
flooding and RW.

4 SJNW04 A Decentralized Method for Scaling Up This paper tackles IEEE 2009
Genome Similarity Search Services this problem in a
novel wat, which
treats sequence
search requests as
content requests to
both genome
databases and
similarity detection
methods.
5 SJNW05 Plexus: A Scalable Peer-to-Peer Protocol In this project, IEEE 2009
Enabling Efficient Subset Search Plexus a peer-to-
peer search protocol
that provides an
efficient mechanism
for advertising a bit
sequence(pattern),
and discovering it
using any subset of
its 1-bits.
6 SJNW06 Cooperative Secondary Authorization Recycling In this project, an IEEE 2009
approach where
each application
server recycles
previously received
authorizations and
shares them with
other application
servers to mask
authorization server
failures and network
delays.
7 SJNW07 Robust Rate Control for Heterogeneous In this project, a IEEE 2009
Network Access in Multihomed Environments novel robust flow
control framework
for heterogeneous
network access by
devices with multi-
homing capabilities.

Domain: Datamining

S.No Code
Project title Description Type Year
1 SJDM01 Catching the Trend: A Framework for Clustering In this project, the IEEE 2009
Concept-Drifting Categorical Data framework is
practical for
detecting drifting
concepts in time-
evolving categorical
data.

2 SJDM02 CDNs Content Outsourcing We dealt with IEEE 2009


via Generalized Communities content selection
problem withy
content should be
outsourced in CDN’s
surrogate servers.
3 SJDM03 IMine: Index Support for Item Set Mining The IMine index is a IEEE 2009
novel index structure
that supports
efficient item set
mining into a
relational DBMS.
4 SJDM04 Progressive Parametric Query Optimization We propose instead IEEE 2009
to progressively
explore the
parameter space
and build a
parametric plan
during several
executions of the
same query.

Domain: Mobile Computing

S.No Code Project title Description Type Year

1 SJMC01 A Tabu Search Algorithm for Cluster Building In this project the IEEE 2009
in Wireless Sensor Networks main challenge in
wireless sensor
network deployment
pertains to
optimizing energy
consumption when
collecting data from
sensor nodes.
2 SJMC02 In our project two
efficient
broadcasting
algorithms based on
1-hop neighbor
information. In the
first part of the
paper, we consider
sender-based
broadcasting
algorithms,
Efficient Broadcasting in Mobile specifically the IEEE 2009
Ad Hoc Networks algorithm proposed
by Liu et al.
3 SJMC03 Headlight Prefetching and Dynamic Chaining for In this project our IEEE 2009
Cooperative Media Streaming in Mobile goal is to sharing
Environments audio and video
resources between
Media
environments.

Domain: Network Security

S.No Code
Project title Description Type Year
1 SJNS01 Mitigating Denial-of-Service Attacks on In this project IEEE 2009
the Chord Overlay Network:A Location Hiding Location Guard—a
Approach location hiding
technique for
securing overlay file
storage systems
from targeted file
attacks
2 SJNS02 A Routing-Driven Elliptic Curve Cryptography In this project novel IEEE 2009
Based Key Management Scheme for routing-driven key
Heterogeneous Sensor Networks management
scheme, which only
establishes shared
keys for neighbor
sensors that
communicate with
each other.

3 SJNS03 Dynamic Routing with Security Considerations In this project a IEEE 2009
dynamic routing
algorithm that could
randomize delivery
paths for data
transmission.

4 SJNW04 Efficient Node Admission and Certificateless This project, we IEEE 2009
Secure Communication in Short-Lived MANETs focus on a common
type of MANETS that
is formed on a
temporary efficient,
and a fully no
interactive admission
technique geared for
this type of network.

Domain: Grid Computing

S.No Code
Project title Description Type Year
1 SJGC01 Bi-Criteria Scheduling of Scientific Grid Workflows In this project we IEEE 2009
propose a new bi-
criteria scheduling
specifiucation
method defining for
the secondary
criterion a sliding
constraint as a
function of the
primary criterion.
2 SJGC02 TCP Performance in Flow-Based Mix Networks: In this project, we IEEE 2009
Modeling and Analysis systematically
address TCP
performance issues
of flow-based mix
networks. A mix’s
batching and
reordering schemes
can dramatically
reduce TCP
throughput due to
out-of-order packet
delivery
3 SJGC03 Adaptive Task Checkpointing and Replication: In this project we IEEE 2009
Toward Efficient Fault-Tolerant Grids introduce several
heuristics that
dynamically adapt to
various parameters
based on information
on grid status to
provide high job
throughput in the
presence of failure
while reducing the
system overhead.

Sno Project Title -JAVA Type Year


01 Flexible Rollback Recovery in Dynamic IEEE 2009
Heterogeneous Grid Computing

02 A Divide-and-Conquer Approach for Minimum IEEE 2009


Spanning Tree-Based Clustering
03 AN OPTIMIZED SOLUTION FOR MOBILE IEEE 2009
COMPUTING

04 Detecting Malacious Packet IEEE 2009


05 Dynamic Routing with Security Considerations IEEE 2009
06 EnergyMaps For Mobile Wireless networks IEEE 20009
coherence Time Versues Spred
07 Evaluating the Vulnerability of Network Traffic IEEE 2009
Using Joint Security and Routing Analysis

08 Interactive Correction and Recommendation for IEEE 2009


Computer Language Learning and Training

09 Intrusion Detection in Homogeneous and IEEE 2009


Heterogeneous Wireless Sensor Networks

10 Large Connectivity for Dynamic Random IEEE 2009


Geometric Graphs

11 Measuring Capacity Bandwidth of Targeted IEEE 2009


Path Segments
12 Mitigation of Control Channel Jamming under IEEE 2009
Node Capture Attacks

13 Mobility Management Approaches for IEEE 2009


Mobile IP Networks

14 Monitoring the Application-Layer DDoS Attacks for IEEE 2009


Popular Websites

`15 Multiple Routing Configurations for Fast IP IEEE 2009


Network Recovery

16 RAAM: ROUTING ALGORITHM USING ANT IEEE 2009


AGENTS FOR MANETS

17 Spatio-Temporal Network Anomaly Detection by IEEE 2009


Assessing Deviations of Empirical Measures
18 A Bidirectional Routing Abstraction for IEEE 2008
Asymmetric Mobile Ad Hoc Networks
19 A Geometric Approach to Improving Active IEEE 2008
Packet Loss Measurement

20 A LOSSLESS COMPRESSION SCHEME FOR IEEE 2008


BAYER COLOR FILTER ARRAY IMAGES

21 A Model-Based Approach to Evaluation of the IEEE 2008


22 A NEW HEURISTIC FOR MINIMIZING THE IEEE 2008
DELAY VARIATION IN MULTICASTING

Dot Net Project Titles


Domine: NETWORKING

S.No Code
Project title Description Type Year
1 SDNW01 A Trace-Driven Approach to Evaluate the IEEE 2009
Scalability of P2P-Based Video-on-Demand This model
Service proposes improving
the scalability of
video-on-demand
service over internet
by analyzing user
behavior
2 SDNW02 A Parameterized Approach to Spam-Resilient This paper propose IEEE 2009
Link Analysis of the Web ranking of url based
on counting total no.
visitors online on the
url& counting total
no. visitors on the
application.

3 SDNW03 Effective Collaboration with Information IEEE 2009


Sharing in Virtual Universities This paper aims to
build a new rule-
based framework to
identify and address
issues of sharing in
virtual university
environments
through role-based
access control
(RBAC)
managememt for e-
learning systems.
4 SDNW04 Enhancing Downlink Performance in IEEE 2009
Wireless Networks by Simultaneous
Multiple Packet Transmission In this paper , we
consider using
simultaneous
Multiple Packet
Transmission(MPT)
to improve the
downlink
performance of
networks. The
sender can send two
compatible packets
simultaneous to two
distinct receivers.
5 SDNW05 Network-Coding-Based Signal Recovery for In this paper, we IEEE 2009
Efficient Scheduling in Wireless Networks propose some
practicle schemes to
recover the useful
signal from the
collided signals for
different types of
wireless channels;
thus, the throughput
and network
efficiency can
greatly be
increased. The
proposed schemes
are based on the
network coding
technique and
performed on the
physical layer.

6 SDNW06 Measuring Capacity Bandwidth of Targeted Path In this project we are IEEE 2009
Segments. measuring the
capacity of network
bandwidth using
1 single packet
probing method.
2 packet bunch
probing method.
3 uniform packet-
pair probing method.
4 non-uniform
packet pair probing
method.
7 SDNW07 Histogram-Based Global Load Balancing This project IEEE 2009
in Structured Peer-to-Peer Systems explains load
balancing in
networks.
1 Maintaining the
load information.
2. Redistributing the
load if it exceeds the
limit.

Domain: Datamining

S.No Code
Project title Description Type Year
1 SDDM01 Optimal Lot Sizing Policies for Sequential Online This project is to IEEE 2009
Auctions Reduce
lots( number of
items) sizes for
onhline selling or
buying.
2 SDDM02 Distributional Features for Text Categorization This project explains IEEE 2009
use of the semantic
communities and the
emerging semantic
relations in a
dynamic complex
network of learning
resources.

Domain: Network Security

S.No Code
Project title Description Type Year
1 SDNS01 Enhanced Security for Online Exams This project IEEE 2009
Using Group Cryptography proposes enhanced
secure online exam
management
environment
mediated by group
cryptography using
remote monitoring
and control of ports
2 SDNS02 A Secure Mobile Healthcare System using This project shows IEEE 2009
Trust-Based Multicast Scheme about the technique
of trust evaluation
without a
centeralized trust
managent authority
and propose a trust
evaluation model
that can efficiently
calculate the
trustworthiness of
mobile healthcare.

3 SDNS03 Internet and Online Information Privacy: An In this project, we IEEE 2009
Exploratory Study of Preteens and Early Teens explored private
information-sharing
Behaviour of
preteen and early
teen internet users
by social congnitive
theory and rotection
motivation theory.

Domain: Image Processing

S.No Code Project title Description Type Year

1 SDIP01 Gradient Estimation Using Wide Support This project IEEE 2009
Operators proposes Removing
noise from picture
by detecting edges.
2 SDIP02 Sharpening Dermatological Color Images This project IEEE 2009
In the Wavelet Domain proposes finding
boundaries in the
image and adaptive
image demising.
3 SDIP03 Continuous Glass Patterns for Painterly In this project, we IEEE 2009
Rendering are converting digital
photograph into
painting image.

Domain: Software Engineering

S.No Code Project title Description Type Year

1 SDSE01 Variability and Reproducibility in Software This project IEEE 2009


Engineering: A Study of Four Companies proposes increasing
that Developed the Same System reproducibility and
quality in software
product
2 SDSE02 Predicting Project Velocity in XP Using a This project, IEEE 2009
Learning Dynamic Bayesian Network Model Accurate prediction
and risk assessment
in XP using
Bayesian Network
Model

Domain: Multimedia

S.No Code Project title Description Type Year

1 SDMM01 AUTOMATED BIDDING FOR MEDIA This project IEEE 2009


SERVICES AT THE EDGE OF A CONTENT downloading and
DELIVERY NETWORK transmitting data’s
depending on user
accounts.

Domain: Mobile Computing

S.No Code Project title Description Type Year


1 SDMC01 Overlapped Carrier-Sense Multiple Access This project IEEE 2009
(OCSMA) in Wireless Ad Hoc Networks proposed for
enchancing network
throughput through
transferring content
to station(source to
destination) is done
by transferring data
through nearby
nodes.
2 SDMC02 Signaling for Multimedia Conferencing This project, passing IEEE 2009
in Stand-Alone Mobile Ad Hoc Networks data through
invitation of
neighboring nodes
and an algorithm
proposed for the
same.

Dot Net Project Titles

S.No Project Title Dot Net Type Year


1 A Gen2-Based RFID Authentication Protocol for Security and Privacy IEEE 2009
2 A Tabu Search Algorithm for Cluster Building IEEE 2009
3 Analysis of Shortest Path Routing for Large IEEE 2009
4 Biased Random Walks in Uniform Wireless Networks IEEE 2009
5 Cell Breathing Techniques for Load Balancing in Wireless LANs IEEE 2009
Energy Maps for Mobile Wireless Networks Coherence Time versus
6 Spreading Period IEEE 2009
Enforcing Minimum-Cost Multicast Routing against Selfish Information
7 Flows IEEE 2009
English to Spanish Translation of Signboard Images from Mobile Phone
8 Camera IEEE 2009
Explicit Load Balancing Technique for NGEO Satellite IP Networks with
9 On IEEE 2009
10 Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks IEEE 2009
Information Content-Based Sensor Selection and Transmission Power
11 Adjustment for Collaborative Target Tracking IEEE 2009
Movement-Assisted Connectivity Restoration in Wireless Sensor and
12 Actor Networks IEEE 2009
On the Planning of Wireless Sensor Networks Energy-Efficient
13 Clustering under the Joint Routing and Coverage Constraint IEEE 2009
RandomCast An Energy-Efficient Communication Scheme for Mobile Ad
14 Hoc Networks IEEE 2009
Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel
15 Communications IEEE 2009
Resource Allocation in OFDMA Wireless Communications Systems
16 Supporting Multimedia Services IEEE 2009
17 Route Stability in MANETs under the Random Direction Mobility Model IEEE 2009
18 Secure and Policy-Compliant Source Routing IEEE 2009
19 The Effectiveness of Checksums for Embedded Control Networks IEEE 2009
Two Blocking Algorithms on Adaptive Binary Splitting Single and Pair
20 Resolutions for RFID Tag Identification IEEE 2009

A Cost-Based Approach to Adaptive Resource Management in Data


21 Stream Systems IEEE 2008
22 A Geometric Approach to Improving Active Packet Loss Measurement IEEE 2008
23 A New Model For Dissemination Of XML Content IEEE 2008
A Novel Framework for Semantic Annotation and Personalized Retrieval
24 of Sports Video IEEE 2008
A Self-Repairing Tree Topology Enabling Content-Based Routing in
25 Mobile Ad Hoc Networks IEEE 2008
A Wavelet-Laplace Variation Technique For Image Deconvolution and
26 Inpainting IEEE 2008
27 Active Learning Methods for Interactive Image Retrieval IEEE 2008
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network
28 Traffic Analysis IEEE 2008
An Efficient Time-Bound Hierarchical Key Management Scheme for
29 Secure Broadcasting IEEE 2008
30 Analyzing and Managing Role-Based Access Control Policies IEEE 2008
31 Bandwidth-Satisfied Multicast Trees in MANETs IEEE 2008
32 BENEFIT-BASED DATA CACHING IN AD HOC NETWORKS IEEE 2008
33 Computation-Efficient Multicast Key Distribution IEEE 2008
Continuous Delivery Message Dissemination Problems under the
34 Multicasting IEEE 2008
35 Credit Card Fraud Detection Using Hidden Markov Model IEEE 2008
Distributed Collaborative Key Agreement and Authentication Protocols
36 for Dynamic Peer Groups IEEE 2008
37 Distributed Mobility Management for Target Tracking in IEEE 2008
Efficient 2-D Grayscale Morphological Transformations With Arbitraly
38 Flat Structuring Elements IEEE 2008
39 Efficient Broadcasting Using Network Coding IEEE 2008
40 Efficient Resource Allocation for Wireless Multicast IEEE 2008
Efficient Routing In Intermittently Connected Mobile Networks The
41 Multiple Copy Case IEEE 2008
42 Estimation of Defects Based on Defect Decay Model: ED3M IEEE 2008
43 Grid Service Discovery with Rough Sets IEEE 2008
44 Hardware enhanced association rule mining with Hashing and Pipelining IEEE 2008
44 Hardware enhanced association rule mining with Hashing and Pipelining IEEE 2008
HBA: Distributed Metadata Management for Large Cluster-Based
45 Storage Systems IEEE 2008
46 High resolution Animated Scenes from Stills IEEE 2008
Image Interpolation by Adaptive 2-D Autoregressive Modeling and Soft-
47 Decision Estimation IEEE 2008
48 Incentive-Based Scheduling for Market-Like Computational Grids IEEE 2008
49 Localized Sensor Area Coverage with Low Communication Overhead IEEE 2008
50 Mining Weighted Association Rules without Pre-assigned Weights IEEE 2008
51 On Guaranteed Smooth Switching for Buffered Crossbar Switches IEEE 2008
52 On the Computational Complexity and Effectiveness of N IEEE 2008
Orthogonal Data Embedding for Binary Images in Morphological
53 Transform Domain-A High- Capacity Approach IEEE 2008
Piecewise Linear Digital Curve Representation And Compression Using
54 Graph Theory And a Line Segment Alphabet IEEE 2008
55 Probabilistic Packet Marking for Large Scale IP Trace back IEEE 2008
Rate Allocation and Network Lifetime Problems for Wireless Sensor
56 Networks IEEE 2008
57 Rateless Forward Error Correction for Topology-Transparent Scheduling IEEE 2008
58 Semantic Ideation Learning for Agent IEEE 2008
59 Semantics-Based Design for Secure Web Services IEEE 2008
60 SSL Backend Forwarding scheme in Cluster IEEE 2008
61 Statistical Techniques for Detecting Traffic Anomalies through Packet IEEE 2008
Temporal Partitioning of Communication Resources in an Integrated
62 Architecture IEEE 2008
Trustworthy Computing under Resource Constraints with the DOWN
63 Policy IEEE 2008
Vision Processing for Real-time 3-D Data Acquisition Based on Coded
64 Structured Light IEEE 2008
Watermarking Relational Databases Using Optimization-Based
65 Techniques IEEE 2008

A Coupled Statistical Model for Face Shape Recovery From Brightness


66 Images IEEE 2007
Distributed Database Architecture for Global Roaming in Next-
67 Generation Mobile Networks IEEE 2007
A Formal Framework for Automated Round-trip Software Engineering in
68 Static Aspect Weaving and Transformations IEEE 2007
69 Adaptive Route Optimization in Hierarchical Mobile IPV6 Networks IEEE 2007
70 Alert Based Monitoring of Stock Trading Systems IEEE 2007
An Empirical Study of Test Case Filtering Techniques Based on
71 Exercising Information Flows IEEE 2007
API-Based and Information Theoretic Metrics for Measuring the Quality
72 of Software Modularization IEEE 2007
73 Detecting Wide Lines Using Isotropic Nonlinear Filtering IEEE 2007
74 Detection and removal of cracks and in digitized Paintings IEEE 2007
75 Digital Image Tracing by Sequential Multiple Watermarking IEEE 2007
76 Distributed Collaborative Key Agreement for Dynamic Peer Groups IEEE 2007
77 EEG Automated Detection of Epilepsy Using Neural Networks IEEE 2007
78 Efficient Approximate Query Processing in Peer-to-Peer Networks IEEE 2007
Efficient Broadcasting with Guaranteed Coverage in Mobile AD-HOC
79 Networks IEEE 2007
80 High Resolution Animated Scenes from Stills IEEE 2007
81 Image Superresolution Using Support Vector Regression IEEE 2007
Learning and Matching of Dynamic Shape Manifolds for Human Action
82 Recognition IEEE 2007
Morphological Granulometric Features of Nucleus in Automatic Bone
83 Marrow White Blood Cell Classification IEEE 2007
84 Perceptual Color Correction Through Variational Techniques IEEE 2007
Provably Secure Three-Party Authenticated Quantum Key Distribution
85 Protocols IEEE 2007
86 Vehicle detection and tracking using acoustic and video sensors IEEE 2007
87 Web Search and Information Retrieval using pFusion Architecture IEEE 2007
88 Web Server load Balancing using SSL Back-End Forwarding Method IEEE 2007
Digital Image Processing Techniques for the Detection and Removal of
89 Cracks in Digitized Paint IEEE 2006

90 APGENCO Web
91 AQA India Web
92 Back to My Village Web
93 BACKUP AND RECOVERY SCHEDULER Web
94 Client Server Based Live Meeting Web
95 Cool cab Service Web
96 Corporate Project Team Management Web
97 Custoer Care Service Web
98 Distributed Payroll Management System Web
99 Eazy Shop Web
100 Evaluation of Employee Performance Web

Você também pode gostar