Final Year Projects 2014-2015

FINAL YEAR PROJECTS 2014-2015 TITLES

JAVA TITLES

No Title Domain
1 Efficient Filtering Algorithms for Location-Aware Publish/Subscribe Data Mining, April 2015
2 Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-Dimensional Space Data Mining, March  2015
3 CrowdOp: Query Optimization for Declarative Crowdsourcing Systems Data Mining, Aug 2015
4 Disease Inference from Health-Related Questions via Sparse Deep Learning Data Mining, Aug  2015
5 Real-Time City-Scale Taxi Ridesharing Data Mining, July 2015
6 t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation Data Mining, Nov 2015
7 RRW – A Robust and Reversible Watermarking Technique for Relational Data Data Mining, April 2015
8 Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment Dependable and Secure Computing, Jul-Aug 2015
9 A Proximity-aware Interest-clustered P2P File Sharing System Parallel and Distributed Systems, Jun 2015
10 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Dependable and Secure Computing, Jun 2015
11 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Dependable and Secure Computing, Jan 2015
12 Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers Dependable and Secure Computing, Jan 2015
13 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce Parallel and Distributed Systems, Mar 2015
14 Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud Parallel and Distributed Systems, Dec 2015
15 Neighbor Discovery in Wireless Networks with Multipacket Reception Parallel and Distributed Systems, Jul 2015
16 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Parallel and Distributed Systems, Feb 2015
17 VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments Parallel and Distributed Systems, Apr 2015
18 A Hybrid Cloud Approach for Secure Authorized Deduplication Parallel and Distributed Systems, May 2015
19 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing Computers, April 2015
20 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing, Apr 2015
21 A privacy-preserving framework for managing mobile ad requests and billing information Mobile Computing, Aug 2015
22 Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image Retrieval Mobile Computing, Apr 2015
23 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks Mobile Computing, Apr 2015
24 E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks Systems Journal, 2015
25 Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography Circuits and Systems for Video Technology, May 2015
26 Stochastic Decision Making for Adaptive Crowdsourcing in Medical Big-Data Platforms Systems, man, and cybernetics, Oct 2015
27 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Circuits and Systems for Video Technology, Oct 2015

 

 

PROJECT 2015

DOTNET TITLES

No Title Domain
1 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks Parallel and Distributed System, April 2015
2 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Computers, April 2015

 

PROJECT 2015

NS2 TITLES

No Title Domain
1 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks Dependable Secure Computing, Jun 2015
2 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing, April 2015
3 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach Systems Journal , Mar 2015
4 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems Mobile Computing, Mar 2015
5 Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks Parallel And Distributed Systems, April 2015
6 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks Parallel And Distributed Systems, April 2015
7 Power-Aware Computing in Wearable Sensor Networks: An Optimal Feature Selection Mobile Computing, April 2015
8 Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks Networking, Feb 2015
9 On Availability-Performability Tradeoff in Wireless Mesh Networks Mobile Computing, Mar 2015
10 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks Parallel And Distributed Systems, April 2015
11 Trust Management for Defending On-Off Attacks Parallel And Distributed Systems, April 2015
12 Energy Consumption Optimization for Multihop Cognitive Cellular Networks Mobile Computing, Feb 2015
13 Link Capacity-energy Aware WDC for Network Lifetime Maximization Mobile Computing, Aug 2015
14 REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks Dependable and Secure Computing, Aug 2015
15 Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding Mobile Computing, Aug 2015
16 Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks Industrial informatics, Feb 2015
17 VGDRA: A Virtual Grid-Based Dynamic Routes Adjustment Scheme for Mobile Sink-Based Wireless Sensor Networks Sensors journal, Jan 2015
18 An Efficient Distributed Trust Model for Wireless Sensor Networks Parallel And Distributed Systems, May 2015
19 Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System VANET, May 2015
20 Time-Delayed Broadcasting for Defeating Inside Jammers Dependable and Secure Computing, Jun 2015
21 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Dependable and Secure Computing, Jan 2015
22 Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks Mobile computing, Aug 2015
23 Neighbor Discovery in Wireless Networks with Multipacket Reception Parallel And Distributed Systems, Jul 2015
24 E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks Sensors journal, 2015
25 A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks Sensors journal, Jun 2015
26 Effective Key Management in Dynamic Wireless Sensor Networks Information forensics and security, Feb 2015
27 CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes Mobile computing, Jun 2015