IEEE 2010 TITLES

SOFTORIX TECHNOLOGIES PVT.LTD













PROJECT TITLES 2010















ADDRESS:



#72A, 1st Floor, 100 feet road, Vadapalani, Chennai-600026.



E-MAIL:orixprojects@gmail.com,



CONTACT-044-43069973, 9500041 042 ,9500 043 044.











REVIEW MATERIALS FORMAT

REVIEW FORMAT

0TH • TITLE DESCRIPTION

• ABSTRACT

• EXISTING SYSTEM

• LIMITATIONS OF EXISTING SYSTEM

• PROPOSED SYSTEM.

• ADVANTAGES OF PROPOSED SYSTEM.

• PROCESS FLOW DIAGRAMS FOR EXISTING AND PROPOSED SYSTEM.

• H/W & S/W (WITH PPT).

• KEYTERMS.

• REFERENCE PAPERS.

1ST • SCOPE OF THE PROJECT.

• INTRODUCTION.

• MODULES WITH DESCRIPTION.

• UML DIAGRAMS.

• E-R DIAGRAMS.

• DATA FLOW DIAGRAMS AND SYSTEM ARCHITECTURE.

• TECHNIQUES AND ALGORITHM USED CONCLUSION.

• FIRST MODULE EXECUTABLE CODING WITH VIDEO TUTORIAL.

2ND • SECOND AND THIRD MODULE EXECUTABLE CODING WITH VIDEO TUTORIAL

3RD • REST OF THE MODULES EXECUTABLE CODING WITH VIDEO TUTORIAL.

FINAL • FULL PROJECT CODING, DATABASE WITH VIDEO TUTORIAL AND FULL DOCUMENTATION.









TABLE OF CONTENT



ABOUT SOFTORIX

JAVA

INTRODUCTION TO JAVA

JAVA RESEARCH AND CONFERENCE ORIENTED PAPERS

JAVA APPLICATION ORIENTED PAPERS

DOTNET

INTRODUCTION TO DOTNET

DOTNET RESEARCH AND CONFERENCE ORIENTED PAPERS

DOTNET APPLICATION ORIENTED PAPERS















About Softorix :



Softorix Technologies is an inventive, software and hardware-led solutions provider. With a core team of well-qualified professionals representing diverse functional areas such as Information Technology, Embedded Systems and advanced digital signal processing (DSP), we understand the students’ needs, and develop their quality of professional life by simply making the technology readily usable for them. We Practice exclusively in image processing, simulation, optimization, customization and system integration. Our project methodology includes techniques for initiating a project, developing the requirements, making clear assignments to the project team, developing a dynamic schedule, reporting status to executives and problem solving.



In today's competitive environment, students want to ensure that they are getting guidance in an organization that can meet their professional needs. With our well equipped team of solid Information Systems Professionals, who study, design, develop, enhance, customize, implement, maintain and support various aspects of Information Technology, students can be sure that Softorix is just that sort of organization.

Project Guidance



We are providing project guidance for students in all technology and domain by assisting the students in research and development sector. In our training session, we share our technical thoughts and exposure on your area of research to bring best output. As we are exposed with a number of real time projects, guidance from us will be very helpful to students who are aspiring for academic Project work.



As a part, for benefit to students, our team provides the efficient training and a solution .Our team first emphasizes is to, give excellent training by providing them the desired infrastructure.



Guidance to give real time exposure for Students/Trainees and to provide cost effective, technology independent, good quality reusable Intellectual Property cores with quality and cost factor are our important constraints so as to satisfy our customers ultimately. We develop and continuously evaluate systems so as to pursue quality in all our deliverables. At our team, we are completely dedicated to customer’s requirements. Our products are designed and devoted to empower their competitive edge and help them succeed.



JAVA



INTRODUCTION TO JAVA:

Java is an object-oriented, platform independent programming language derives much of its syntax from C and C++. Java is designed to be small, simple, and portable across platforms and operating systems. It is a complete software ecosystem that represents different values to different types of consumer and business users. Java is used to develop executable, distributed applications for delivery to a Java-enabled Web browser or the Java Interpreter.

Why to use java?

Java brings interactivity into the Web

Java technology is applicable for all kind of businesses, mobile devices and PC desktops



Platform independence - It works in most cases flawlessly. It has significantly improved over the years. Some other languages / platform offers some degree of platform independence too. However in Java it is without pain. I develop on Windows and yet deploy on Linux regularly without any issues ever.

Security - Java was designed with security in mind. It provides super solid libraries for all your security requirements. Security in Java was nowhere an afterthought like many other languages.



JAVA

RESEARCH AND CONFERENCE ORIENTED TITLES (IEEE-2010)



DOMAIN: KNOWLEDGE AND DATA ENGINEERING

SINO

PROJECT

CODE TITLES YEAR

1. SOJDM01 Managing Multidimensional Historical Aggregate Data in Unstructured P2P Networks 2010

2. SOJDM02 Completely Lazy Learning 2010

3. SOJDM03 Constrained Skyline Query Processing against Distributed Data Sites 2010

4. SOJDM04 Adaptive Join Operators for Result Rate Optimization on Streaming Inputs 2010

5. SOJDM05 Bin Rank: Scaling Dynamic Authority-Based Search Using Materialized Subgraphs 2010

6. SOJDM06 Asking Generalized Queries to Domain Experts to Improve Learning 2010

7. SOJDM07 Flexible Frameworks for Actionable Knowledge Discovery 2010

8. SOJDM08 Knowledge-Based Interactive Post mining of Association Rules Using Ontologies 2010

9. SOJDM09 Histograms and Wavelets on Probabilistic Data 2010

10. SOJDM10 A Rule-based Trust Negotiation System

2010







DOMAIN: MOBILE COMPUTING

SINO

PROJECT

CODE TITLES YEAR

1. SOJMC01 Decentralized QoS-Aware Check pointing `Arrangement in Mobile Grid Computing 2010

2. SOJMC02 Coverage Inference Protocol for Wireless Sensor Networks 2010

3. SOJMC03 Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes 2010

4. SOJMC04 Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService 2010

5. SOJMC05 Optimal Accounting Policies for AAA Systems in Mobile Telecommunications Networks 2010

6. SOJMC06 Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks 2010

7. SOJMC07 MABS: Multicast Authentication Based on Batch signature 2010

8. SOJMC08 SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments 2010

9. SOJMC09 Optimal Relay Station Placement in Broadband Wireless Access Networks 2010

10. SOJMC10 DCAR: Distributed Coding-Aware Routing in Wireless Networks 2010













DOMAIN: IMAGE PROCESSING

SINO

PROJECT

CODE TITLES YEAR

1. SOJIP01 On High-Order Denoising Models and Fast Algorithms for Vector-Valued Images 2010

2. SOJIP02 A Perceptually Relevant Approach to Ringing Region Detection 2010

3. SOJIP03 Multibody Structure-and-Motion Segmentation by Branch-and-Bound Model Selection 2010

4. SOJIP04 Simple Camera Calibration From a Single Image Using Five Points on Two Orthogonal 1-D Objects 2010

5 SOJIP05 Semantics-Preserving Bag-of-Words Models and Applications 2010



DOMAIN: MULTIMEDIA

SINO

PROJECT

CODE TITLES YEAR

1. SOJMM01 An Efficient and Robust Algorithm for Shape Indexing and Retrieval 2010

2. SOJMM02 A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization 2010

3. SOJMM03 A lightweight sctp for partially reliable overlay video multicast service for mobile terminals 2010

4. SOJMM04 A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm 2010

5. SOJMM05 A Real-Time Framework for Video Time and Pitch Scale Modification 2010



DOMAIN: DEPENDABLE AND SECURE COMPUTING AND NETWORK SECURITY

SINO

PROJECT

CODE TITLES YEAR

1. SOJDS01 Providing Witness Anonymity Under Peer-to-Peer Settings 2010

2. SOJDS02 A Puzzle-Based Defense Strategy Against Flooding Attacks UsingGame Theory 2010

3. SOJDS03 SigFree: A Signature-Free Buffer Overflow Attack Blocker 2010

4. SOJDS04 Layered Approach Using Conditional Random Fields for Intrusion Detection 2010

5. SOJDS05 Secure Data Objects Replication in Data Grid 2010

6 SOJDS06 Shifting Inference Control to User Side: Architecture and Protocol 2010

7 SOJDS07 Using Web-Referral Architectures to Mitigate Denial-of-Service Threats 2010

8 SOJDS08 An Abuse-Free Fair Contract-Signing Protocol Based on the RSA Signature 2010

9 SOJDS09 Secure Client-Side ST-DM Watermark Embedding 2010



DOMAIN: PARALLEL AND DISTRIBUTED COMPUTING

SINO

PROJECT

CODE TITLES YEAR

1. SOJPD01 2PASS: Bandwidth-Optimized Location Cloaking for Anonymous Location-Based Services 2010

2. SOJPD02 Resource Scheduling in Wireless Networks Using Directional Antennas 2010

3. SOJPD03 Robust Load Delegation in Service Grid Environments 2010

4. SOJPD04 Chunk Distribution in Mesh-Based Large-Scale P2P Streaming Systems: A Fluid Approach 2010



DOMAIN: DISTRIBUTED NETWORKING

SINO

PROJECT

CODE TITLES YEAR

1. SOJNW01 Rate Control With Pair wise Intersession Network Coding 2010

2. SOJNW02 Equilibrium of Heterogeneous Congestion Control: Optimality and Stability 2010

3. SOJNW03 Inside the Permutation-Scanning Worms: Propagation Modeling and Analysis 2010

4. SOJNW04 Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility 2010

5. SOJNW05 A General Framework for Service Availability for Bandwidth-Efficient Connection-Oriented Networks 2010

6. SOJNW06 Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications 2010

7. SOJNW07 A Parallel Self-Routing Rearrangeable Non-blocking Multi-Photonic Switching Network 2010

8. SOJNW08 A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks 2010

9. SOJNW09 Provisioning of Deadline-Driven Requests With Flexible Transmission Rates in WDM Mesh Networks 2010

10. SOJNW10 Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks 2010

11. SOJNW11 TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs 2010









DOMAIN: SOFTWARE ENGINEERING

SINO

PROJECT

CODE TITLES YEAR

1. SOJSE01 Understanding Exception Handling: Viewpoints of Novices and Experts 2010

2. SOJSE02 A Quantitative Investigation of the Acceptable Risk Levels of Object-Oriented Metrics in Open-Source Systems 2010

3. SOJSE03 A Framework for Programming Robust Context-Aware Applications 2010

4. SOJSE04 Aspect-Oriented Race Detection in Java 2010





























J

AVA

APPLICATION ORIENTED TITLE (JAVA/J2EE/J2ME)

SINO

PROJECT

CODE TITLES YEAR

1 SOJA01 PROGRESSIVE PARAMETRIC QUERY OPTIMIZATION 2010

2 SOJA02 A GENERIC LOCAL ALGORITHM FOR MINING DATA STREAMS IN LARGE DISTRIBUTED SYSTEMS 2010

3 SOJA03 A RELATION-BASED PAGE RANK ALGORITHM FOR SEMANTIC WEB SEARCH ENGINES 2010

4 SOJA04 GLIP: A CONCURRENCY CONTROL PROTOCOL FOR CLIPPING INDEXING 2010

5 SOJA05 VIDEO EVENT CLASSIFICATION AND IMAGE SEGMENTATION BASED ON NONCAUSAL MULTIDIMENSIONAL HIDDEN MARKOV MODELS 2010

6 SOJA06 SECURITY ANALYSIS OF THE SASI PROTOCOL 2010

7 SOJA07 FLEXIBLE ROLLBACK RECOVERY IN DYNAMIC HETEROGENEOUS GRID COMPUTING 2010

8 SOJA08 INTRUTION DETECTION IN NETWORK SECURITY 2010

9 SOJA09 CRYPTANALYSIS OF A GENERALIZED RING SIGNATURE SCHEME 2010

10 SOJA10 PDCS: SECURITY AND PRIVACY SUPPORT FOR DATA-CENTRIC SENSOR NETWORKS 2010

11 SOJA11 NO-REFERENCE VIDEO QUALITY MONITORING FOR H.264/AVC CODED VIDEO

2010

12 SOJA12 DIFFERENTIATED BANDWIDTH ALLOCATION WITH TCP PROTECTION IN CORE ROUTERS 2010

13 SOJA13 NODE ISOLATION MODEL AND AGE-BASED NEIGHBOR SELECTION IN UNSTRUCTURED P2P NETWORKS 2010

14 SOJA14 A TRAFFIC ENGINEERING APPROACH FOR PLACEMENT AND SELECTION OF NETWORK SERVICES 2010

15 SOJA15 MULTIPLE ROUTING CONFIGURATION FOR FAST IP NETWORK RECOVERY 2010

16 SOJA16 MITIGATING DENIAL-OF-SERVICE ATTACKS ON THE CHORD OVERLAY NETWORK: A LOCATION HIDING APPROACH 2010

17 SOJA17 MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 2010

18 SOJA18 DYNAMIC ROUTING WITH SECURITY CONSIDERATIONS 2010

19 SOJA19 SIMPLISTIC WAY TO FIND FILE SHARING AND GIFT GIVING 2010

20 SOJA20 RESOURCE MANAGEMENT USING QUIVER 2010

21 SOJA21 EVALUATION OF THE EFFICACY OF FEC CODING FOR COMBATING NETWORK PACKET LOSSES USING A MODEL-BASED APPROACH 2010

22 SOJA22 TECHNIQUE FOR FINDING SHORTEST PATH IN CONSTRAINED NETWORK 2010

23 SOJA23 LESS-STRUCTURED P2P SYSTEM DESIGNING FOR EXPECTED HIGH CHURN 2010

24 SOJA24 IMPROVING ACTIVE PACKET LOSS MEASUREMENT USING A GEOMETRIC APPROACH 2010

25 SOJA25 MULTIPLE CONFLICTING INFORMATION PROVIDERS

FOR TRUTH DISCOVERY ON WEB 2010

26 SOJA26 EFFICIENT ACCESS TO HIGH DIMENSIONAL DATABASES-AN INDEX BASED APPROACH 2010

27 SOJA27 DETECTION AND PROJECTING OF MULTI ATTRIBUTE TRANSACTIONAL DATA 2010

28 SOJA28 FAST ACCESS AND RETRIEVAL OF TEMPORAL PATTERNS-INDEX BASED APPROACH 2010

29 SOJA29 INTER-DOMAIN PACKET FILTER-A APPROACH TO MIGRATE IP SPOOFING 2010

30 SOJA30 DATA TRANSFER IN NETWORK USING INTERMEDIARIES –EFFICIENT AND CONFIDENTIAL APPROACH 2010

31 SOJA31 FAULT PREDICTION IN OBJECT-ORIENTED SYSTEM USING CONCEPTUAL COHESION OF CLASSES 2010

32 SOJA32 IMAGE RECONSTRUCTION-GAUSSIAN APPROACH 2010

33 SOJA33 CFA (LOSSLESS COMPRESSION SCHEME FOR BAYER) COLOR FILTER ARRAY IMAGES 2010

34 SOJA34 SHAPE DESCRIPTION IN MULTI SCALE EDGE FIELD 2010

35 SOJA35 PERFORMANCE DEGRADATION AND ELIMINATING THEM-SENSOR NETWORK 2010

36 SOJA36 DATA TRANSFER USING SOCKETS- A MULTI TASK APPROACH 2010

37 SOJA37 BUG TRACING METHOD-A NOVEL APPROACH 2010

38 SOJA38 LAN COMMUNICATION-AN EFFICIENT APPROACH 2010

39 SOJA39 LORD OF LINKS 2010

40 SOJA40 COLLUSIVE PIRACY PREVENTION IN P2P CONTENT DELIVERY NETWORK 2010





DOTNET



INTRODUCTION TO DOTNET

.Network Environment Tools

Framework is designed to interact with two irrespective languages. An application written in VB .NET can reference a DLL file written in C# or a C# application can refer to a resource written in VC++, etc. This cross-language compatibility is possible due to common language runtime.

Real Time Applications & Advantages of .Net

In real time, applications can be created for any kind of industries and it is used resourcefully. For example

• Management details of an organization.

• Web site based applications.

• Create software in both internet and intranet

The .NET Framework offers a number of advantages

• Write once, run everywhere

• Multiple programming languages (44+)

• Coding Reduction

• Ease of Deployment

• Security(Code access, Evidence-based, Role-based)

• Cryptography

D

OTNET

RESEARCH AND CONFERENCE ORIENTED TITLES (IEEE-2010)

DOMAIN: KNOWLEDGE AND DATA ENGINEERING



SINO PROJECT

CODE TITLES YEAR

1. SODDM01 Domain-Driven Data Mining: Challenges and Prospects 2010

2. SODDM02 Efficient Multidimensional Suppression for K-Anonymity 2010

3. SODDM03 Continuous Sub graph Pattern Search over Certain and Uncertain Graph Streams 2010

4. SODDM04 Projective Distribution of XQuery with Updates 2010

5. SODDM05 Data Leakage Detection 2010

6. SODDM06 Maintaining Recursive Views of Regions and Connectivity in Networks 2010

7. SODDM07 Towards an Effective XML Keyword Search 2010

8. SODDM08 Personalizing Web Directories with the Aid of Web Usage Data 2010

9. SODDM09 Bridging Domains Using World Wide Knowledge For Transfer Learning 2010

10. SODDM10 Integrated Rule-Based Learning and Inference

2010













DOMAIN: MOBILE COMPUTING

SINO PROJECT

CODE TITLES YEAR

1. SODMC01 VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks 2010

2. SODMC02 High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements 2010

3. SODMC03 On the Performance Bounds of Practical Wireless Network Coding 2010

4. SODMC04 Accurate and Energy-Efficient Range-Fre Localization for Mobile Sensor Networks 2010

5. SODMC05 Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks 2010

6 SODMC06 Maximizing Rewards in Wireless Networks with Energy and Timing Constraints for Periodic Data Streams 2010

7 SODMC07 Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes 2010

8 SODMC08 Enabling Efficient Peer-to-Peer Resource Sharing in Wireless Mesh Networks 2010

9 SODMC09 Cost Analysis of Short Message Retransmissions 2010

10 SODMC10 Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks 2010











DOMAIN: IMAGE PROCESSING

SINO PROJECT CODE TITLES YEAR

1. SODIP01 Sparse Bayesian Learning of Filters for Efficient Image Expansion 2010

2. SODIP02 A Logarithmic Quantization Index Modulation for Perceptually Better Data Hiding 2010

3. SODIP03 A Particle Filtering Framework for Joint Video Tracking and Pose Estimation 2010

4. SODIP04 Generic Lossless Visible Watermarking—A New Approach 2010

5. SODIP05 General Road Detection from a Single Image

2010



DOMAIN: MULTIMEDIA

SINO

PROJECT

CODE TITLES YEAR

1. SODMM01 An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering 2010

2. SODMM02 Bridging the Semantic Gap Between Image Contents and Tags 2010

3. SODMM03 On the Annotation of Web Videos by Efficient Near-Duplicate Search 2010

4. SODMM04 Combining Context, Consistency, and Diversity Cues for Interactive Image Categorization 2010

5. SODMM05 On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks 2010









DOMAIN: DEPENDABLE AND SECURE COMPUTING & NETWORK SECURITY

SINO PROJECT

CODE YEAR

1. SODNS01 In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm 2010

2. SODNS02 A Survey on the Encryption of Converge cast Traffic with In-Network Processing 2010

3. SODNS03 SVD-Based Universal Spatial Domain Image Steganalysis 2010

4. SODNS04 Steward: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks 2010

5. SODNS05 Predictive Network Anomaly Detection and Visualization 2010

6. SODNS06 Edge Adaptive Image Steganography Based on LSB Matching Revisited 2010

7. SODNS07 Step Construction of Visual Cryptography Schemes 2010

8. SODNS08 Reversible Image Watermarking Using Interpolation Technique 2010



DOMAIN: PARALLEL AND DISTRIBUTED COMPUTING

SINO

PROJECT

CODE TITLES YEAR

1. SODPD01 An ISP-Friendly File Distribution Protocol:Analysis, Design, and Implementation 2010

2. SODPD02 Fast and Message-Efficient Global Snapshot Algorithms for Large-Scale Distributed Systems 2010

3. SODPD03 Dynamic Data Reallocation in Hybrid Disk Arrays 2010

4. SODPD04 Minimal Sets of Turns for Breaking Cycles in Graphs Modeling Networks 2010





DOMAIN: DISTRIBUTED NETWORKING

SINO

PROJECT

CODE TITLES YEAR

1. SODNW01 POPI: A User-Level Tool for Inferring Router Packet Forwarding Priority 2010

2. SODNW02 Replication Routing in DTNs: A Resource Allocation Approach 2010

3. SODNW03 Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks 2010

4. SONW04 S4: Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks 2010

5. SODNW05 Characterizing Online Games 2010

6. SODNW06 Fast Algorithms for Resource Allocation in Wireless Cellular Networks 2010

7. SODNW07 Distributed Algorithms for Minimum Cost Multicast With Network Coding 2010

8. SODNW08 Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Any cast 2010

9. SODNW09 Replication Routing in DTNs: A Resource Allocation Approach 2010

10. SODNW10 A Fitting Report Position Scheme for the Gated IPACT Dynamic Bandwidth Algorithm in EPONs 2010

11. SODNW11 Fast Algorithms for Resource Allocation in Wireless Cellular Networks 2010

12. SODNW12 Distributed Algorithms for Minimum Cost Multicast With Network Coding 2010





DOMAIN: SOFTWARE ENGINEERING

SINO

PROJECT

CODE TITLES YEAR

1. SODSE01 Finding Bugs in Web Applications Using Dynamic Test Generation and Explicit-State Model Checking 2010

2. SODSE02 Verification and Trade-Off Analysis of Security Properties in UML System Models 2010

3. SODSE03 Software Reliability and Testing Time Allocation: An Architecture-Based Approach 2010

4. SODSE04 Exception Handling for Repair in Service-Based Processes 2010

5. SODSE05 Proofs from Tests 2010



















D

OTNET APPLICATION ORIENTED TITLES

WINDOWS APPLICATION TITLES

SINO PROJECT CODE TITLES YEAR

1. SODA01 SOFTCUTS: A SOFT EDGE SMOOTHNESS PRIOR FOR COLOR IMAGE SUPER-RESOLUTION 2010

2. SODA02 THE EFFECTIVENESS OF CHECKSUMS FOR EMBEDDED CONTROL NETWORKS 2010

3. SODA03 CONSISTENCY MANAGEMENT STRATEGIES FOR DATA REPLICATION IN MOBILE AD HOC NETWORKS 2010

4. SODA04 MESSAGE AUTHENTICATION IN COMPUTATIONALLY CONSTRAINED ENVIRONMENTS 2010

5. SODA05 ON THE PLANNING OF WIRELESS SENSOR NETWORKS: ENERGY-EFFICIENT CLUSTERING UNDER THE JOINT ROUTING AND COVERAGE CONSTRAINT 2010

6. SODA06 ROUTING IN DELAY-TOLERANT NETWORKS COMPRISING HETEROGENEOUS NODE POPULATIONS 2010

7. SODA07 A TRAFFIC ENGINEERING APPROACH FOR PLACEMENT AND SELECTION OF NETWORK SERVICES 2010

8. SODA08 RESEQUENCING ANALYSIS OF STOP-AND-WAIT ARQ FOR PARALLEL MULTICHANNEL COMMUNICATIONS 2010

9. SODA09 ON THE TIME SYNCHRONIZATION OF DISTRIBUTED LOG FILES IN NETWORKS WITH LOCAL BROADCAST MEDIA 2010

10. SODA10 EXPLICIT LOAD BALANCING TECHNIQUE FOR NGEO SATELLITE IP NETWORKS WITH ON-BOARD PROCESSING CAPABILITIES 2010

11. SODA11 ON UNBIASED SAMPLING FOR UNSTRUCTURED PEER-TO-PEER NETWORKS 2010

12. SODA12 THE DESIGN TRADE-OFFS OF BITTORRENT-LIKE FILE SHARING PROTOCOLS 2010

13.



SODA13 OBLIVIOUS ROUTING OF HIGHLY VARIABLE TRAFFIC IN SERVICE OVERLAYS

AND IP BACKBONES 2010

14. SODA14 LEARNING IMAGE-TEXT ASSOCIATIONS 2010

15. SODA15 HISTOGRAM-BASED GLOBAL LOAD BALANCING IN STRUCTURED PEER-TO-PEER SYSTEMS 2010

16. SODA16 A TRANSMISSION CONTROL SCHEME FOR MEDIA ACCESS IN SENSOR NETWORK 2010

17. SODA17 EVALUATING THE VULNERABILITY OF NETWORK TRAFFIC USING JOINT SECURITY AND ROUTING ANALYSIS 2010

18. SODA18 DYNAMIC VERSUS STATIC TRAFFIC POLICING: A NEW APPROACH FOR VIDEOCONFERENCE TRAFFIC OVER WIRELESS CELLULAR NETWORKS 2010

19. SODA19 ANALYZING THE SIGNALING STATUS OF NETWORK TRAFFIC IRREGULARITIES 2010

20. SODA20 DATA MANAGEMENT IN ACQUISITIONED ENVIRONMENT BY MEANS OF PROBABILISTIC MODELS 2010

21. SODA21 UNTRUSTED OPERATING SYSTEMS IMPLEMENTATION ON THE CONVICTED HARDWARE 2010

22. SODA22 EVALUTING THE EFFECT OF A OBJECT ORIENTAL SOFTWARE 2010

23. SODA23 IMAGE RECOVERY VIA TOTAL VARIATION & MINIMIZATION METHOD 2010

24. SODA24 DIGITAL WATERMARKING FOR TAMPER PROOFING AND AUTHENTICATION IN IMAGES 2010

25. SODA25 MODELING AND ANALYSIS OF AN EFFICIENT MULTICAST MECHANISM 2010

26. SODA26 CO-OPERATING CATCHING BY MOBILE CLIENTS IN PUSH BASED INFORMATION SYSTEMS 2010

27. SODA27 EFFICIENT CONTENT DELIVERY IN MOBILE AD-HOC NETWORKS 2010

28. SODA28 ENLIGHTMENT OF AUTOMOBILES MANAGEMENT SYSTEMS 2010

29. SODA29 ESTIMATING COMMERCIAL ACTIVITY MANAGEMENT SYSTEMS 2010

30. SODA30 ASESMENT REPORT THROUGH DISTRIBUTED NETWORKING 2010

31. SODA31 AUTOMATIC ACCUMULATION AND RECUPERATE SCHDULER 2010

32. SODA32 PRO CURING PACKET SWITCHED DATA TRANSMISSION USING ENCODING & DECODING TECHNIQUES 2010

33. SODA33 USER CONVERSATION THROUGH INTRANET 2010

34. SODA34 ANONYMOUS PACKETS TRACING RELATING THE ESTIMATED SOURCE 2010

35. SODA35 HIGH SPEED SWITCH SCHEDULING FOR LOCAL AREA NETWORKS 2010

36. SODA36 ENGLISH TO SPANISH TRANSLATION OF SIGNBOARD IMAGES FROM MOBILE PHONE CAMERA

2010

37. SODA37 SECURITY IMPLEMENTATION IN COOPERATION CACHE WIRELESS NETWORKS 2010

38. SODA38 PRIVACY PRESERVING DATAMINING 2010

39. SODA39 INFORMATION CONTENT-BASED SENSOR SELECTION AND TRANSMISSION POWER ADJUSTMENT FOR COLLABORATIVE TARGET 2010

40 SODA40 HIERARICHAL KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS 2010



WEB APPLICATION

SINO PROJECT CODE TITLES YEAR

1. SODW01 INTERACTIVE CORRECTION AND RECOMMENDATION FOR COMPUTER LANGUAGE LEARNING AND TRAINING 2010

2. SODW02 IMPROVING PERSONALIZATION SOLUTIONS THROUGH OPTIMAL SEGMENTATION OF CUSTOMER BASES 2010

3. SODW03 NNEXUS: AN AUTOMATIC LINKER FOR COLLABORATIVE WEB-BASED CORPORA 2010

4. SODW04 EVALUVATING META-SEARCH ENGINE MERGE ALGORITHMS 2010

5. SODW05 MINING E-COMMERCE DATA TO ANALYZE CUSTOMER BEHAVIOUR 2010

6. SODW06 NOVEL WEIGHTED GRAPH BASED GROUPING ALGORITHM FOR METADATA PREFETCHING 2010

7. SODW07 ONLINE AUTOMATION OF JEWELLS IN ALL SORT OF CARS 2010

8. SODW08 AN ADVANCED DISTRIBUTED APPROACH TO SURMOUNT THE OVERLAY MISMATCHING PROBLEMS 2010

9. SODW09 HIGH PERFORMANCE DATA STREAM PROCESSING ON A NOVAL HARDWARE ENHANCED FRAMEWORK 2010

10. SODW10 ONLINE COMPETENT WEB SERVICE AHEAD OF COMPONENT BASED COMPUTING 2010

11. SODW11 TWO CONTROLLED EXPERIMENTS CONTAINING THE COMPARISSON OF PAIR,PROGRAMMING TO PEER REVIEW 2010

12. SODW12 STRUCTURE ANALYSIS OF GAME VIDEOS USING DOMAIN MODELS 2010

13. SODW13 WEBSITE GUIDING SYSTEMS FOR ORGANIZATION 2010

14. SODW14 ONLINE CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS 2010

15. SODW15 PRACTICAL MANAGEMENT AND STANDARD ADMINISTRATIVE SYSTEM 2010

16. SODW16 ONLINE -NET BANKING SYSTEMS ENHANCING INTERNET BASED RESEARCH PROGRAM 2010

17. SODW17 EDUCATIONAL PROGRAM AND ASSESMENT THROUGH INTERNET 2010

18 SODW18 ENHANCING INTERNET BASE RESEARCH PROGRAM 2010

19 SODW19 ONLINE MANAGEMENT OF INCOME TAX SERVICES SYSTEM 2010

20 SODW20 ONLINE BOOKING FOR OIL & NATURAL GAS AGENCIES 2010

21 SODW21 ONLINE CUSTOMER EVALUATING & RANKING SYSTEMS 2010

22 SODW22 ONLINE DISTRIBUTED DATA CALENDRING SYSTEMS 2010

23 SODW23 ONLINE TOURISM MANAGEMENT SYSTEM 2010





































SINO

PROJECT

CODE TITLES YEAR

1 SOJWP01 STUDY ABROAD BASED ON THE BEST CRITICS 2010

2 SOWP02 EDUCATIONAL SERVICES BASED ON THE JOB OFFERS 2010

3 SOWP03 TRANSPORT SERVICES BASED ON POPULAR PLACES AND CITY 2010

4 SOWP04 HOTEL MANAGEMENT OFFERS SERVICES BASED ON THE REVIEWS AND RANK. 2010

5 SOWP05 HR MANAGEMENT WITH BUSNIESS CASE STUDY, ORANZATIONAL SERVICES TOWARDS BUSINESS GOAL 2010

6 SOWP06 SEA MARKET MATERIALS FOR E-COMMERCE 2010

7 SOWP07 DATABASE DISTRIBUTORS AMONG TRUST AGENT 2010

8 SOWP08 CONSTRUCTIONAL MATERIALS FOR BUSINESS TRADING. 2010

9 SOWP09 PRAGMATIC PRINTING BOOKS FOR BOOKWORM 2010

10 SOWP10 SHOPPING CART – TEXTTILE INDUSTRY 2010

11 SOWP11 SIGNUP IN MULTI WEBSITE BASED ON SIMILAR WEB CONTENT 2010

12 SOWP12 CRIME POLICE DEPARTMENT DATABASE. 2010

13 SOWP13 JEWELLS CART E-COMMERCE 2010

14 SOWP14 BABY BEDDING MATERIALS BASED ON AGE GROUP 2010

15 SOWP15 SOFTWARE SOLUTIONS FOR DOMAIN PROBLEM 2010

16 SOWP16 ELECTRONICS PRODUCTS FOR INDUSTRIAL NEEDS 2010

17 SOWP17 MATRIMONIALS SERVICES BASED ON INDIVDUAL CATEGORY 2010

18 SOWP18 PRAYER SERVICES 2010

19 SOWP19 LANGUAGES ACADEMY FOR ABROAD

2010

PHP ORIENTED APPLICATION TITLES











MATLAB

Research and Conference based IEEE Titles - 2010





Domain Name: Digital Image Processing

Project Code Titles Year

SODIP01 Adaptive 2-D Wavelet Transform Based on the

Lifting Scheme With Preserved Vanishing Moments 2010

SODIP02 Adaptive Color Feature Extraction Based on

Image Color Distributions. 2010

SODIP03 Adaptive Kernel-Based Image Denoising Employing Semi-Parametric Regularization 2010

SODIP04 Fast Cartoon + Texture Image Filters 2010

SODIP05 Fusion of Intensity and inter-component chromatic difference for effective and robust colour edge detection

2010

SODIP06 Joint Compression/Watermarking Scheme Using Majority-Parity Guidance and Halftoning-Based Block Truncation Coding

2010

SODIP07 Linear Gaussian blur evolution for detection of blurry images

2010

SODIP08 Multifocus image fusion based on redundant wavelet transform 2010

SODIP09 Multihypothesis recursive video denoising based on separation of motion state

2010

SODIP10 Orientation Modulation for Data Hiding in Clustered-Dot Halftone Prints

2010

SODIP11 Region Merging Techniques Using Information Theory Statistical Measures

2010

SODIP12 Texture Image Segmentation Using Without Re-initialization Geodesic Active Contour Model

2010

SODIP13 Urban features recognition and extraction from very-high resolution multi-spectral satellite imagery: a micro–macro texture determination and integration framework

2010

SODIP14 Robust Global Motion Estimation Oriented to Video Object Segmentation Robust Web Image/Video Super-Resolution 2009

SODIP15 Adaptive Bilateral Filter for Sharpness Enhancement and Noise Removal 2009

SODIP16 A Synopsis of Recent Work in Edge Detection using the DWT

2009

SODIP17 Biometric Inspired Digital Image Steganography

2009

SODIP18 Pattern learning based image restoration using neural networks

2008





Domain Name: Power Electronics



Project Code Titles Year

SOPE01 A Simple Digital Autotuning For Analog Controller

in SMPS 2010

SOPE02 A Single-Phase Z-Source Buck–Boost Matrix Converter 2010

SOPE03 Analysis and Design of a Soft-Switching Boost Converter With an HI-Bridge Auxiliary Resonant Circuit.

2010

SOPE04 Dynamic Hysteresis Current Control to Minimize Switching for Three-Phase Four-Leg VSI Topology to Compensate Nonlinear Load

2010

SOPE05 Experimental Verification of Hopf Bifurcation

in DC–DC Luo Converter 2010

SOPE06 Flexible Power Electronic Transformer. 2010

SOPE07 Switched Inductor Z-Source Inverter

2010

SOPE08 Mix-Voltage Conversion for Single-Inductor

Dual-Output Buck Converters 2009

SOPE09 Integrated Buck–Boost–Quadratic Buck PFC

Rectifier for Universal Input Applications 2009

SOPE10 Harmonics Optimization of the Voltage Balancing

Control for Multilevel Converter/Inverter Systems

2008

SOPE11 Fully Soft-Switched Three-Stage AC–DC Converter 2008

SOPE12

Singular Perturbation Theory for DC–DC Converters and Application to PFC Converters

2008

SOPE13 A 1-MHz High-Efficiency 12-V Buck Voltage

Regulator With a New Current-Source Gate Driver 2008

SOPE14 A Double-Ended ZVS Half-Bridge Zeta Converter 2008

SOPE15 An Efficient AC–DC Step-Up Converter for Low-Voltage Energy Harvesting.

2008

IEEE 2009 TITLES

SOFTORIX TECHNOLOGIES PVT.LTD.CHENNAI-26


PROJECT TILES 2009













Project Guidance For:
B.E, B-Tech, M.E, M-Tech, M.C.A, B.sc, M.sc, B.C.A, M.S, (Also for all software, electronics, electrical and Diploma Students).





JAVA

 INTRODUCTION TO JAVA:
        Java is an object-oriented, platform independent programming language derives much of its syntax from C and C++. Java is designed to be small, simple, and portable across platforms and operating systems. It is a complete software ecosystem that represents different values to different types of consumer and business users. Java is used to develop executable, distributed applications for delivery to a Java-enabled Web browser or the Java Interpreter.
Why to use java?
Java brings interactivity into the Web
Java technology is applicable for all kind of businesses, mobile devices and PC desktops

Platform independence - It works in most cases flawlessly. It has significantly improved over the years. Some other languages / platform offers some degree of platform independence too. However in Java it is without pain. I develop on Windows and yet deploy on Linux regularly without any issues ever.
Security - Java was designed with security in mind. It provides super solid libraries for all your security requirements. Security in Java was nowhere an afterthought like many other languages.


JAVA

RESEARCH AND CONFERENCE ORIENTED TITLES (IEEE-2009)

DOMAIN: DATA MINING

1. UNSUPERVISED MULTIWAY DATA ANALYSIS: A LITERATURE SURVEY  2009
2. THE DEVELOPMENT OF FUZZY ROUGH SETS WITH THE USE OF STRUCTURES AND ALGEBRAS OF AXIOMATIC FUZZY SETS 2009
3. DISTRIBUTED SKYLINE RETRIEVAL WITH LOW BANDWIDTH CONSUMPTION 2009
4. DISTRIBUTIONAL FEATURES FOR TEXT CATEGORIZATION 2009
5. PROGRESSIVE PARAMETRIC QUERY OPTIMIZATION 2009
6. A GENERIC LOCAL ALGORITHM FOR MINING DATA STREAMS IN LARGE DISTRIBUTED SYSTEMS 2009
7. A RELATION-BASED PAGE RANK ALGORITHM FOR SEMANTIC WEB SEARCH ENGINES 2009
8. GLIP: A CONCURRENCY CONTROL PROTOCOL FOR CLIPPING INDEXING 2009


DOMAIN: IMAGE PROCESSING

1. SAR IMAGE REGULARIZATION WITH FAST APPROXIMATE DISCRETE MINIMIZATION 2009
2. ADAPTIVE FUZZY FILTERING FOR ARTIFACT REDUCTION IN COMPRESSED IMAGES AND VIDEOS 2009
3. EXPLOITING MOTION CORRELATIONS IN 3-D ARTICULATED HUMAN MOTION TRACKING 2009
4. VIDEO EVENT CLASSIFICATION AND IMAGE SEGMENTATION BASED ON NONCAUSAL MULTIDIMENSIONAL HIDDEN MARKOV MODELS 2009
5. A ROBUST HIDDEN MARKOV GAUSS MIXTURE VECTOR QUANTIZER FOR A NOISY SOURCE 2009 


DOMAIN: NETWORK SECURITY

1. SECURITY ANALYSIS OF THE SASI PROTOCOL  2009
2. FLEXIBLE  ROLLBACK RECOVERY IN DYNAMIC HETEROGENEOUS GRID COMPUTING  2009
3. INTRUTION DETECTION IN NETWORK SECURITY 2009
4. CRYPTANALYSIS OF A GENERALIZED RING SIGNATURE SCHEME 2009
5.ON THE SECURITY OF AN EFFICIENT TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME 2009

DOMAIN: MOBILE COMPUTING


1.PERFORMANCE OF VOIP OVER MULTIPLE CO-LOCATED IEEE 802.11 WIRELESS LANS 2009
2. PAIRED MEASUREMENT LOCALIZATION: A ROBUST APPROACH FOR WIRELESS LOCALIZATION 2009
3. PDCS: SECURITY AND PRIVACY SUPPORT FOR DATA-CENTRIC SENSOR NETWORKS 2009
4. DESIGN OF FAIR SCHEDULING SCHEMES FOR THE QOS-ORIENTED WIRELESS LAN 2009
5. A GEN2-BASED RFID AUTHENTICATION PROTOCOL FOR SECURITY AND PRIVACY 2009


DOMAIN: MULTIMEDIA

1. MUSIC INFORMATION RETRIEVAL USING SOCIAL TAGS AND AUDIO 2009
2. OPTIMIZED H.264 VIDEO ENCODING AND PACKETIZATION FOR VIDEO TRANSMISSION OVER PIPELINE FORWARDING NETWORKS 2009
3. INTERACTIVE CORRECTION AND RECOMMENDATION FOR COMPUTER LANGUAGE LEARNING AND TRAINING 2009
4. LOCALITY-AWARENESS IN BITTORRENT-LIKE P2P APPLICATIONS 2009
5. NO-REFERENCE VIDEO QUALITY MONITORING FOR H.264/AVC CODED VIDEO 2009

DOMAIN: SOFTWARE ENGG

1. AUTOMATED TRACE ANALYSIS OF DISCRETE-EVENT SYSTEM MODELS 2009
2. COMPOSITIONAL DEPENDABILITY EVALUATION FOR STATEMATE 2009
3. STATE-DENSITY FUNCTIONS OVER DBM DOMAINS IN THE ANALYSIS OF NON-MARKOVIAN MODELS 2009
4. MODEL CHECKING TIMED AND STOCHASTIC PROPERTIES WITH SLTA 2009
5. DEVELOPMENT OF A SOFTWARE ENGINEERING ONTOLOGY FOR MULTISITE SOFTWARE DEVELOPMENT 2009


DOMAIN: NEURAL NETWORKS

1. A DELAYED PROJECTION NEURAL NETWORK FOR SOLVING LINEAR VARIATIONAL INEQUALITIES 2009
2.PERMITTED AND FORBIDDEN SETS IN DISCRETE-TIME LINEAR THRESHOLD RECURRENT NEURAL NETWORKS2009
3.A GROWING AND PRUNING METHOD FOR RADIALBASIS FUNCTION NETWORKS 2009

DOMAIN: NETWORKING

1. DIFFERENTIATED BANDWIDTH ALLOCATION WITH TCP PROTECTION IN CORE ROUTERS 2009
2. NODE ISOLATION MODEL AND AGE-BASED NEIGHBOR SELECTION IN UNSTRUCTURED P2P NETWORKS 2009
3.NORMALIZED QUEUEING DELAY: CONGESION CONTROL JOINTLY UTILIZING DELAY AND MARKING 2009
4. A TRAFFIC ENGINEERING APPROACH FOR PLACEMENT AND SELECTION OF NETWORK SERVICES 2009
5. MULTIPLE ROUTING CONFIGURATION FOR FAST IP NETWORK RECOVERY 2009
6. DYNAMIC SEARCH ALGORITHM IN UNSTRUCTURED PEER-TO-PEER NETWORKS 2009
7. MITIGATING DENIAL-OF-SERVICE ATTACKS ON THE CHORD OVERLAY NETWORK: A LOCATION HIDING APPROACH 2009
8. MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES 2009
9. MEASURING CAPACITY BANDWIDTH OF TARGETED PATH SEGMENTS 2009
10. DYNAMIC ROUTING WITH SECURITY CONSIDERATIONS 2009







JAVA                    APPLICATION ORIENTED TITLE

1. SIMPLISTIC WAY TO FIND FILE SHARING AND GIFT GIVING 2009
2. RESOURCE MANAGEMENT USING  QUIVER 2009
3. EVALUATION OF THE EFFICACY OF FEC CODING FOR COMBATING NETWORK PACKET LOSSES USING A MODEL-BASED APPROACH 2009
4. TECHNIQUE FOR FINDING SHORTEST PATH IN CONSTRAINED NETWORK 2009
5. LESS-STRUCTURED P2P SYSTEM DESIGNING FOR EXPECTED HIGH CHURN 2009
6. IMPROVING ACTIVE PACKET LOSS MEASUREMENT USING A  GEOMETRIC APPROACH 2009
7. MULTIPLE CONFLICTING INFORMATION PROVIDERS FOR  TRUTH DISCOVERY ON WEB 2009
8. EFFICIENT ACCESS TO HIGH DIMENSIONAL DATABASES-AN INDEX BASED APPROACH 2009
9. DETECTION AND PROJECTING OF MULTI ATTRIBUTE TRANSACTIONAL DATA 2009
10 FAST ACCESS AND RETRIEVAL OF TEMPORAL PATTERNS-INDEX BASED APPROACH 2009
11. INTER-DOMAIN PACKET FILTER-A APPROACH TO MIGRATE IP SPOOFING 2009
12. DATA TRANSFER  IN NETWORK USING  INTERMEDIARIES –EFFICIENT AND CONFIDENTIAL APPROACH 2009
13.FAULT PREDICTION IN OBJECT-ORIENTED SYSTEM USING CONCEPTUAL COHESION OF CLASSES  2009
14 IMAGE RECONSTRUCTION-GAUSSIAN APPROACH 2009
15. CFA (LOSSLESS COMPRESSION SCHEME FOR BAYER) COLOR FILTER ARRAY IMAGES 2009
16 SHAPE DESCRIPTION IN  MULTI SCALE EDGE FIELD 2009
17. PERFORMANCE DEGRADATION AND ELIMINATING  THEM-SENSOR NETWORK 2009
18.DATA TRANSFER USING SOCKETS- A MULTI TASK APPROACH 2009
19BUG  TRACING METHOD-A NOVEL APPROACH 2009
20.LAN  COMMUNICATION-AN EFFICIENT APPROACH 2009














DOTNET

INTRODUCTION TO DOTNET
.Network Environment Tools
                      Framework is designed to interact with two irrespective languages. An application written in VB .NET can reference a DLL file written in C# or a C# application can refer to a resource written in VC++, etc. This cross-language compatibility is possible due to common language runtime.
Real Time Applications & Advantages of .Net
In real time, applications can be created for any kind of industries and it is used resourcefully. For example
·         Management details of an organization.
·         Web site based applications.
·         Create software in both internet and intranet
 The .NET Framework offers a number of advantages
·         Write once, run everywhere
·         Multiple programming languages (44+)
·         Coding Reduction
·         Ease of Deployment
·         Security(Code access, Evidence-based, Role-based)
·         Cryptography


DOTNET  RESEARCH AND CONFERENCE ORIENTED TITLES (IEEE-2009)

DOMAIN: DATA MINING

1. INTERACTIVE CORRECTION AND RECOMMENDATION FOR COMPUTER LANGUAGE LEARNING AND TRAINING  2009
2. COMPRESSION AND AGGREGATION FOR LOGISTIC REGRESSION ANALYSIS IN DATA CUBES 2009
3. LEARNING IMAGE-TEXT ASSOCIATIONS 2009
4. CRYPTANALYSIS OF A GENERALIZED RING SIGNATURE SCHEME 2009
5. IMPROVING PERSONALIZATION SOLUTIONS THROUGH OPTIMAL SEGMENTATION OF CUSTOMER BASES 2009
6.HISTOGRAM-BASED GLOBAL LOAD BALANCING  IN STRUCTURED PEER-TO-PEER SYSTEMS 2009
7. OPTIMAL LOT SIZING POLICIES FOR SEQUENTIAL ONLINE AUCTIONS 2009
8. DETECTING, ASSESSING, AND MONITORING RELEVANT TOPICS IN VIRTUAL  ENVIRONMENTS 2009
9.NNEXUS: AN AUTOMATIC LINKER FOR COLLABORATIVE WEB-BASED CORPORA 2009

DOMAIN: IMAGE PROCESSING
1. VIDEO EVENT CLASSIFICATION AND IMAGE SEGMENTATION BASED ON NONCAUSAL MULTIDIMENSIONAL HIDDEN MARKOV MODELS 2009
2. OPTI-ACOUSTIC STEREO IMAGING: ON SYSTEM CALIBRATION AND 3-D TARGET RECONSTRUCTION 2009
3. SOFTCUTS: A SOFT EDGE SMOOTHNESS PRIOR FOR COLOR IMAGE SUPER-RESOLUTION 2009
4. IMAGE RETARGETING USING MESH PARAMETRIZATION 2009

     DOMAIN: NETWORK SECURITY

1. DYNAMIC VERIFICATION OF MEMORY CONSISTENCY  IN CACHE-COHERENT MULTITHREADED COMPUTER ARCHITECTURES 2009
2. EVALUATING THE VULNERABILITY OF NETWORK TRAFFIC USING JOINT SECURITY AND ROUTING ANALYSIS 2009
3. THE EFFECTIVENESS OF CHECKSUMS FOR EMBEDDED CONTROL NETWORKS  2009


DOMAIN: MOBILE COMPUTING

1. CONSISTENCY MANAGEMENT STRATEGIES FOR DATA REPLICATION IN MOBILE AD HOC NETWORKS 2009
2.MESSAGE AUTHENTICATION IN COMPUTATIONALLY CONSTRAINED ENVIRONMENTS 2009
3.ON THE PLANNING OF WIRELESS SENSOR NETWORKS: ENERGY-EFFICIENT CLUSTERING UNDER THE JOINT ROUTING AND COVERAGE CONSTRAINT 2009
4. ROUTING IN DELAY-TOLERANT NETWORKS COMPRISING HETEROGENEOUS NODE POPULATIONS 2009
5.DYNAMIC VERSUS STATIC TRAFFIC POLICING: A NEW APPROACH FOR VIDEOCONFERENCE TRAFFIC OVER WIRELESS CELLULAR NETWORKS 2009



DOMAIN: MULTIMEDIA

1. EPISODE-CONSTRAINED CROSS-VALIDATION IN VIDEO CONCEPT RETRIEVAL 2009
2. TEXT-LIKE SEGMENTATION OF GENERAL AUDIO FOR CONTENT-BASED RETRIEVAL 2009
3. AN EFFICIENT NEAR-DUPLICATE VIDEO SHOT DETECTION METHOD USING SHOT-BASED INTEREST POINTS 2009
4. ROBUST SCALING-BASED IMAGE WATERMARKING USING MAXIMUM-LIKELIHOOD DECODER WITH OPTIMUM STRENGTH FACTOR 2009
5.ROBUST AUDIO DATA HIDING USING CORRELATED QUANTIZATION WITH HISTOGRAM-BASED DETECTOR 2009

DOMAIN: SOFTWARE ENGG

1. AUTOMATIC EXTRACTION OF HEAP REFERENCE PROPERTIES IN OBJECT-ORIENTED PROGRAMS 2009
2. CHARMY: A FRAMEWORK FOR DESIGNING AND VERIFYING ARCHITECTURAL SPECIFICATIONS 2009
3. VARIABILITY AND REPRODUCIBILITY IN SOFTWARE ENGINEERING: A STUDY OF FOUR COMPANIES THAT DEVELOPED THE SAME SYSTEM 2009
4. VARIABILITY AND REPRODUCIBILITY IN SOFTWARE ENGINEERING: A STUDY OF FOUR COMPANIES THAT DEVELOPED THE SAME SYSTEM 2009
5. IDENTIFICATION OF MOVE METHOD REFACTORING OPPORTUNITIES 2009



DOMAIN: NETWORKING

1. A TRAFFIC ENGINEERING APPROACH FOR PLACEMENT AND SELECTION OF NETWORK SERVICES  2009
2. RESEQUENCING ANALYSIS OF STOP-AND-WAIT ARQ FOR PARALLEL MULTICHANNEL COMMUNICATIONS 2009
3. ON THE TIME SYNCHRONIZATION OF DISTRIBUTED LOG FILES IN NETWORKS WITH LOCAL BROADCAST MEDIA 2009
4. EXPLICIT LOAD BALANCING TECHNIQUE FOR NGEO SATELLITE IP NETWORKS WITH ON-BOARD PROCESSING CAPABILITIES 2009
5. ON UNBIASED SAMPLING FOR UNSTRUCTURED PEER-TO-PEER NETWORKS 2009
6. THE DESIGN TRADE-OFFS OF BITTORRENT-LIKE FILE SHARING PROTOCOLS 2009
7. MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY 2009
8. WEB USER-SESSION INFERENCE BY MEANS OF CLUSTERING TECHNIQUES 2009
9. NORMALIZED QUEUEING DELAY: CONGESTION CONTROL JOINTLY UTILIZING DELAY AND MARKING 2009
10. OBLIVIOUS ROUTING OF HIGHLY VARIABLE TRAFFIC IN SERVICE OVERLAYS AND IP BACKBONES 2009

DOMAIN: NEURAL NETWORKS


1. A CLASS OF SPARSELY CONNECTED AUTOASSOCIATIVE MORPHOLOGICAL MEMORIES FOR LARGE COLOR IMAGES 2009
2.RECURRENT NEURAL NETWORKS TRAINING WITH STABLE BOUNDING ELLIPSOID ALGORITHM 2009


DOTNET APPLICATION ORIENTED TITLES: WINDOWS APPLICATION TITLES 


  


1.
ANONYMOUS PACKETS TRACING RELATING THE ESTIMATED SOURCE
2009
2.
HIGH SPEED SWITCH SCHEDULING  FOR LOCAL AREA NETWORKS
2009
3.
A TRANSMISSION CONTROL SCHEME FOR MEDIA ACCESS  IN SENSOR NETWORK
2009
4.
AN EFFICIENT SHARED DISK FILES SYSTEMS FOR LARGE COMPUTING CLUSTERS.
2009
5.
SCRUTINIZING THE PARALLEL DOWNLOADING FOR LARGE FILE DISTRIBUTION
2009
6.
ANALYZING THE SIGNALING STATUS OF NETWORK TRAFFIC IRREGULARITIES
2009
7.
DATA MANAGEMENT IN ACQUISITIONED ENVIRONMENT BY MEANS OF PROBABILISTIC MODELS
2009
8.
UNTRUSTED OPERATING SYSTEMS IMPLEMENTATION ON THE CONVICTED HARDWARE
2009
9.
EVALUTING THE EFFECT OF A OBJECT ORIENTAL SOFTWARE
2009
10.
IMAGE RECOVERY VIA TOTAL VARIATION & MINIMIZATION METHOD
2009
11.
DIGITAL WATERMARKING FOR TAMPER PROOFING AND  AUTHENTICATION IN IMAGES
2009
12.
MODELING AND ANALYSIS OF AN EFFICIENT MULTICAST  MECHANISM
2009
13.

CO-OPERATING CATCHING BY MOBILE CLIENTS IN PUSH BASED INFORMATION SYSTEMS

2009
14.
EFFICIENT CONTENT DELIVERY IN MOBILE AD-HOC NETWORKS
2009
15.
ENLIGHTMENT OF AUTOMOBILES MANAGEMENT SYSTEMS
2009
16.
ESTIMATING COMMERCIAL ACTIVITY  MANAGEMENT  SYSTEMS
2009
17.
ASESMENT REPORT THROUGH DISTRIBUTED NETWORKING
2009
18.
AUTOMATIC ACCUMULATION AND RECUPERATE SCHDULER
2009
19.
PRO CURING PACKET SWITCHED DATA TRANSMISSION USING ENCODING & DECODING TECHNIQUES
2009
20.
USER CONVERSATION THROUGH INTRANET
2009

    

                           WEB APPLICATION

1.
ONLINE AUTOMATION OF JEWELLS IN ALL SORT OF CARS
2009
2.
AN ADVANCED DISTRIBUTED APPROACH TO SURMOUNT THE OVERLAY MISMATCHING PROBLEMS
2009
3.
ONLINE MANAGEMENT OF INCOME TAX SERVICES SYSTEM
2009
4.
ONLINE BOOKING FOR OIL & NATURAL GAS AGENCIES
2009
5.
ONLINE CUSTOMER EVALUATING & RANKING SYSTEMS
2009
6.
ONLINE DISTRIBUTED DATA CALENDRING SYSTEMS
2009
7.
WEBSITE GUIDING SYSTEMS FOR ORGANIZATION
2009
8.
ONLINE CUSTOMER RELATIONSHIP MANAGEMENT SYSTEMS
2009
9.
PRACTICAL MANAGEMENT AND STANDARD ADMINISTRATIVE SYSTEM
2009
10.
ONLINE  -NET BANKING SYSTEMS ENHANCING INTERNET BASED RESEARCH PROGRAM
2009
11.
EDUCATIONAL PROGRAM AND ASSESMENT THROUGH INTERNET
2009
12.
ENHANCING INTERNET BASE RESEARCH PROGRAM
2009
13.
HIGH PERFORMANCE DATA STREAM PROCESSING ON A NOVAL HARDWARE ENHANCED FRAMEWORK
2009
14.
ONLINE  COMPETENT WEB SERVICE AHEAD OF COMPONENT BASED COMPUTING
2009
15.
TWO CONTROLLED EXPERIMENTS CONTAINING  THE COMPARISSON OF PAIR,PROGRAMMING TO PEER REVIEW
2009
16.
STRUCTURE ANALYSIS OF GAME  VIDEOS USING DOMAIN MODELS
2009
17.
ONLINE  TOURISM MANAGEMENT SYSTEM

NETWORK SECURITY

JAVA


DOMAIN: NETWORK SECURITY


SINO

TITLES
YEAR
1.
SECURITY ANALYSIS OF THE SASI PROTOCOL

2009
2.
FLEXIBLE  ROLLBACK RECOVERY IN DYNAMIC HETEROGENEOUS GRID COMPUTING

2009
3.
INTRUTION DETECTION IN NETWORK SECURITY(HAVE TO SEARCH IN GOOGLE)

2009
4.
CRYPTANALYSIS OF A GENERALIZED RING SIGNATURE SCHEME

2009
5.
ON THE SECURITY OF AN EFFICIENT TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME
2009

IMAGE PROCESSING

JAVA

DOMAIN: IMAGE PROCESSING 2009


SINO

TITLES
1.
SAR IMAGE REGULARIZATION WITH FAST APPROXIMATE DISCRETE MINIMIZATION
2.
ADAPTIVE FUZZY FILTERING FOR ARTIFACT REDUCTION IN COMPRESSED IMAGES AND VIDEOS
3.
EXPLOITING MOTION CORRELATIONS IN 3-D ARTICULATED HUMAN MOTION TRACKING
4.
VIDEO EVENT CLASSIFICATION AND IMAGE SEGMENTATION BASED ON NONCAUSAL MULTIDIMENSIONAL HIDDEN MARKOV MODELS
5.
A ROBUST HIDDEN MARKOV GAUSS MIXTURE VECTOR
QUANTIZER FOR A NOISY SOURCE

IEEE 2009 DATA MINING

IEEE 2009


DOMAIN: DATA MINING


JAVA 



DOMAIN: DATA MINING

SINO

TITLES
YEAR
1.
UNSUPERVISED MULTIWAY DATA ANALYSIS: A LITERATURE SURVEY

2009
2.
THE DEVELOPMENT OF FUZZY ROUGH SETS WITH THE USE OF STRUCTURES AND ALGEBRAS OF AXIOMATIC FUZZY SETS
2009
3.
DISTRIBUTED SKYLINE RETRIEVAL WITH LOW BANDWIDTH CONSUMPTION
2009
4.
DISTRIBUTIONAL FEATURES FOR TEXT CATEGORIZATION

2009
5.
PROGRESSIVE PARAMETRIC QUERY OPTIMIZATION
2009
6.
A GENERIC LOCAL ALGORITHM FOR MINING DATA STREAMS IN LARGE DISTRIBUTED SYSTEMS
2009
7.
A RELATION-BASED PAGE RANK ALGORITHM FOR SEMANTIC WEB SEARCH ENGINES
2009
8.
GLIP: A CONCURRENCY CONTROL PROTOCOL FOR CLIPPING INDEXING
2009