Tips to select Final Year Projects

Do not Prefer Application Projects. If you want to do then You can get it from Internet . There won’t be any major scope for the Application projects and there won’t be any waitage to the project in the Interview.

Most of the project centers will rename the topic for a particular topic. Get the base paper and verify with our blog to check the genuinity of the project. Identify the best place to do your projects.


Wireless computing domain : cse/it students are not advised to do projects in wiress computing domain. 100% of the projects done in this domain is fake. Base Paper should not contain wireless, protocols, packets. Obviously, wireless computing domain projects without proper sensors and wireless network formation cannot be done. So students should not prefer wireless domain. Simulation project in wireless costs rs. 250 in the market and it’s of no use.

Question to ask: What’s the sensor we are using? What’s the range of wireless communication happening? How we are connecting to the node. Where the nodes are located. If the nodes are located in the same machine or different machine. Throw away the project.


networking project - A real networking project should have real routers. Instead, if we use pictures as routers then it can’t be a real project and there is no scope for the project. simulation project costs only Rs. 200 in tamil nadu.

Question to ask: what kind of router / switch we are going to use? what kind of programming we are going to do in the router. if there is no router, don’t take up this project.

Wifi Projects are not networking projects. This kind of projects cost Rs.200


grid computing domain : absolutely fake project domain. it’s impossible to construct or design grid in the real world. all final year projects in this domain are fake. Implementing a real grid is not possible for a student. simulating grid related projects cost 400 to 500 rs.

Question to ask: what’s the grid we are going to use? is it oracle grid environment or sql azure environment. project related to this domain is fake. no questions to ask.


Cloud Computing domain – Connecting to the external world Atleast next country is cloud computing. If connected to the remote machine or same machine is a simulation project. Any simulation project under this domain costs 200 rs.

Question to ask: where we are connecting to fetch data? if it’s next machine or same machine then it’s networking project not a cloud computing project. The data should be in remote atleast in other country.


Mobile with wireless domain: all the project in this domain is fake. simulation projects costs 270 rs.

Question to ask: no questions to ask. don’t prefer this domain.


Data mining domain – real data mining involves knowledge cube construction and it’s done by the tools ssas and owb. implementing this project only with java or dotnet is fake. constructino a OLAP environment and using mdx queries to fetch data is the real data mining project. simulation project costs 320 rs.

Question to ask: how we are constructing the cube? how we are fetching the data. project with out cube is absolutely fake.


web mining – collating the real data from internet directly. Data processed in database is absolutely fake. simulation project costs 250 rs.

Question to ask: how dynamically we are retrieving the data from internet? how it’s processed based on the base paper.


REAL TIME SURVEILLANCE SECURITY – REAL CAMERA SHOULD BE USED. using web camera is a FAKE PROJECTS. do not do this kind of project. there won’t be any value for this project.
students are not advised to do projects related to videos. the entire source code is available in internet and there is no scope for these projects.

Question to ask: waste domain. don’t prefer.


NETWORKS domain – ROUTER AND SWITCH IS COMPULSORY for a networking project. PICTURS OF rOUTER/NODES/SWITCH/ SERVER IS absolutely FAKE. simulation project doesn't have value and it costs 300-400 rs.

Question to ask: what kind of router / switch we are going to use? what kind of programming we are going to do in the router. if there is no router, don’t take up the project.


SERVER PERFORMANCE – PROJECT SHOULD BE DONE IN THE REAL SERVER LIKE MACHINE with windows server or web sphere or linux os. the server configuration should be minimal OF QUAD CORE WITH SERVER OPERATING SYSTEM(Windows server or websphere) OR ELSE IT’S FAKE. no value for the simulation projects.

Question to ask: getting the server or configuring the server is too costly. how the performance will be calculated. if it’s local machine, then its waste project.


NEURAL NETWORKS - DO NOT PREFER this domain. it’s OUTDATED DOMAIN

Question to ask: nothing to say. no value for this project.


ARTIFICIAL INTELLIGENCE – real ai cANNot BE implemented by final year project centers due to hardware requirements too. REMODIFICATION OF SMALL PIECE OF CODE IN INTERNET CAN BE DONE. REAL ieee PAPERS CANNOT BE IMPLEMENTED. dO NOT PREFER THIS KIND OF PROJECT for completing your final year projects.

Question to ask: don’t prefer this domain.

Friday 21 September 2012

List of IEEE Final year project 2012 - Fake Final Year Projects 2012

Hello Students,
   
   Lots and lots of projects are fake in the market. We are listing down some of the fake projects available in the market. Do not prefer these projects for your final year project.

Almost everything is fake and it cannot be done. 100% of the below projects are simulation based and there is no scope and doesn't even costs Rs. 200.

-------------------------------------------------------------------
A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access
-------------------------------------------------------------------
TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
-------------------------------------------------------------------
Capacity Scaling of Wireless Ad Hoc Networks: Shannon Meets Maxwell
-------------------------------------------------------------------
CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks
-------------------------------------------------------------------
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
-------------------------------------------------------------------
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
-------------------------------------------------------------------
Maximal Scheduling in Wireless Ad Hoc Networks with Hyper graph Interference Models
-------------------------------------------------------------------
Throughput and Energy Efficiency in Wireless Ad Hoc Networks with Gaussian Channels
-------------------------------------------------------------------
Routing Architecture for Vehicular Ad-Hoc Networks
-------------------------------------------------------------------
Evaluating Trust in Ad Hoc Network Routing by Induction of Decision Trees
-------------------------------------------------------------------
Consensus in Sparse, Mobile Ad Hoc Networks
-------------------------------------------------------------------
Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks
-------------------------------------------------------------------
Discovering Characterizations of the Behavior of Anomalous Sub-populations
-------------------------------------------------------------------
Outsourced Similarity Search on Metric Data Assets
-------------------------------------------------------------------
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Slicing: A New Approach to Privacy Preserving
Data Publishing
-------------------------------------------------------------------
Efficient Extended Boolean Retrieval
-------------------------------------------------------------------
Ranking Model Adaptation for Domain-Specific Search
-------------------------------------------------------------------
Data Mining Techniques for Software Effort Estimation: A Comparative Study
-------------------------------------------------------------------
Data-mining experiments on a hydroelectric power plant
Fuzzy Modeling Built Through a Data Mining Process
-------------------------------------------------------------------
GA Guided Cluster Based Fuzzy Decision Tree for Reactive Ion Etching Modeling: A Data Mining Approach
-------------------------------------------------------------------
A Data-Mining Approach to Monitoring Wind Turbines
-------------------------------------------------------------------
A Low-Power Integrated x86–64 and Graphics Processor for Mobile Computing Devices
-------------------------------------------------------------------
Improving QoS in High-Speed Mobility Using Bandwidth Maps
-------------------------------------------------------------------
SenseLess: A Database-Driven White Spaces Network
-------------------------------------------------------------------
A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices
-------------------------------------------------------------------
Building Security into Off-the-Shelf Smartphones
From Context Awareness to Socially Aware Computing
-------------------------------------------------------------------
Location-Based Services on Mobile Phones: Minimizing Power Consumption
-------------------------------------------------------------------
Ubicomp Systems at 20: Progress, Opportunities, and Challenges
-------------------------------------------------------------------
Logical Data models for cloud computing architectures
-------------------------------------------------------------------
Moving 2 Mishap: M2M’s Impact on Privacy and Safety
-------------------------------------------------------------------
Imagining the Future: Thoughts on Computing
-------------------------------------------------------------------
Improving the Automation of Security Information Management: A Collaborative Approach
-------------------------------------------------------------------
Issues and Future Directions in Traffic Classification
-------------------------------------------------------------------
Moving 2 Mishap: M2M’s Impact on Privacy and Safety
Packet-Hiding Methods for Preventing Selective Jamming Attacks Power. Law.
-------------------------------------------------------------------
Security Challenges for the Public Cloud
-------------------------------------------------------------------
Silver Bullet Talks with Deborah Frincke
-------------------------------------------------------------------
Systematic Structural Testing of Firewall Policies
-------------------------------------------------------------------
Logical Data models for cloud computing architectures
-------------------------------------------------------------------
Radar Image Processing with Clusters of Computers.
-------------------------------------------------------------------
Reducing DRAM Image Data Access Energy Consumption in Video Processing.
-------------------------------------------------------------------
Run length-Based Processing Methods for Low Bit-depth Images.
-------------------------------------------------------------------
Select Trends in Image, Video, and Multidimensional Signal Processing.
-------------------------------------------------------------------
Shape-Based Hand Recognition.
-------------------------------------------------------------------
The Past, Present, and Future of Image and Multidimensional Signal Processing.
-------------------------------------------------------------------
Toward a Unified Color Space for Perception-Based Image Processing.
-------------------------------------------------------------------
Video Image Processing with the Sonic Architecture.
-------------------------------------------------------------------
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing
-------------------------------------------------------------------
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------
Bounding the Impact of Unbounded Attacks in Stabilization
Cut Detection in Wireless Sensor Networks
-------------------------------------------------------------------
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
-------------------------------------------------------------------
Capacity of Data Collection in Arbitrary Wireless Sensor Networks
-------------------------------------------------------------------
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
-------------------------------------------------------------------
Cooperative Density Estimation in Random Wireless Ad Hoc Networks -------------------------------------------------------------------
Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks -------------------------------------------------------------------
DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas
 -------------------------------------------------------------------
Automatic Error Analysis Using Intervals.
-------------------------------------------------------------------
Focus on Your Job Search IEEE.
-------------------------------------------------------------------
CAP and Cloud Data Management .
-------------------------------------------------------------------
Clouds Meet Agents toward intelligent cloud services
Digging Into Data.
-------------------------------------------------------------------
Environmental Modeling for Automated Cloud Application Testing.
-------------------------------------------------------------------
Logical Data Models For Cloud Computing Architectures.
-------------------------------------------------------------------
Payments For Outsourced Computations.
-------------------------------------------------------------------
Rise And Fall of the Peer-To-Peer Empire.
-------------------------------------------------------------------
Security Challenges For the Public Cloud.
-------------------------------------------------------------------
The Future of Authentication.
-------------------------------------------------------------------
Cloud Computing Security From Single to Multi-Clouds
-------------------------------------------------------------------
A Mining Technique Using n-Grams and Motion Transcripts for Body Sensor Network Data Repository
-------------------------------------------------------------------
Bridging Social and Data Networks
-------------------------------------------------------------------
Routing in pocket switched networks
-------------------------------------------------------------------
Guest Editorial Introduction to the Special Section: 4G Health—The Long-Term Evolution of m-Health
-------------------------------------------------------------------
Smooth Trade-Offs between Throughput and Delay in Mobile Ad Hoc Networks
-------------------------------------------------------------------
FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
-------------------------------------------------------------------
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
-------------------------------------------------------------------
Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
-------------------------------------------------------------------
A Trigger Identification Service for Defending Reactive Jammers in WSN
-------------------------------------------------------------------
Cloud Data Protection for the Masses
-------------------------------------------------------------------
Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
-------------------------------------------------------------------
Payments for Outsourced Computations
-------------------------------------------------------------------
Efficient Server Provisioning with Control for End-to-End Response Time Guarantee on Multitier Clusters
-------------------------------------------------------------------
Autonomic Placement of Mixed Batch and Transactional Workloads
-------------------------------------------------------------------
Efficient Master/Worker Parallel Discrete Event Simulation on Meta computing Systems
-------------------------------------------------------------------
Comparison-Based System- Level Fault Diagnosis: A Neural Network Approach
-------------------------------------------------------------------
A Symmetric Load Balancing Algorithm with Performance Guarantees for Distributed Hash Tables
-------------------------------------------------------------------
An Online Data Access Prediction and Optimization Approach for Distributed System
-------------------------------------------------------------------
Exploring Peer-to-Peer Locality in Multiple Torrent Environment
-------------------------------------------------------------------
Scalable Real-Time Monitoring Distributed Applications
-------------------------------------------------------------------
A Distributed Control Law for Load Balancing in Content Delivery Networks
-------------------------------------------------------------------
On Optimizing Overlay Unstructured Peer-to-Peer Networks
-------------------------------------------------------------------
Scalable Feedback Aggregating (SFA) Overlay for Large-scale P2P Trust Management
-------------------------------------------------------------------
Load Balance with Imperfect Information in Structured Peer-to-Peer Systems
-------------------------------------------------------------------
On the Robustness of BitTorrent Swarms to Greedy Peers
-------------------------------------------------------------------
Effective Delay-Controlled Load Distribution over Multipath Networks
-------------------------------------------------------------------
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
-------------------------------------------------------------------
Node Reclamation and Replacement for Long-lived Sensor Networks
-------------------------------------------------------------------
Energy Efficient Opportunistic Routing in Wireless Sensor Networks
-------------------------------------------------------------------
Efficient Fuzzy Type-Ahead Search in XML Data
-------------------------------------------------------------------
Creating Evolving User Behavior Profiles Automatically
-------------------------------------------------------------------
Incentive Compatible Privacy- Preserving Data Analysis
-------------------------------------------------------------------
Evaluating Path Queries over Frequently Updated Route collections.
-------------------------------------------------------------------
A User-friendly Patent Search Paradigm
-------------------------------------------------------------------
A Context based Word Indexing Model for Document Summarization
-------------------------------------------------------------------
Document Clustering in Correlation Similarity Measure Space
-------------------------------------------------------------------
Scalable Learning of Collective Behavior
-------------------------------------------------------------------
Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
-------------------------------------------------------------------
Improving Aggregate Recommendation Diversity using Ranking Based Techniques
-------------------------------------------------------------------
Falcons Concept Search: A Practical Search Engine for Web Ontologies
-------------------------------------------------------------------
Privacy-Preserving Updates to Anonymous and Confidential Databases
-------------------------------------------------------------------
Intertemporal Discount Factors as a Measure of Trustworthiness in Electronic Commerce
-------------------------------------------------------------------
On the Security and Efficiency of Content Distribution via Network Coding
-------------------------------------------------------------------
Risk-Aware Mitigation for MANET Routing Attacks
-------------------------------------------------------------------
Detecting Anomalous Insiders in Collaborative Information Systems
-------------------------------------------------------------------
Remote Attestation with Domain-Based Integrity Model and Policy Analysis
-------------------------------------------------------------------
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals
-------------------------------------------------------------------
Secure Failure Detection and Consensus in Trusted Pals
-------------------------------------------------------------------
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
-------------------------------------------------------------------
Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
-------------------------------------------------------------------
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
-------------------------------------------------------------------
Modeling and Detection of Camouflaging Worm
-------------------------------------------------------------------
Towards Situational Awareness of Large-Scale Botnet Probing Events
-------------------------------------------------------------------
A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
-------------------------------------------------------------------
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
-------------------------------------------------------------------
THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
-------------------------------------------------------------------
Toward Secure and Dependable Storage Services in Cloud Computing
-------------------------------------------------------------------
Multicloud Deployment of Computing Clusters for Loosely Coupled MTC Applications
-------------------------------------------------------------------
Collaborative Writing Support Tools on the Cloud
-------------------------------------------------------------------
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
-------------------------------------------------------------------
Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
-------------------------------------------------------------------
On the Cost of Knowledge of Mobility in Dynamic Networks:An Information-Theoretic Approach
-------------------------------------------------------------------
Approximation Algorithms for Data Broadcast in Wireless Networks
-------------------------------------------------------------------
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
-------------------------------------------------------------------
Information Dissemination between Mobile Nodes for Collaborative Context Awareness
-------------------------------------------------------------------
Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
-------------------------------------------------------------------
Secured Trust: A Dynamic Trust Computation Model for Secured Communication in Multi agent Systems
-------------------------------------------------------------------
Online System for Grid Resource Monitoring and Machine Learning-Based Prediction
-------------------------------------------------------------------
Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme
-------------------------------------------------------------------
Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids
-------------------------------------------------------------------
Expanding Service Capacities and Increasing Service Reliabilities for the Grid-Based Utility Computing
-------------------------------------------------------------------
Efficient Genre-Specific Semantic Video Indexing
-------------------------------------------------------------------
Toward P2P-Based Multimedia Sharing in User Generated Contents
-------------------------------------------------------------------
Multiple Description of Coded Video for Path Diversity Streaming Adaptation
-------------------------------------------------------------------
Video Streaming Distribution in VANETs
-------------------------------------------------------------------
A Survey on Visual Content-Based Video Indexing and Retrieval
-------------------------------------------------------------------
Concept-Driven Multi-Modality Fusion for Video Search
-------------------------------------------------------------------
Dynamic Resource Allocation for Parallel Data Processing
in the Cloud
-------------------------------------------------------------------
Dynamic Search Algorithm In Unstructured P2P Networks
-------------------------------------------------------------------
Client-Server Communication Using Multi-Tasking Sockets.
-------------------------------------------------------------------
On-Line Data Transmission Based On Realistic Topologies.
-------------------------------------------------------------------
Efficient Data Transfer Using TCP/IP.
-------------------------------------------------------------------
Analyzing The TCP/IP Performance In Mix Networks
-------------------------------------------------------------------
Enterprise Hazard Management
-------------------------------------------------------------------
SMS Hiding Using Graphical Password
-------------------------------------------------------------------
Personal Expense tracker in android mobile
-------------------------------------------------------------------
GPS based location tracking in cell phone
-------------------------------------------------------------------
Mobile Payment using PayPal and Android
-------------------------------------------------------------------
Discriminating DDOS Attacks From Flash Crowds Using Flow Correlation Coefficient
-------------------------------------------------------------------
Precise, Scalable, And Online Request Tracing For Multitier Services Of Black Boxes
-------------------------------------------------------------------
Balancing The Trade-Offs Between Query Delay And Data between data Availability In Manets
-------------------------------------------------------------------
User-level implementations Of read-copy update
-------------------------------------------------------------------
Measurouting: A Framework For Routing Assisted Traffic Monitoring
-------------------------------------------------------------------
Optimal Construction Of All Shortest Node_Disjoint Paths In Hypercubes
-------------------------------------------------------------------
On Multicopy Opportunistic Forwarding Protocols In Nondeterministic Delay Tolerant Networks
-------------------------------------------------------------------
Ccd: A Distributed Publish/Subscribe Framework For Rich Content Formats
-------------------------------------------------------------------
Compression Of View On Anonymous Networks
-------------------------------------------------------------------
A Framework For Routing Performance Analysis In Delay Tolerant Networks With Application To Noncooperative Networks
-------------------------------------------------------------------
Receiving Buffer Adaptation For High-Speed Data Transfer
-------------------------------------------------------------------
Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks
-------------------------------------------------------------------
Toward Efficient and Simplified Distributed Data Intensive Computing
-------------------------------------------------------------------
Measuring Client-Perceived Page view Response Time of Internet Services
-------------------------------------------------------------------
A Distributed Algorithm for the Replica Placement Problem
-------------------------------------------------------------------
Quasi-Kautz Digraphs for Peer-to-Peer Networks
-------------------------------------------------------------------
The Small World of File Sharing
-------------------------------------------------------------------
Generalized probabilistic flooding in unstructured peer-to-peer networks
-------------------------------------------------------------------
Trace back of DDoS Attacks Using Entropy Variations
-------------------------------------------------------------------
On the Cost of Network Inference Mechanisms
-------------------------------------------------------------------
A Probabilistic Scheme For Keyword-Based Incremental Query Construction
-------------------------------------------------------------------
Continuous Top-K Dominating Queries
-------------------------------------------------------------------
A query formulation language For the data web
-------------------------------------------------------------------
A Unified Probabilistic Framework For Name Disambiguation In Digital Library
-------------------------------------------------------------------
Using Rule Ontology In Repeated Rule Acquisition From Similar Web Sites
-------------------------------------------------------------------
Scalable Scheduling Of Updates In Streaming Data Warehouses
-------------------------------------------------------------------
Achieving Data Privacy Through Secrecy Views And Null-Based Virtual Updates
-------------------------------------------------------------------
Multiparty Access Control For Online Social Networks: Model And Mechanisms
-------------------------------------------------------------------
Automatic Discovery of Personal Name Aliases from the Web
-------------------------------------------------------------------
Efficient Keyword-Based Search for Top-K Cells in Text Cube
-------------------------------------------------------------------
SPARK2: Top-k Keyword Query in Relational Databases
-------------------------------------------------------------------
Data mining for XML query- answering support
-------------------------------------------------------------------
On Computing Farthest Dominated Locations
-------------------------------------------------------------------
Performance Modeling And Analysis Of Network Firewalls
-------------------------------------------------------------------
Revisiting Defenses Against Large-Scale Online Password Guessing Attacks
-------------------------------------------------------------------
Mitigating distributed denial of service attacks in multiparty applications In the presence of clock drifts
-------------------------------------------------------------------
M-Score: A Misuseability Weight Measure
-------------------------------------------------------------------
Recommendation Models For Open Authorization
-------------------------------------------------------------------
Improving Security and Efficiency in Attribute-Based Data Sharing
-------------------------------------------------------------------
A New Chaos-Based Crypto system for Secure Transmitted Images
-------------------------------------------------------------------
CASTLE: Continuously Anonymizing Data Streams
-------------------------------------------------------------------
Hasbe: A Hierarchical Attribute- Based Solution For Flexible And Scalable Access Control In Cloud Computing
-------------------------------------------------------------------
Enhanced privacy id: a direct Anonymous attestation scheme with enhanced revocation capabilities
-------------------------------------------------------------------
A Secure Erasure Code-Based Cloud Storage System With
Secure Data Forwarding
-------------------------------------------------------------------
Trustworthy Coordination Of Web Services Atomic Transactions
-------------------------------------------------------------------
Optimization Of Resource Provisioning Cost In Cloud Computing
-------------------------------------------------------------------
EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course
-------------------------------------------------------------------
A Data Throughput Prediction and Optimization Service for Widely DistributedMany-Task Computing
-------------------------------------------------------------------
Optimal service pricing for a cloud cache
-------------------------------------------------------------------
Work Item Tagging: Communicating Concerns In Collaborative Software Development
-------------------------------------------------------------------
Resource Management For Complex, Dynamic Environments
-------------------------------------------------------------------
Exploiting The Essential Assumptions Of Analogy-Based Effort Estimation
-------------------------------------------------------------------
Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
-------------------------------------------------------------------
Removing Boundary Artifacts
For Real-Time Iterated Shrinkage Deconvolution
-------------------------------------------------------------------
Scalable Coding Of Encrypted Images
-------------------------------------------------------------------
Real time artifact-free image up scaling
-------------------------------------------------------------------
Fuzzy Random Impulse Noise Removal From Color Image Sequences
-------------------------------------------------------------------
On Reliable Broadcast In Low Duty-Cycle Wireless Sensor Networks
-------------------------------------------------------------------
Moderated Group Authoring System For Campus-Wide Workgroups
-------------------------------------------------------------------
Smooth Trade-Offs Between Throughput And Delay In Mobile Ad Hoc Networks
-------------------------------------------------------------------
Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks
-------------------------------------------------------------------
Energy-Efficient Strategies for Cooperative Multi-Channel MAC Protocols
-------------------------------------------------------------------
Measurement-awaremonitor placement and routing: a joint optimization approach for Network-wide measurements
-------------------------------------------------------------------
Detecting And Resolving Firewall Policy Anomalies
-------------------------------------------------------------------
Efficiently Acquiring Communication Traces for Large -Scale Parallel Applications
-------------------------------------------------------------------
Prototype-Based Image Search Reranking
-------------------------------------------------------------------
Privacy Enabled Digital Rights I Management Without Trusted Third Party Assumption
-------------------------------------------------------------------
Aesthetics-Based Stereoscopic Photo Cropping For Heterogeneous Displays
-------------------------------------------------------------------
Tag Tagging: Towards More Descriptive Keywords of Image Content
-------------------------------------------------------------------
A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm
-------------------------------------------------------------------

Regards,
Final Year Project Guide
A Social Thought Person

No comments:

Post a Comment