B.Tech-IT-Dot Net 2018
Download Project List |
Sno
|
Projects List
|
Remarks
|
Abstract
|
NETWORKING
|
1. |
Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks |
IEEE |
Download |
2. |
Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks |
IEEE |
Download |
3. |
Network Traffic Classification Using Correlation Information |
IEEE |
Download |
4. |
A Data Fusion Technique for Wireless Ranging Performance Improvement |
IEEE |
Download |
5. |
EAACK—A Secure Intrusion-Detection System for MANETs |
IEEE |
Download |
6. |
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks |
IEEE |
Download |
7. |
Efficient Algorithms for Neighbor Discovery in Wireless Networks |
IEEE |
Download |
8. |
FairTorrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems |
IEEE |
Download |
9. |
Measu-Routing: A Framework for Routing Assisted Traffic Monitoring |
IEEE |
Download |
10. |
Measuring Multipath Routing in the Internet IEEE |
IEEE |
Download |
11. |
Design and implementation of TARF: a trust aware routing framework for wsns |
IEEE |
Download |
12. |
An Authentication Code Against Pollution Attacks in Network Coding |
IEEE |
Download |
13. |
AMPLE: An adaptive traffic engineering system based on virtual routing topologies |
IEEE |
Download |
14. |
Providing end to end secure communications in wireless sensor networks |
IEEE |
Download |
15. |
Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks |
IEEE |
Download |
16. |
Jamming-Aware Traffic Allocation for Multiple- Path Routing Using Portfolio Selection |
IEEE |
Download |
DATA MINING
|
1. |
Dynamic query forms for database queries |
IEEE |
Download |
2. |
Automatic extraction of top-k lists from the web |
IEEE |
Download |
3. |
Sampling online social network |
IEEE |
Download |
4. |
Secure Mining of Association Rules in Horizontally Distributed Databases |
IEEE |
Download |
5. |
SUSIE Search using services and information extraction |
IEEE |
Download |
6. |
Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis |
IEEE |
Download |
7. |
Scalable Learning of Collective behavior |
IEEE |
Download |
8. |
Data leakage detection |
IEEE |
Download |
9. |
A Survey of Indexing Techniques for Scalable Record Linkage and De duplication |
IEEE |
Download |
10. |
Organizing user search histories |
IEEE |
Download |
11. |
One Size Does Not Fit All: Towards User-and Query-Dependent Ranking For Web Databases |
IEEE |
Download |
MOBILE COMPITING
|
1. |
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes |
IEEE |
Download |
2. |
Trust Based Optimal Routing in MANET'S |
IEEE |
Download |
3. |
Topology control in mobile ad-hoc networks with cooperative communications |
IEEE |
Download |
4. |
Continuous Neighbor Discovery in Asynchronous Sensor Networks |
IEEE |
Download |
CLOUD COMPUTING
|
1. |
Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability |
IEEE |
Download |
2. |
Exploiting Service Similarity for Privacy in Location Based Search Queries |
IEEE |
Download |
3. |
Privacy preserving multi keyword ranked search over encrypted cloud data |
IEEE |
Download |
4. |
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption |
IEEE |
Download |
5. |
Data integrity and data dynamics with secure storage service in cloud |
IEEE |
Download |
6. |
Privacy-Preserving Public Auditing for Secure Cloud Storage |
IEEE |
Download |
7. |
Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud |
IEEE |
Download |
8. |
Load Rebalancing for Distributed File Systems in Clouds |
IEEE |
Download |
9. |
Cloud data production for masses |
IEEE |
Download |
10. |
Efficient similarity search over encrypted data |
IEEE |
Download |
11. |
Efficient audit service outsourcing for data integrity in clouds |
IEEE |
Download |
12. |
Towards Secure and Dependable Storage Services in Cloud Computing |
IEEE |
Download |