Software Projects
Projectsatbangalore, offers both IEEE & NON-IEEE Based Software Projects to students in various areas.
MOBILE COMPUTING
1.Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
NETWORKING
1.Design, Implementation, and Performance of A Load Balancer for SIP Server Clusters
2.Router Support for Fine-Grained Latency Measurements
3.Independent Directed Acyclic Graphs for Resilient Multipath Routing
4.MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
5.Opportunistic Flow-level Latency Estimation using NetFlow
PARALLEL DISTRIBUTED SYSTEMS
1.Capacity of Data Collection in Arbitrary Wireless Sensor Networks
2.Bounding the Impact of Unbounded Attacks in Stabilization
3.Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
4.Exploiting Jamming-Caused Neighbor Changes for Jammer Localization
5.Revisiting Dynamic Query Protocols in Unstructured Peer-to-Peer Networks
IMAGE PROCESSING
1.Multiple exposure fusion for high dynamic range image acquisition
DEPENDABLE SECURE COMPUTING
1.ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
DATA MINING
1.Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
2.Scalable Learning of Collective Behavior
MOBILE COMPUTING
1.Throughput Optimization in Mobile Backbone Networks
NETWORKING
1.Continuous Neighbor Discovery in Asynchronous Sensor Networks
2.Data Integrity Proofs in Cloud Storage
DEPENDABLE SECURE COMPUTING
1.The Geometric Efficient Matching Algorithm for Firewalls
2.Analysis on Credit Card Fraud Detection Methods
IMAGE PROCESSING
1.Adaptive Spectral Transform for Wavelet-Based Color Image Compression
2.A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm
3.A New Color Filter Array With Optimal Properties for Noiseless and Noisy Color Image Acquisition
4.Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models
5.A More Secure Steganography Method in Spatial Domain
6.Multiple exposure fusion for high dynamic range image acquisition
7.Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts
8.Blind Image Watermarking Using a Sample Projection Approach
9.A New Color Filter Array With Optimal Properties for Noiseless and Noisy Color Image Acquisition
10.A More Secure Steganography Method in Spatial Domain
CLOUD COMPUTING
1.CloudTPS: Scalable Transactions for Web Applications in the Cloud
INSTRUMENTATION MEASUREMENT
1.Histogram Specification: A Fast and Flexible Method to Process Digital Images
PARALLEL AND DISTRIBUTED SYSTEMS
1.Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
KNOWLEDGE AND DATA ENGINEERING/ DATA MINING
1.Data leakage detection
2.A Personalized Ontology Model for Web Information Gathering
3.One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
4.A Web Search Engine-Based Approach to Measure Semantic Similarity between Words
5.Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
6.Scalable Learning of Collective Behavior
7.Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing
MOBILE COMPUTING
1.Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
2.Optimal Stochastic Location Updates in Mobile Ad Hoc Network
3.A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
4.Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks
5.Interference-Aware Routing in Wireless Multihop Networks
6.On the Effectiveness of Monitoring for Intrusion Detection in Mobile Ad Hoc Networks
7.Spatial-Temporal Coverage Optimization in Wireless Sensor Networks
8.Cross-Layer Optimization for Multimedia Transport over Multicode CDMA Networks
9.On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents
NETWORKING
1.Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks
2.A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
3.Voronoi-based Continuous Query Processing for Mobile Users
4.Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks
5.Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
6.Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration
7.Locating Equivalent Servants over P2P Networks
8.Component-Based Localization in Sparse Wireless Networks
9.Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks
10.A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
11.TOFU: Semi-Truthful Online Frequency Allocation Mechanism for Wireless Networks
12.Parametric Methods for Anomaly Detection in Aggregate Traffic
13.On the Complexity of the Regenerator Placement Problem in Optical Networks
14.ProgME: Towards Programmable Network Measurement
DEPENDABLE SECURE COMPUTING
1.An Efficient Self-Organized Authentication and KeyManagement Scheme for Distributed Multihop Relay-Based IEEE 802.16 Networks
2.Modeling and Detection of Camouflaging Worm
3.A Competitive Study of Cryptography Techniques over Block Cipher
IMAGE PROCESSING
1.Embedded Extended Visual Cryptography Schemes
2.Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
3.Subspace-Based Striping Noise Reduction in Hyperspectral Images
4.Sketch4match – Content-Based Image Retrieval System Using Sketches
CLOUD COMPUTING
1.Secure and Practical Outsourcing of Linear Programming in Cloud Computing
2.Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
3.Towards Secure and Dependable Storage Services in Cloud Computing
COMMUNICATION
1.On Modeling, Analysis, and Optimization of Packet Aggregation Systems
SOFTWARE ENGINEERING
1.Analysis of quality of object oriented systems using object oriented metrics
KNOWLEDGE AND DATA ENGINEERING/ DATA MINING
1.The CoQUOS Approach to Continuous Queries in Unstructured Overlays
2.Extended XML Tree Pattern Matching: Theories and Algorithms
3.Load Shedding in Mobile Systems with MobiQual
Latest Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1.Video Dissemination over Hybrid Cellular and Ad Hoc Networks
2. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
3. Preserving Location Privacy in Geo-Social Applications
4. Efficient Authentication for Mobile and Pervasive Computing
5. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1. Determining Process Model Precision and Generalization with Weighted Arti?cial Negative Events
2. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
3. On the use of Side Information for Mining Text Data
4. Privacy Preserving and Content Protecting Location based Queries
5. Fast Nearest Neighbor Search with Keywords
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
2. Nothing is for Free: Security in Searching Shared and Encrypted Data
3. SocialTube: P2P-assisted Video Sharing in Online Social Networks
4. Behavioral Malware Detection in Delay Tolerant Networks
5. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
CLOUD COMPUTING
1. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
2. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
3. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
4. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
5. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
IMAGE PROCESSING - MULTIMEDIA
1. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
2. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
3. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
1. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
2. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
3. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
4. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
5. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
1. Operational Pattern Revealing Technique in Text Mining
2. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
3. Personalized web search using Browsing history and domain Knowledge
4. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
5. Data Security the Challenge of Cloud Computing
Projects at Bangalore offers Final Year students Engineering projects - ME projects,BE Projects,B.Tech Projects,Electronic Projects,ECE Projects,EEE Projects,Mechanical projects,Bio-Medical Projects,Science Exhibition Kits,Diploma Projects,Software Projects - MCA Projects,M.Sc Projects,BCA Projects,B.Sc Projects,Management projects - MBA Projects,BBM Projects,Seminars,Presentations,Reports and so on...