Loading

Archive for 7 Jul 2012

Seminar / Project Topics for Computer Science, IT & Computer Engineering Students

IEEE Seminar / Project Topics for Computer Science, IT & Computer Engineering Students 2012

  Note : To get Abstract of these topics please leave a comment with your mail id.

KNOWLEDGE AND DATA ENGINEERING/ DATA MINING

  1. Data Leakage Detection - JAVA
  2. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing –JAVA/J2EE
  3. Publishing Search Logs - A Comparative Study of Privacy Guarantees – JAVA/J2EE
  4. Usher: Improving Data Quality with Dynamic Forms – JAVA/J2EE
  5. A Personalized Ontology Model for Web Information Gathering –JAVA/J2EE
  6. Pareto-Based Dominant Graph: An Efficient Indexing Structure to Answer Top-K Queries –DOT NET
  7. Scalable Learning of Collective Behavior –DOT NET
  8. Ranking Spatial Data by Quality Preferences JAVA
  

DEPENDABLE AND SECURE COMPUTING


  1. Nymble: Blocking Misbehaving Users in Anonymizing Networks – JAVA/J2EE
  2. Privacy-Preserving Updates to Anonymous and Confidential Databases – JAVA
  3. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks - JAVA
  4. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks

MOBILE COMPUTING


  1. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks – JAVA/J2EE
  2. Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing - JAVA
  3. Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries -JAVA
  4. On Efficient and Scalable Support of Continuous Queries in Mobile Peer-to-Peer Environments - JAVA

PARALLEL AND DISTRIBUTED SYSTEMS


  1. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems - JAVA
  2. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud – JAVA/J2EE
  3. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing – JAVA/J2EE
  4. Generalized Probabilistic Flooding in Unstructured Peer-to-Peer Networks -JAVA
  5. Traceback of DDoS Attacks Using Entropy Variations -JAVA

NETWORKING


  1. Approaching Throughput-Optimality in Distributed CSMA Scheduling Algorithms With Collisions- JAVA
  2. SRLG Failure Localization in Optical Networks – DOTNET
  3. Valuable Detours: Least-Cost Anypath Routing – DOT NET

SERVICE COMPUTING  

  1. Towards Secure and Dependable Storage Services in Cloud Computing- JAVA/J2EE

INFORMATION SECURITY  

  1. Steganalysis of JPEG steganography with complementary embedding strategy- DOT NET

Other Topics (Unsorted) - 

1. IR-Tree: An Efficient Index for Geographic Document Search
2. A Fuzzy Self-Constructing Feature Clustering
3. Algorithm for Text Classification
4. Anonymous Publication of Sensitive Transactional
5. Cosdes: A Collaborative Spam Detection System with a Novel Efficient Relevance
Feedback for Content-Based Image Retrieval by Mining User Navigation Patterns
6. A Personalized Ontology Model for Web Information Gathering
7. A Unified Probabilistic Framework for Name Disambiguation in Digital Library
8. Improving Aggregate Recommendation Diversity
9. Using Ranking-Based Techniques
10. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web
Databases
11. Effective Navigation of Query Results Based on Concept Hierarchies
12. Data Leakage Detection
13. Bridging Domains Using World Wide Knowledge for Transfer Learning
14. TEXT: Automatic Template Extraction from Heterogeneous Web Pages
15. Mining Web Graphs for Recommendations
16. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
17. Document Clustering in Correlations Similarity Measure Space
18. Scalable Learning of Collective Behavior
19. Query Planning for Continuous Aggregation Queries over a Network of Data
Aggregators
20. A Query Formulation Language for the Data Web
21. Scalable Scheduling of Updates in Streaming Data Warehouses
22. Publishing Search Logs - A Comparative Study of Privacy Guarantees
23. Optimal Service Pricing for a Cloud Cache
24. On the Complexity of View Update Analysis and its
25. Application to Annotation Propagation
26. Exploring Application-Level Semantics for Data Compression .
27. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
28. Exploring Application-Level Semantics for Data Compression
29. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
30. Document Clustering in Correlations Similarity Measure Space
31. Scalable Learning of Collective Behavior
32. Query Planning for Continuous Aggregation Queries over a Network of Data
Aggregators
33. A Query Formulation Language for the Data Web
34. Scalable Scheduling of Updates in Streaming Data Warehouses
35. Publishing Search Logs - A Comparative Study of Privacy Guarantees
36. Optimal Service Pricing for a Cloud Cache
37. On the Complexity of View Update Analysis and its Application to Annotation
Propagation
38. Exploring Application-Level Semantics for Data Compression .
39. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
40. Exploring Application-Level Semantics for Data Compression


1 Comment