Friday 11 October 2013

Final Year Project Topics - Computer Engineering

Computer Engg.



List Of Topics:

  • CLOUD COMPUITNG
    Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
    PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
    Privacy-Preserving Public Auditing for Secure Cloud Storage
    A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
    Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
    Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
    A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
    Privacy-Preserving Public Auditing for Secure Cloud Storage
    Winds of Change From Vendor Lock-In to the Meta Cloud.
    Cloud computing for mobile users can offloading compution save energy.
    On Data Staging Algorithms for Shared Data Accesses in Clouds
    Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
    AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
    A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
    Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
    Load Rebalancing for Distributed File Systems in Clouds
    Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
    Privacy Preserving Delegated Access Control in Public Clouds
    Attribute-Based Encryption with Verifiable Outsourced Decryption
    Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
    Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
    CloudMoV: Cloud-based Mobile Social TV
    QoS Ranking Prediction for Cloud Services
    Privacy-Preserving Public Auditing for Secure Cloud Storage
    AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.





  • DATA MINING
    A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
    A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
    A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
    A Survey of XML Tree Patterns
    Change Detection in Streaming Multivariate Data Using Likelihood Detectors
    Dynamic Personalized Recommendation on Sparse Data
    Mining User Queries with Markov Chains: Application to Online Image Retrieval
    Optimal Route Queries with Arbitrary Order Constraints
    Failure-Aware Cascaded Suppression in Wireless Sensor Networks



  • KNOWLEDGE AND DATA ENGINEERING
    Facilitating Document Annotation using Content and Querying Value
    A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
    A System to Filter Unwanted Messages from OSN User Walls
    Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.
    Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers
    Spatial Approximate String Search
    Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
    m-Privacy for Collaborative Data Publishing
    Protecting Sensitive Labels in Social Network Data Anonymization
    Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
    Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
    A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs
    Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
    Crowdsourcing Predictors of Behavioral Outcomes
    Preventing Private Information Inference Attacks on Social Networks
    Multiparty Access Control for Online Social Networks Model and Mechanisms
    Incentive Compatible Privacy-Preserving Data Analysis
    A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
    A New Algorithm for Inferring User Search Goals with Feedback Sessions
    Annotating Search Results from Web Databases
    Anomaly Detection via Online Over-Sampling Principal Component Analysis



  • SECURE COMPUTING
    WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
    Two tales of privacy in online social networks
    Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
    Twitsper: Tweeting Privately
    Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
    Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
    CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
    Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
    Two tales of privacy in online social networks.
    EAACK—A Secure Intrusion-Detection System for MANETs
    Identity-Based Secure Distributed Data Storage Schemes
    Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
    NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    Privacy Preserving Data Sharing With Anonymous ID Assignment
    Securing Class Initialization in Java-like Languages
    Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
    SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems



  • NETWORKING
    Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
    An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
    An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
    A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
    Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.
    Participatory Privacy Enabling Privacy in Participatory Sensing.
    A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
    Delay-Based Network Utility Maximization
    Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
    Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
    On the Node Clone Detection in Wireless Sensor Networks
    PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
    Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
    Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
    Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
    Efficient Algorithms for Neighbor Discovery in Wireless Networks
    Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
    Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
    Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
    Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
    Participatory Privacy: Enabling Privacy in Participatory Sensing
    Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks



  • PARALLEL AND DISTRIBUTED SYSTEMS
    Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
    Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
    BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
    Towards Differential Query Services in Cost-Efficient Clouds.
    A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.
    Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.
    ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.
    A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
    Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
    IP-Geolocation Mapping for Moderately Connected Internet Regions
    Optimal Client-Server Assignment for Internet Distributed Systems
    SocialTube P2P-assisted Video Sharing in Online Social Networks
    A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    IP-Geolocation Mapping for Moderately Connected Internet Regions
    A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
    Analysis of Distance-Based Location Management in Wireless Communication Networks.
    Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
    Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
    Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems



  • MOBILE COMPUTING
    Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
    Toward a Statistical Framework for Source Anonymity in Sensor Networks
    Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
    Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
    Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
    A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
    EAACK—A Secure Intrusion-Detection System for MANETs
    Vampire attacks:Draining life from wireless ad-hoc sensor networks.
    Towards a Statistical Framework for Source Anonymity in Sensor Networks
    Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
    Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
    Content Sharing over Smartphone-Based Delay-Tolerant Networks
    DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
    Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
    On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
    Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
    IP-Geolocation Mapping for Moderately Connected Internet Regions
    Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
    EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
    Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks



  • SERVICE COMPUTING
    NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
    Privacy-Enhanced Web Service Composition
    Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing



  • PATTERN ANALYSIS AND MACHINE INTELLIGENCE
    A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data



  • SERVICES COMPUTING
    A Decentralized Service Discovery Approach on Peer-to-Peer Networks
    Personalized QoS-Aware Web Service Recommendation and Visualization
    Privacy-Enhanced Web Service Composition



All The Best friends for the Projects..

Please Like...Share...& Follow for more contents..!

No comments:

Post a Comment

loading... The Techie's Stop