SlideShare a Scribd company logo
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page1 
TABLE OF CONTENTS 
ABOUT IRIS 2 
JAVA 
IEEE TRANSACTIONS ON NETWORKING 3 
IEEE TRANSACTIONS ON NETWORK SECURITY 5 
IEEE TRANSACTIONS ON DATA MINING 7 
IEEE TRANSACTIONS ON CLOUD COMPUTING 10 
IEEE TRANSACTIONS ON MOBILE COMPUTING 13 
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 15 
IEEE TRANSACTIONS ON IMAGE PROCESSING 16 
IEEE TRANSACTIONS ON GRID COMPUTING 18 
IEEE TRANSACTIONS ON MULTI MEDIA 19 
J2EE 
IEEE TRANSACTIONS ON WEB SERVICES & PERVASIVE COMPUTING 20 
ANDROID 
IEEE TRANSACTIONS ON CLOUD COMPUTING & CONTEXT AWARE 21 
IEEE TRANSACTIONS ON MOBILE COMPUTING, DATA ENGINEERING 23 
DOTNET 
IEEE TRANSACTIONS ON NETWORKING 25 
IEEE TRANSACTIONS ON NETWORK SECURITY 26 
IEEE TRANSACTIONS ON DATA MINING 29 
IEEE TRANSACTIONS ON CLOUD COMPUTING 31 
IEEE TRANSACTIONS ON MOBILE COMPUTING 32 
IEEE TRANSACTIONS ON IMAGE PROCESSING 33 
IEEE TRANSACTIONS ON GRID COMPUTING 34 
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 34 
IEEE TRANSACTIONS ON MULTI MEDIA 35 
NS2 38
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page2 
About Iris 
"Iris Solutions - A Boon for Young Technocrats" 
Global presence of technocrats is no more a dream in this world. We make it possible by 
ensuring all the quality standards within an individual which has to be the identity of a successful 
technocrat. 
Irrespective of the technologies and the domain in which a particular project gets shaped, 
we support all kind of student needs in terms of monetary values as well as the time factor. 
Students apart from doing a particular project should know how the project is getting shaped. We 
are aware in making this thing to happen. 
Research and Development plays a vital role in enhancing one’s self development in 
terms of up gradation and moving forward. When you are searching for a good channel to inhibit 
yourself with such a platform, IRIS comes handy. Apart from providing simulation based 
training, we also provide industrial experts in sharing their valuable suggestions and even 
Industry oriented training at required cases. 
In short we strive hard to fulfill the student requirements in terms of each and every 
department of the developing their skills.
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page3 
JAVA 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON NETWORKING 
SNO P.CODE TITLES DESCRIPTION YEAR 
1 ISJNW 01 Transmission-Efficient 
Clustering Method for 
Wireless Sensor Networks 
Using Compressive Sensing 
we propose a clustering method that uses 
hybrid CS for sensor networks. CHs use 
CS to transmit data to sink. We first 
propose an analytical model that studies 
the relationship between the size of 
clusters and number of transmissions in 
the hybrid CS method, 
2014 
2 ISJNW 02 Secure Data Retrieval for 
Decentralized Disruption- 
Tolerant Military Networks 
We propose a secure data retrieval 
scheme using CP-ABE for decentralized 
DTNs where multiple key authorities 
manage their attributes independently. 
2014 
3 ISJNW 03 STARS: A Statistical Traffic 
Pattern Discovery System for 
MANETs 
In this paper, we show that MANETs are 
still vulnerable under passive statistical 
traffic analysis attacks. we present a 
STARS works passively to perform 
traffic analysis based on statistical 
characteristics of captured raw traffic. 
2014 
4 ISJNW 04 Enabling Trustworthy Service 
Evaluation in Service- 
Oriented Mobile Social 
Networks 
We propose a (TSE) system to enable 
users to share (S-MSNs). Each service 
provider independently maintains a TSE 
for itself, which collects and stores users' 
reviews about its services without 
requiring any third trusted authority. 
2014 
5 ISJNW 05 Network Codes Resilient to 
Jamming and Eavesdropping 
We consider the problem of 
communicating information over a 
network secretly and reliably in the 
presence of a hidden adversary who can 
eavesdrop and inject malicious errors. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page4 
6 ISJNW 06 VSPN: VANET-Based Secure 
and Privacy-Preserving 
Navigation 
In this paper, we propose a navigation 
scheme that utilizes the online road 
information collected VANET. The 
proposed scheme has the advantage of 
using real-time road conditions to 
compute a better route and at the same 
time. 
2014 
7 ISJNW 07 Camouflage Traffic: 
Minimizing Message Delay 
for Smart Grid Applications 
under Jamming 
To facilitate efficient information 
exchange, wireless networks have been 
proposed to be widely used in the smart 
grid, which provide jamming resilience 
via multiple frequency and code 
channels, must be adapted to smart grid 
for secure wireless communications, 
2014 
8 ISJNW 08 A Social Network Based File 
Sharing System in 
Mobile Peer-to-peer Networks 
We propose a social network based file 
sharing system in mobile P2P networks. 
It takes advantage of node mobility and 
builds communities based on social 
network. 
2014 
9 ISJNW 09 ReDS: A Framework for 
Reputation-Enhanced DHTs 
we present Reputation for Directory 
Services (ReDS), a framework for 
enhancing lookups in redundant 
DHTs by tracking how well other nodes 
service lookup requests. 
2014 
10 ISJNW 10 Secure and Efficient Data 
Transmission 
for Cluster-Based Wireless 
Sensor Networks 
We propose two secure and efficient 
data transmission (SET) protocols for 
CWSNs, called SET-IBS and SET-IBOOS, 
by using the identity-based 
digital signature (IBS) scheme and the 
identity-based online/offline digital 
signature (IBOOS) scheme, 
2014 
11 ISJNW 11 Continuous and Transparent 
User Identity Verification for 
Secure Internet Services 
Session management in distributed 
Internet services is traditionally based on 
username and password, and explicit 
logouts and timeouts that expire due to 
idle activity of the user. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page5 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY 
SNO P.CODE TITLES DESCRIPTION YEAR 
14 ISJNS 01 Secure Data Aggregation 
Technique for Wireless 
Sensor Networks in the 
Presence of Collusion 
Attacks 
we propose an improvement for iterative 
filtering techniques by providing an initial 
approximation for such algorithms which 
makes them not only collusion robust, but 
also more accurate and faster converging. 
2014 
15 ISJNS 02 RRE: A Game-Theoretic 
Intrusion Response and 
Recovery Engine 
In this paper, we propose a new approach 
to automated response called the Response 
and Recovery Engine (RRE). Our engine 
employs a game-theoretic response 
strategy against adversaries modeled as 
opponents in a two-player Stackelberg 
stochastic game. 
2014 
16 ISJNS 03 An Efficient and Trustworthy 
P2P and Social 
Network Integrated File 
Sharing System 
Efficient and trustworthy file querying is 
important to the overall performance of 
peer-to-peer (P2P) file sharing systems. 
Emerging methods are beginning to 
address this by exploiting online social 
networks (OSNs). 
2014 
17 ISJNS 04 SeLeCT: Self-Learning 
Classifier for Internet Traffic 
In this paper, we propose SeLeCT, a Self- 
Learning Classifier for Internet traffic. It 
uses unsupervised algorithms along with 
2014 
12 ISJNW 12 Error Minimizing Framework 
For Localizing Jammers In 
Wireless Networks 
We aim to design a framework that can 
localize one or multiple jammers with a 
high accuracy. Most of existing jammer-localization 
schemes utilizes indirect 
measurements affected by jamming 
attacks. 
2013 
13 ISJNW 13 Enabling Efficient WiFi- 
Based vehicular content 
distribution 
In this paper, we introduce Cooperative 
Content Distribution System for 
Vehicles which operates upon a network 
of infrastructure APs to collaboratively 
distribute contents to moving vehicles 
2013
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page6 
an adaptive learning approach to 
automatically let classes of traffic emerge, 
being identified. Select automatically 
groups flows into pure clusters using 
alternating simple clustering and filtering. 
18 ISJNS 05 To Shut Them Up or To 
Clarify: Restraining the 
Spread of Rumors in Online 
Social Networks 
In this paper, we focus on this part of 
work. The difficulty is that there does not 
exist a universal standard to evaluate 
them. To address this problem, we carry 
out a series of empirical and theoretical 
analysis on the basis of the introduced 
mathematical model. 
2014 
19 ISJNS 06 Dynamic Trust Management 
for Delay Tolerant 
Networks and Its Application 
to Secure Routing 
Delay tolerant networks (DTNs) are 
characterized by high end-to-end latency, 
frequent disconnection, and opportunistic 
communication over unreliable wireless 
links. we design and validate a dynamic 
trust management protocol for secure 
routing optimization in DTN . 
2014 
20 ISJNS 07 PROFILR: Toward 
Preserving Privacy and 
Functionality in Geo social 
Networks 
In this paper, we propose to take first 
steps toward addressing the conflict 
between profit and privacy in geo social 
networks. We introduce PROFILR, a 
framework for constructing location 
centric profiles (LCPs), aggregates built 
over the profiles of users. 
2014 
21 ISJNS 08 A Decentralized Cloud 
Firewall Framework with 
Resources Provisioning Cost 
Optimization 
We propose a decentralized cloud firewall 
framework for individual cloud 
customers. We investigate how to 
dynamically allocate resources to optimize 
resources provisioning cost. 
2014 
22 ISJNS 09 Secure and Distributed Data 
Discovery and 
Dissemination in Wireless 
Sensor Networks 
A data discovery and dissemination 
protocol for (WSNs) is responsible for 
updating configuration parameters .We 
proposes DiDrip n/w, It allows the 
network owners to authorize multiple 
network users with different privileges to 
simultaneously. 
2014 
23 ISJNS 10 Cost-Effective Authentic and 
Anonymous Data 
Data sharing with a large number of 
participants must take into account several 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page7 
Sharing with Forward 
Security 
issues, including efficiency, data integrity 
and privacy of data owner. 
24 ISJNS 11 SORT:A Self organizing 
Trust Model for Peer-to-Peer 
System 
This paper presents distributed algorithms 
that enable a peer to reason about 
trustworthiness of other peers based on 
past interactions and recommendations. 
2013 
25 ISJNS 12 Unprivileged Black-Box 
Detection of User –Space 
Key 
We propose a new detection technique 
that simulates carefully crafted keystroke 
sequences in input and observes the 
behavior of the keylogger in output to 
unambiguously identify it among all the 
running processes. 
2013 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON DATA MINING 
SNO P.CODE TITLES DESCRIPTION YEAR 
26 ISJDM 01 Data Mining with Big Data 
Big Data concerns large-volume, 
growing data sets with multiple, 
autonomous sources. This article 
presents a HACE theorem that 
character izes the features of the Big 
Data revolution, and proposes a Big 
Data processing model. 
2014 
27 ISJDM 02 OCCT: A One-Class 
Clustering Tree for 
Implementing One-to-Many 
Data Linkage 
In this paper, we propose a new one-to-many 
data linkage method that links 
between entities of different natures. 
The proposed method is based on a 
one-class clustering tree (OCCT) that 
characterizes the entities that should be 
linked together. 
2014 
28 ISJDM 03 KASR: A Keyword-Aware 
Service Recommendation 
Method on Map Reduce 
for Big Data Applications 
It aims at presenting a personalized 
service recommendation list and 
recommending the most appro-priate 
services to the users effectively. 
Specifically, keywords are used to 
indicate users' preferences, and a user-based 
Collaborative Filtering algorithm. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page8 
29 ISJDM 04 An Efficient Clustering 
Sentence-Level Text Using A 
Novel Hierarchical Fuzzy 
Relational Clustering 
Algorithm 
Clustering is the process of grouping or 
aggregating of data items. Sentence 
clustering mainly used in variety of 
applications such as classify and 
categorization of documents, automatic 
summary generation etc. 
2014 
30 ISJDM 05 PPTP: Privacy-Preserving 
Traffic Padding in 
Web-Based Applications 
In this paper, we first observe an 
interesting similarity between this 
privacy-preserving traffic padding 
(PPTP) issue and another well studied 
problem, privacy-preserving data 
publishing(PPDP). 
2014 
31 ISJDM 06 Motif-based Hyponym Relation 
Extraction from Wikipedia 
Hyperlinks* 
This approach automatically constructs 
motif-based features from the hyperlink 
structure of a domain; every hyperlink 
is mapped to a 13-dimensional feature 
vector based on the 13 types of three-node 
motifs. 
2014 
32 ISJDM 07 Cost Minimization for Big Data 
Processing in Geo-Distributed 
Data Centers 
In this paper, we are motivated to study 
the cost minimization problem via a 
joint optimization of these three factors 
for big data services in geo-distributed 
data centers. 
2014 
33 ISJDM 08 Trinity: On Using Trinary Trees 
for Unsupervised Web Data 
Extraction 
Web data extractors are used to extract 
data from web documents in order to 
feed automated processes. we propose a 
technique that works on two or more 
web documents generated by the same 
server-side template and can later be 
used to extract data . 
2014 
34 ISJDM 09 Knowledge Fusion for 
Probabilistic Generative 
Classifiers with Data Mining 
Applications 
In this paper, we introduce a new way 
of fusing classifiers at the level of 
parameters of classification rules. This 
technique is based on the use of 
probabilistic generative classifiers using 
multinomial distributions for 
categorical input dimensions. 
2014 
35 ISJDM 10 CoRE: A Context-Aware 
Relation Extraction Method for 
We propose to formulate search queries 
for each query entity α based on some 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page9 
Relation Completion 
auxiliary information, so that to detect 
its target entity β from the set of 
retrieved documents. 
36 ISJDM 11 Discovering the Top-k 
Unexplained Sequences in 
Time-Stamped Observation 
Data 
In this paper, we start with a known set 
A of activities that we wish to monitor. 
We formally define the probability that 
a sequence of observations is 
unexplained A. 
2014 
37 ISJDM 12 An Unsupervised Feature 
Selection Framework for Social 
Media Data 
In this paper, we study the differences 
between social media data and 
traditional attribute-value data, 
investigate if the relations revealed in 
linked data can be used to select 
relevant features, and propose a novel 
unsupervised feature selection 
framework for linked social media data. 
2014 
38 ISJDM 13 Hadoop Based Enhanced Cloud 
Architecture For Bioinformatic 
Algorithms 
In this paper we present an enhanced 
Hadoop architecture to reduce 
computation by utilizing ―Common 
Features‖ before performing 
redundant computation. The enhanced 
Hadoop architecture allows the jobs to 
share these common features among 
them. 
2014 
39 ISJDM 14 An Empirical Performance 
Evaluation of Relational 
Keyword Search Techniques 
We present the most extensive 
empirical performance evaluation of 
relational keyword search techniques to 
appear to date in the literature. Our 
results indicate that many existing 
search techniques do not provide 
acceptable performance . 
2014 
40 ISJDM 15 Making Use of Partial 
Knowledge About Hidden 
States in HMMs: An Approach 
Based on Belief Functions 
This paper addresses the problem of 
parameter estimation and state 
prediction in hidden Markov models 
based on observed outputs and partial 
knowledge of hidden states expressed 
in the belief function framework. 
2014 
41 ISJDM 16 Effective and Efficient 
Clustering Methods for 
Correlated Probabilistic Graphs 
In this paper, we define the problem of 
clustering correlated probabilistic 
graphs. To solve the challenging 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page10 
problem, we propose two algorithms, 
namely the $PEEDR$ and 
the $CPGS$ clustering algorithm 
42 ISJDM 17 Information Theoretic Outlier 
Detection For Large-Scale 
Categorical Data 
In this paper, we propose a formal 
definition of outliers and an 
optimization model of outlier detection, 
via a new concept of holoentropy that 
takes both entropy. We propose two 
practical 1-parameter outlier detection 
methods, named ITB-SS and ITB-SP. 
2013 
43 ISJDM 18 Secure Provenance 
Transmission For Streaming 
Data 
In this paper, we propose a novel 
approach to securely transmit 
provenance for streaming data by 
embedding provenance into the inter 
packet timing domain while addressing 
the above mentioned issues. 
2013 
44 ISJDM 19 Tweet Analysis for Real-Time 
Event Detection and 
Earthquake Reporting System 
Development 
Twitter has received much attention 
recently. An important characteristic of 
Twitter is its real-time nature. We 
investigate the real-time interaction of 
events such as earthquakes in Twitter 
and propose an algorithm to monitor 
tweets and to detect a target event. 
2013 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING 
SNO P.CODE TITLES DESCRIPTION YEAR 
45 ISJCC 01 Oruta: Privacy-Preserving 
Public Auditing for Shared 
Data in the Cloud 
In this paper, we propose a novel 
privacy-preserving mechanism that 
supports public auditing on shared data 
stored in the cloud. we exploit ring 
signatures to compute verification 
metadata needed to audit the 
correctness of shared data 
2014 
46 ISJCC 02 PACK: Prediction-Based 
Cloud Bandwidth 
and Cost Reduction System 
In this paper, we present PACK, a 
novel end-to-end traffic redundancy 
elimination (TRE) system, designed 
for cloud computing customers. Cloud 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page11 
based TRE needs to apply a judicious 
use of cloud resources so that the 
bandwidth cost reduction combined. 
47 ISJCC 03 Shared Authority Based 
Privacy-preserving 
Authentication Protocol in 
Cloud Computing 
In this paper, we propose a shared 
authority based privacy-preserving 
authentication protocol (SAPA) to 
address above privacy issue for cloud 
storage. 
2014 
48 ISJCC 04 Key-Aggregate Cryptosystem 
for Scalable Data Sharing in 
Cloud Storage 
In this paper, we show how too 
securely, efficiently, and flexibly share 
data with others in cloud storage. The 
novelty is that one can aggregate any 
set of secret keys and make them as 
compact as a single key. 
2014 
49 ISJCC 05 Cloud Genius: A Hybrid 
Decision Support Method for 
Automating the Migration of 
Web Application Clusters to 
Public Clouds 
In this paper, we expand on the 
additional complexity of facilitating 
migration support for multi-component 
web applications. we present an 
evolutionary migration process for 
web application clusters distributed 
over multiple locations.. 
2014 
50 ISJCC 06 An Efficient and Trustworthy 
Resource Sharing Platform for 
Collaborative Cloud 
Computing 
Advancements in cloud computing are 
leading to a promising future for 
collaborative cloud computing (CCC), 
where globally-scattered distributed 
cloud resources belonging to different 
organizations or individuals. 
2014 
51 ISJCC 07 Scalable Distributed Service 
Integrity Attestation for 
Software-as-a-Service Clouds 
In this paper, we present IntTest, a 
scalable and effective service integrity 
attestation framework for SaaS clouds. 
IntTest provides a novel integrated 
attestation graph analysis scheme that 
can provide stronger attacker 
2014 
52 ISJCC 08 NCCloud: A Network- 
Coding-Based Storage System 
in a Cloud-of-Clouds 
To provide fault tolerance for cloud 
storage, recent if a cloud suffers from a 
permanent failure and loses all its data, 
We present a proxy-based storage 
system for fault-tolerant multiple-cloud 
storage called NCCloud, which 
achieves cost-effective repair for a 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page12 
permanent single-cloud failure. 
53 ISJCC 09 Privacy-Preserving Multi- 
Keyword Ranked Search over 
Encrypted Cloud Data 
In this paper, we define and solve the 
challenging problem of privacy-preserving 
multi-keyword ranked 
search over encrypted data in cloud 
computing (MRSE). 
2014 
54 ISJCC 10 Decentralized Access Control 
with Anonymous 
Authentication of Data Stored 
in Clouds 
We propose a new decentralized 
access control scheme for secure data 
storage in clouds that supports 
anonymous authentication. The cloud 
verifies the authenticity of the series 
without knowing the user's identity 
before storing data 
2014 
55 ISJCC 11 Distributed, Concurrent, and 
Independent Access to 
Encrypted Cloud Databases 
Several alternatives exist for storage 
services, while data confidentiality 
solutions for the database as a service 
paradigm are still immature. 
2014 
56 ISJCC 12 Ubiquitous Data Accessing 
Method in IoT-Based 
Information System for 
Emergency Medical Services 
The rapid development of Internet of 
things (IoT) technology makes it 
possible for connecting various smart 
objects together through the Internet 
and providing more data interloper - 
ability methods for application. 
2014 
57 ISJCC 13 PSMPA: Patient Self-controllable 
and Multi-level 
Privacy-preserving 
Cooperative Authentication in 
Distributed m-Healthcare 
Cloud Computing System 
In this paper, a novel authorized 
accessible privacy model (AAPM) is 
established. Patients can authorize 
physicians by setting an access tree 
supporting flexible threshold 
Predicates. 
2014 
58 ISJCC 14 Performance and cost 
evaluation of an adaptive 
encryption architecture for 
cloud databases 
We propose a novel architecture for 
adaptive encryption of public cloud 
databases that offers an interesting 
alternative to the trade-off between the 
required data confidentiality level and 
the flexibility of the cloud database 
structures at design time. 
2014 
59 ISJCC 15 Scalable And Secure Sharing 
Of Personal Health Records In 
We propose a novel patient-centric 
framework and a suite of mechanisms 
2013
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page13 
Cloud Computing Using ABE for data access control to PHRs stored 
in semi trusted servers. To achieve 
fine-grained and scalable data access 
control for PHRs. 
60 ISJCC 16 pCloud: A Distributed System 
for Practical PIR 
we present pCloud, a distributed 
system that constitutes the first attempt 
towards practical cPIR. Our approach 
assumes a disk-based architecture that 
retrieves one page with a single query. 
2013 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING 
SNO P.CODE TITLES DESCRIPTION YEAR 
61 ISJMC 01 Friendbook: A Semantic-based 
Friend 
Recommendation System for 
Social Networks 
We present Friendbook, a novel 
semantic-based friend recommendation 
system for social networks, which 
recommends friends to users based on 
their life styles instead of social graphs. 
2014 
62 ISJMC 02 Optimal Multicast Capacity 
and Delay Tradeoffs in 
MANETs 
In this paper we give a global 
perspective of multicast capacity and 
delay analysis in MANETs. we 
consider four node mobility models: (1) 
two-dimensional (2) two-dimensional 
hybrid random walk, (3) one-dimensional 
(4) one-dimensional hybrid 
random walk. 
2014 
63 ISJMC 03 Energy-Efficient Reliable 
Routing Considering 
Residual Energy in Wireless 
Ad Hoc Networks 
We propose two novel energy-aware 
routing algorithms for wireless ad hoc 
networks, called reliable minimum 
energy cost routing and reliable 
minimum energy routing .RMECR 
addresses three important requirements 
of ad hoc networks energy-efficiency, 
reliability, and prolonging network . 
2014 
64 ISJMC 04 Wormhole Attack Detection 
Algorithms in Wireless 
Network Coding Systems 
In this paper, we quantify wormholes’ 
devastating harmful impact on network 
coding system performance.we propose 
DAWN, a Distributed detection 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page14 
Algorithm against Wormhole in 
wireless Network coding systems, by 
the change of the flow directions of 
packets caused by wormholes 
65 ISJMC 05 A Location-Privacy Threat 
Stemming from the Use of 
Shared Public IP Addresses 
This paper presents a concrete and wide 
spread example of situation where a 
user’s location privacy is 
unintentionally compromised by others, 
specifically the location-privacy threat 
that exists at access points that have a 
single public IP . 
2014 
66 ISJMC 06 A QoS-Oriented Distributed 
Routing Protocol for Hybrid 
Wireless Networks 
In this paper, we propose a QoS-Oriented 
Distributed routing protocol 
(QOD) to enhance the QoS support 
capability of hybrid networks. Taking 
advantage of fewer transmission hops 
and any cast transmission features of 
the hybrid networks. 
2014 
67 ISJMC 07 Leveraging Social Networks 
for P2P Content-Based File 
Sharing in Disconnected 
MANETs 
We propose a P2P content-based file 
sharing system, namely SPOON, for 
disconnected MANETs. The system 
uses an interest extraction algorithm to 
derive a node's interests from its files 
for content-based file searching. 
2013 
68 ISJMC 08 A Joint Design for 
Distributed Stable Routing 
and Channel Assignment 
Over Multihop and Multiflow 
Mobile Ad Hoc Cognitive 
Networks 
In this paper, we propose a cross-layer 
distributed approach, called mobility-prediction- 
based joint stable routing 
and channel assignment (MP-JSRCA), 
to maximize the network throughput by 
jointly selecting stable routes based on 
mobility prediction 
2014 
69 ISJMC 09 The Places of Our Lives: 
Visiting Patterns and 
Automatic Labeling from 
Longitudinal Smartphone 
Data 
This paper presents a study on place 
characterization in people's everyday 
life based on data recorded 
continuously by smartphones.we study 
human mobility from sequences of 
place visits, including visiting patterns 
on different place categories. 
2014 
70 ISJMC 10 Efficient Privacy-Preserving 
Authentication in 
We propose a novel three-round 
anonymous roaming protocol that does 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page15 
Wireless Mobile Networks not require the participation of 
Home servers. The proposed protocol 
uses a pseudo-identity-based sign-cryption 
scheme o perform efficient 
revocation 
71 ISJMC 11 EAACK:A Secure Intrusion 
Detection System 
For MANETs 
In this paper, we propose and 
implement a new intrusion-detection 
system named Enhanced Adaptive 
acknowledgment specially designed for 
MANETs. EAACK demonstrates 
higher malicious-Behavior-detection 
rates in certain circumstances while 
does not greatly affect the network 
performances. 
2013 
72 ISJMC 12 Toward Privacy Preserving 
And Collusion Resistance In 
A Location Proof Updating 
System 
We propose A Privacy-Preserving 
location proof Updating System 
(APPLAUS) in which co-located 
Bluetooth enabled mobile devices 
mutually generate location proofs and 
send updates to a location proof server. 
2013 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON INFORMATION FORENSCIS & SECURITY 
SNO P.CODE TITLES DESCRIPTION YEAR 
73 ISJIF 01 Contrast Enhancement Based 
Forensics In Digital Image 
Contrast enhancement is typically used 
to adjust the global brightness and 
contrast of digital images. we propose 
two novel algorithms to detect the 
contrast enhancement involved 
manipulations in digital images 
2014 
74 ISJIF 02 Subset Membership 
Encryption And Its 
Applications To Oblivious 
Transfer 
In this paper, we propose a novel 
cryptographic notion called subset 
membership encryption (SME), and 
provide a very efficient SME scheme 
2014 
TECHNOLOGY: JAVA
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page16 
DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 
SNO P.CODE TITLES DESCRIPTION YEAR 
75 ISJSE 01 iTree: Efficiently Discovering 
High-Coverage Configurations 
Using Interaction Trees 
This paper presents an improved iTree 
algorithm .The key improvements are 
based on our use of composite proto-interactions 
a construct that improves 
iTree’s ability to correctly learn key 
configuration option combinations. 
2014 
76 ISJSE 02 Continuous and Transparent 
User Identity Verification for 
Secure Internet Services 
This paper explores promising 
alternatives offered by applying 
biometrics in the management of 
sessions. A secure protocol is defined 
for perpetual authentication through 
continuous user verification 
2014 
77 ISJSE 03 Analyzing Critical Decision- 
Based Processes 
Process modeling, process analysis, 
model verification, decision errors, 
safety-critical workflows, non-functional 
requirements, domain-specific 
languages, formal specification 
2014 
78 ISJSE 04 On the Accuracy, Efficiency, 
and Reusability of Automated 
Test Oracles for Android 
Devices 
We proposeSPAG-C (Smart Phone 
Automated GUI testing tool with 
Camera), an extension of SPAG, to test 
an Adroid hardware device. Our goal is 
to further reduce the time required to 
record test cases and increase reusability 
of the test oracle without compromising 
test accuracy. 
2014 
79 ISJSE 05 Ant Colony Optimization for 
Software Project Scheduling and 
Staffing with an Event-Based 
Scheduler 
This paper develops a novel approach 
with an event-based Scheduler (EBS) 
and an ant colony optimization (ACO) 
algorithm. The proposed approach 
represents a plan by a task list and a 
Planned employee allocation matrix. 
2013
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page17 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING 
SNO P.CODE TITLES DESCRIPTION YEAR 
80 ISJIP 01 Frame-Based Recovery of 
Corrupted Video Files 
Using Video Codec 
Specifications 
Recovery of a damaged or altered video 
file plays a crucial role in searching for 
evidences to resolve a criminal case. 
This paper presents a frame-based 
recovery technique of a corrupted video 
file using the specifications of a codec 
used to encode the video data. 
2014 
81 ISJIP 02 Multi label Image 
Classification via High-Order 
Label Correlation Driven 
Active Learning 
we propose a high-order label 
correlation driven active learning 
(HoAL) approach that allows the 
iterative learning algorithm.The 
proposed approach is tested on public 
data sets. 
2014 
82 ISJIP 03 Full-Reference Quality 
Estimation for Images 
With Different Spatial 
Resolutions 
In this paper, we begin by 
Identifying the potential weaknesses of 
previous approaches used to estimate 
the quality of experience, we design a 
QE to estimate the quality of a distorted 
image with a lower resolution. 
2014 
83 ISJIP 04 Single Image Interpolation via 
Adaptive Nonlocal 
Sparsity-Based Modeling 
Single image interpolation is a central 
and extensively studied problem in 
image processing.we proposes a novel 
image interpolation method which 
combines these two forces - non-local 
self-similarities and sparse 
representation modeling. 
2014 
84 ISJIP 05 Object-Oriented Shadow 
Detection and Removal From 
Urban High-Resolution Remote 
Sensing Images 
Change detection, inner–outer outline 
profile line (ioopl), object-oriented, 
relative radiometric correction, shadow 
Detection, shadow removal 
2014 
85 ISJIP 06 Measures of Effective Video 
Tracking 
In this paper, we survey existing multi 
target tracking performance scores and, 
after discussing their limitations, we 
propose three parameter-independent 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page18 
measures for evaluating multi target 
video tracking. 
86 ISJIP 07 Energy Preserving QMF for 
Image Processing 
Implementation of new bi orthogonal 
filter banks (BFB) for image 
compression and denoising is 
performed, using test images with 
diversified characteristics. These new 
BFB’sare linear-phase, have odd 
lengths, and with a critical feature. 
2014 
87 ISJIP 08 A Novel Joint Data Hiding And 
Compression Scheme Based On 
SMVQ And Image Inpainting 
In this paper, we propose a novel joint 
data-hiding and compression scheme 
for digital images using side match 
vector quantization (SMVQ) and image 
inpainting. 
2013 
88 ISJIP 09 Context Dependent Logo 
Matching And Recognition 
We contribute, through this paper, to 
the design of a novel variational 
framework able to match and recognize 
multiple instances of multiple reference 
logos in image archives 
2013 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING 
SNO P.CODE TITLES DESCRIPTION YEAR 
89 ISJGC 01 Data Attack Isolation in Power 
Networks Using Secure 
Voltage Magnitude 
Measurements 
In this paper a procedure to detect and 
isolate data attacks on power network 
power flow measurements is proposed. 
This method can be used in conjunction 
with available bad data detection 
(BDD) methods to isolate multiple bad 
data which are otherwise difficult to 
handle. 
2014 
90 ISJGC 02 PRGA: Privacy-preserving 
Recording &Gateway-assisted 
Authentication of Power Usage 
Information for Smart Grid 
We propose a scheme such that even 
the control center does not know which 
user makes the requests of using more 
power or agreements of using less 
power until the power is actually used.. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page19 
91 ISJGC 03 Resource Selection for Tasks 
with Time Requirements Using 
Spectral Clustering 
We propose an algorithm for assigning 
tasks to resources that minimizes the 
violations of the tasks’ time 
requirements while simultaneously 
maximizing the resources’ utilization 
efficiency for a given number of 
resources. 
2014 
92 ISJGC 04 On the Design of Mutually 
Aware Optimal Pricing and 
Load Balancing Strategies for 
Grid Computing Systems 
Managing resources and cleverly 
pricing them on computing systems is a 
challenging task. Resource sharing 
demands careful load balancing and 
often strives to achieve a win-win 
situation between resource providers 
and users 
2013 
TECHNOLOGY: JAVA 
DOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA 
SNO P.CODE TITLES DESCRIPTION YEAR 
93 ISJMM 01 An Adaptive Energy-Efficient 
Stream Decoding 
System for Cloud Multimedia 
Network on Multi-core 
Architectures 
This paper proposed an adaptive 
energy-efficient stream decoding 
system for cloud multimedia network 
on multicore systems. The overall 
dynamic energy-efficient design was 
planned in a systematic viewpoint. 
2014 
94 ISJMM 02 Business Intelligence from 
Social Media: A Study from 
the VAST Box Office 
Challenge 
The goal is to extract information from 
this noisy, unstructured data and use it 
for trend analysis and prediction. This 
paper presents a visual analytics system 
which extracts data from Bitly and 
Twitter to use for box office revenue 
and user rating predictions. 
2014 
95 ISJMM 02 Uniform Embedding for 
Efficient JPEG Steganography 
In this paper, a class of new 
distortion functions known as uniform 
embedding distortion function (UED) is 
presented for both side-informed and 
non side-informed secure JPEG 
steganography. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page20 
J2EE 
TECHNOLOGY: J2EE 
DOMAIN : WEB SERVICES 
SNO P.CODE TITLES DESCRIPTION YEAR 
01 ISJWS 01 A Technique for Deploying 
Robust Web Services 
This paper proposes a mechanism that 
automatically fixes robustness problems 
in web services. The approach consists 
of using robustness testing to detect 
robustness issues and then mitigate 
those issues by applying inputs 
verification based on well-defined 
parameter domains, including domain 
dependencies between different 
parameters. 
2014 
02 ISJWS 02 Web Image Re-Ranking Using 
Query-Specific Semantic 
Signatures 
we propose a novel image re-ranking 
Framework, which automatically 
offline learns different visual semantic 
spaces for different query keywords 
through keyword expansions. The 
visual features of images are projected 
into their related visual semantic spaces 
to get semantic signatures.. 
2014 
03 ISJWS 03 An Empirical Performance 
Evaluation of Relational 
Keyword Search Techniques 
we present the most extensive empirical 
performance evaluation of relational 
keyword search techniques to appear to 
date in the literature. Our results 
indicate that many existing search 
techniques do not provide acceptable 
performance for realistic retrieval tasks 
2014 
04 ISJWS 04 Scalable Keyword Search on 
Large RDF Data 
we propose an effective summarization 
Algorithm to summarize the RDF data. 
Given a keyword query, the summaries 
lend significant pruning powers to 
exploratory keyword search and result 
in much better efficiency compared to 
previous works 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page21 
TECHNOLOGY: J2EE 
DOMAIN : PERVASIVE COMPUTING 
SNO P.CODE TITLES DESCRIPTION YEAR 
05 ISJPC 01 Efficient Authentication for 
Mobile 
and Pervasive Computing 
We propose two novel techniques for 
authenticating short encrypted 
messages that are directed to meet the 
requirements of mobile and pervasive 
applications. 
2014 
06 ISJPC 02 Convenience Probe: A Phone- 
Based System 
for Retail Trade-Area 
Analysis 
Systematically and quantitatively 
determining patterns in consumer 
flow is an important problem in 
marketing research. 
2014 
07 ISJPC 03 The Clash between Privacy 
and Automation 
in Social Media 
Classic research on human factors 
has found that automation never fully 
eliminates the human operator from 
the loop. 
2014 
08 ISJPC 04 Mining Private 
Information from 
Public Data: 
Transantiago, the smartcard-based 
public transportation system in 
Santiago, Chile, includes both a 
subway system and buses. An online 
information system lets card holders 
find detailed trip information, 
including start time and location. 
2014 
ANDROID 
TECHNOLOGY: ANDROID 
DOMAIN : CONTEXT AWARE 
SNO P.CODE TITLES DESCRIPTION YEAR 
01 ISACA 01 Context-Aware QoE 
Modelling, Measurement 
and Prediction in Mobile 
Computing Systems 
Bayesian networks, context-awareness, 
decision theory, quality of experience, 
simulations, prototyping, user tests 
2014 
02 ISJACA 02 Context-based Access 
Control Systems for Mobile 
We propose such an access control 
mechanism. Our implementation 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page22 
Devices of context differentiates between closely 
located sub-areas within the same 
location. 
TECHNOLOGY: ANDROID 
DOMAIN : DATA ENGINEERING 
SNO P.CODE TITLES DESCRIPTION YEAR 
03 ISADE 01 EasySMS: A Protocol for 
End-to-End Secure 
Transmission of SMS 
we propose an efficient 
and secure protocol called EasySMS, 
which provides end-to end secure 
communication through SMS 
between end users. 
2014 
04 ISADE 02 Discovery of Ranking Fraud 
for Mobile Apps 
We provide a holistic view of ranking 
fraud and propose a ranking fraud 
detection system for mobile Apps. 
Specifically, we propose to accurately 
locate the ranking fraud by mining . 
2014 
05 ISADE 03 
Real-Time City-Scale Taxi 
Ridesharing 
We proposed and developed a taxi-sharing 
system that accepts taxi 
passengers’ real-time ride requests 
sent from Smartphone and schedules 
proper taxis to pick up them via 
ridesharing, subject to time, capacity. 
2014 
06 ISADE 04 MOSES: Supporting and 
Enforcing Security 
Profiles on Smartphones 
We present MOSES, a policy-based 
framework for enforcing software 
isolation of applications and data on 
the Android platform. InMOSES, it is 
possible to define distinct Security 
Profiles within a single Smartphone. 
2014 
TECHNOLOGY: ANDROID 
DOMAIN : CLOUD COMPUTING 
SNO P.CODE TITLES DESCRIPTION YEAR 
07 
ISACC 01 Keylogging-resistant visual 
authentication 
Protocols 
we propose two visual authentication 
protocols: one is a one-time-password 
protocol, and the other is a password- 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page23 
based authentication protocol 
08 ISACC 02 Energy-Aware Web 
Browsing on Smartphones 
we introduce a practical data mining 
based method to predict the user 
reading time of web pages, based on 
which the Smartphone can switch to 
low power state when the reading 
time is longer than a threshold 
2014 
09 ISACC 03 Mobiflage: Deniable Storage 
Encryption for Mobile 
Devices 
Mobiflage enables PDE on mobile 
devices by hiding encrypted volumes 
within random data in a devices free 
storage space. 
2014 
TECHNOLOGY: ANDROID 
DOMAIN : MOBILE COMPUTING 
SNO P.CODE TITLES DESCRIPTION YEAR 
10 ISAMC 01 How Long to Wait? 
Predicting Bus Arrival Time 
With Mobile Phone Based 
Participatory Sensing 
We present a bus arrival time 
prediction system based on bus 
passengers’ participatory sensing. 
With commodity mobile phones, the 
bus passengers’ surrounding 
environmental context is effectively 
collected and utilized to estimate the 
bus traveling routes and predict bus 
arrival time at various bus stops. 
2014 
11 ISAMC 02 Analysis of Smart Mobile 
Applications for Healthcare 
under Dynamic Context 
Changes 
This paper proposes a novel technique 
to analyze SMDCSes taking into 
account the dynamic changes in the 
context and the constant interaction of 
the computing systems with the 
physical environment 
2014 
12 ISAMC 03 Face-to-Face Proximity 
Estimation 
Using Bluetooth On 
Smartphones 
we demonstrate through experimental 
studies the efficacy of Bluetooth for 
this exact purpose. We propose a 
proximity estimation model to 
determine the distance based on 
the RSSI values of Bluetooth and 
light sensor data in different 
environments. 
2014
Iris Solutions 
TECHNOLOGY: JAVA 
DOMAIN : NON IEEE BASED PROJECTS 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page24 
JAVA APPLICATION PROJECTS 
SNO P.CODE TITLES 
1 ISJNI01 Security Environment In Travel Individuality Using Aadhaar 
2 ISJNI02 Organize A Data Storage System With Security In Cloud Computing 
3 ISJNI03 E Compiler For Java With Security Editor 
4 ISJNI04 Medicare And Medicate Distributed System 
5 ISJNI05 Scheduling On TimeTable Management System 
6 ISJNI06 Web Portal 
7 ISJNI07 Book Warehouse Management System 
8 ISJNI08 Human Resource Management System 
9 ISJNI09 A Conceptual View Of Web Based E-Learning System 
10 ISJNI10 Inventory Management System 
11 ISJNI11 Learner Reports Database Management System 
12 ISJNI12 Monitoring Online Tests Through Data Visualization 
13 ISJNI13 Framework For Adaptive Intrusion Detection System 
14 ISJNI14 Agile Routing Protocol in p2p Networks
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page25 
DOTNET 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON NETWORKING 
SNO P.CODE TITLES DESCRIPTION YEAR 
1 ISDNW 01 OSA: An Optical Switching 
Architecture for Data Center 
Networks With Unprecedented 
Flexibility 
In this paper, we present the design, 
implementation, and evaluation of 
OSA, a novel Optical Switching 
Architecture for DCNs. 
2014 
2 ISDNW 02 A Trust-Aware System for 
Personalized User 
Recommendations in Social 
Networks 
In this paper,we introduce a framework 
for handling trust in social networks. 
2014 
3 ISDNW 03 SeLeCT: Self-Learning 
Classifier for Internet Traffic 
In this paper SeLeCT, a Self-Learning 
Classifier for Internet Traffic. 
2014 
4 ISDNW 04 Robust Multi-Factor 
Authentication for Fragile 
Communications 
In this paper is two-fold. In a slow 
connection situation, we present a 
secure generic multi-factor 
authentication protocol to speed up the 
whole authentication process. 
2014 
5 ISDNW 05 Network Codes Resilient to 
Jamming and Eavesdropping 
In this Paper, We consider the problem 
of communicating information over a 
network secretly and reliably in the 
presence of a hidden adversary who can 
eavesdrop and inject malicious errors. 
2014 
6 IDSNW 06 Network Resource Allocation 
for Users With Multiple 
Connections: Fairness and 
Stability 
This paper studies network resource 
allocation between users that manage 
multiple connections, possibly through 
different routes, where each connection 
is subject to congestion control. 
2014 
7 ISDNW 07 PACK: Prediction-Based 
Cloud Bandwidth and Cost 
Reduction System 
In this paper, we present PACK 
(Predictive ACKs),a novel end-to-end 
traffic redundancy elimination (TRE) 
system, designed for cloud computing 
customers. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page26 
8 ISDNW 08 Privacy-Preserving 
Quantification of 
Cross-Domain Network 
Reachability 
In this paper, we propose the first cross-domain 
privacy-preserving protocol for 
quantifying network reachability. 
2014 
9 ISDNW 09 Identity-Based Secure 
Distributed Data Storage 
Schemes 
In this paper, we propose two identity-based 
secure distributed data storage 
(IBSDDS) schemes. 
2014 
10 ISDNW 10 Detection and Localization of 
Multiple Spoofing Attackers 
in Wireless Networks 
In this paper, we propose to use spatial 
information, a physical property 
associated with each node, hard to 
falsify, and not reliant on cryptography. 
2013 
TECHNOLOGY : DOTNET 
DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY 
SNO P.CODE TITLES DESCRIPTION YEAR 
11 ISDNS 01 A System for Denial-of- 
Service Attack Detection 
Based on Multivariate 
Correlation Analysis 
In this paper, we present a DoS attack 
detection system that uses multivariate 
correlation analysis (MCA) for accurate 
network traffic characterization by 
extracting the geometrical correlations 
between network traffic features. 
2014 
12 ISDNS 02 An Error-Minimizing 
Framework for Localizing 
Jammers in Wireless Networks 
In this paper, we aim to design a 
framework that can localize one or 
multiple jammers with a high accuracy. 
2014 
13 ISDNS 03 Behavioral Malware Detection 
in Delay Tolerant Networks 
In this paper, we first propose a general 
behavioral characterization of 
proximity malware which based on 
naive Bayesian model. 
2014 
14 ISDNS 04 E-MACs: Toward More Secure 
and More Efficient 
Constructions of Secure 
Channels 
In this paper the deployment of special 
purpose MACs, named E-MACs. The 
main motivation behind this work 
is the observation that, since the 
message must be both encrypted and 
authenticated, there might be some 
redundancy in the computations 
performed by the two primitives. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page27 
15 ISDNS 05 Securing Broker-Less 
Publish/Subscribe Systems 
Using Identity-Based 
Encryption 
This paper presents a novel approach to 
provide confidentiality and 
authentication in a broker-less content-based 
publish/subscribe system. 
2014 
16 ISDNS 06 Hop-by-Hop Message 
Authentication and Source 
Privacy in Wireless Sensor 
Networks 
In this paper, we propose a scalable 
authentication scheme based on elliptic 
curve cryptography .While enabling 
intermediate nodes authentication. 
2014 
17 ISDNS 07 Privacy-Preserving 
Authenticated Key-Exchange 
Over Internet 
In this paper, we develop a family of 
privacy-preserving authenticated 
DHKE protocols named deniable 
Internet key-exchange (DIKE), both in 
the traditional PKI setting and in the 
identity-based setting. 
2014 
18 ISDNS 08 Further Observations on Smart- 
Card-Based Password- 
Authenticated Key Agreement 
in Distributed Systems 
This paper initiates the study of two 
specific security threats on smart-card-based 
password authentication in 
distributed systems. 
2014 
19 ISDNS 09 Secure and Efficient Data 
Transmission for Cluster- 
Based Wireless Sensor 
Networks 
In this paper ,We propose two secure 
and efficient data transmission (SET) 
protocols for CWSNs, called SET-IBS 
and SET-IBOOS, by using the identity-based 
digital signature (IBS) scheme 
and the identity-based online/offline 
digital signature (IBOOS) scheme, 
respectively. 
2014 
20 ISDNS 10 Dynamic Trust Management 
for Delay Tolerant 
Networks and Its Application 
to Secure Routing 
In this paper, we design and validate a 
dynamic trust management protocol for 
secure routing optimization in DTN 
environments in the presence of well-behaved, 
selfish and malicious nodes. 
2014 
21 ISDNS 11 Optimal Probabilistic 
Encryption for Secure 
Detection in Wireless Sensor 
Networks 
We consider the problem of secure 
detection in wireless sensor networks 
operating over insecure links. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page28 
22 ISDNS 12 A Model Approach to the 
Estimation of Peer-to-Peer 
Traffic Matrices 
In this paper, we propose a model to 
estimate P2P traffic matrices in 
operational networks. Important factors 
are considered, including the number of 
peers, the localization ratio of P2P 
traffic, and the network distance. 
2014 
23 ISDNS 13 A Probabilistic Misbehavior 
Detection Scheme toward 
Efficient Trust Establishment 
in Delay-Tolerant Networks 
In this paper, we propose iTrust, a 
probabilistic misbehavior detection 
scheme, for secure DTN routing toward 
efficient trust establishment. 
2014 
24 ISDNS 14 A Scalable and Modular 
Architecture for High 
Performance Packet 
Classification 
In this paper we propose a novel 
modular Bit-Vector (BV) based 
architecture to perform high-speed 
packet classification on Field 
Programmable Gate Array (FPGA). 
2014 
25 ISDNS 15 Secret Key Generation in the 
Two-Way Relay Channel With 
Active Attackers 
In This paper studies the key 
generation problem in the two-way 
relay channel, in which there is no 
direct channel between the key 
generating terminals. 
2014 
26 ISDNS 16 Data Hiding in Encrypted 
H.264/AVC Video Streams by 
Codeword Substitution 
In this paper, a novel scheme of data 
hiding directly in the encrypted version 
of H.264/AVC video stream is 
proposed, which includes the following 
three parts, i.e., H.264/AVC video 
encryption, data embedding, and 
data extraction. 
2014 
27 ISDNS 17 Secure Encounter-based 
Mobile Social Networks: 
Requirements, Designs, and 
Tradeoffs 
In this paper, we explore the functional 
and security requirements for these new 
systems, such as availability, security, 
and privacy, and present several design 
options for building secure encounter-based 
social networks. 
2013
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page29 
28 ISDNS 18 Secrecy Capacity Enhancement 
With Distributed Precoding in 
Multirelay Wiretap Systems 
In this paper, where an eavesdropper is 
present. Distributed pre coding through 
multiple relay nodes can be used to 
enhance the received signal power a t 
the destination node and to mitigate the 
signal leakage to the eavesdropper, 
simultaneously. 
2013 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON DATAMINING 
SNO P. CODE PROJECT TITLES DESCRIPTION YEAR 
29 ISDDM 01 An Empirical Performance 
Evaluation of Relational 
Keyword Search Systems 
In this paper, we present a thorough 
empirical performance evaluation of 
relational keyword search systems. 
2014 
30 ISDDM 02 The Role of Hubness in 
Clustering High 
Dimensional Data 
In this paper, we take a novel perspective 
on the problem of clustering high-dimensional 
data. Instead of attempting to 
avoid the curse of dimensionality by 
observing a lower dimensional feature 
subspace, we embrace dimensionality by 
taking advantage of inherently high-dimensional 
phenomena. 
2014 
31 ISDDM 03 Scalable Similarity Search 
With Topology Preserving 
Hashing 
In this paper, we propose a novel hashing 
method to solve these two issues jointly. 
The proposed method is referred to as 
topology preserving hashing (TPH). 
2014 
32 ISDDM 04 Facilitating Document 
Annotation Using Content 
and Querying Value 
In this paper, we present algorithms that 
identify structured attributes that are 
likely to appear within the document, by 
jointly utilizing the content of the text 
and the query workload. 
2014 
33 ISDDM 05 Web Image Re-Ranking 
Using Query-Specific 
Semantic Signatures 
In this paper, we propose a novel image 
re-ranking framework, which 
automatically offline learns different 
visual semantic spaces for different query 
keywords through keyword expansions. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page30 
34 ISDDM 06 Supporting Privacy 
Protection in Personalized 
Web Search 
I In this paper, PWS framework called 
UPS t that can adaptively generalize 
profiles by queries while respecting user 
specified privacy requirements. 
2014 
35 ISDDM 07 Secure Mining of Association 
Rules in Horizontally 
Distributed Databases 
The main ingredients in our protocol are 
two novel secure multi-party algorithms 
one that computes the union of private 
subsets that each of the interacting 
players hold, and another that tests the 
inclusion of an element held by one 
player in a subset held by another. 
2014 
36 ISDDM 08 Fast Nearest Neighbor 
Search with Keywords 
In this paper, has a few deficiencies that 
seriously impact its efficiency. Motivated 
by this, we develop a new access method 
called the spatial inverted index that 
extends the conventional inverted index 
to cope with multidimensional data, and 
comes with algorithms that can answer 
nearest neighbor queries with keywords 
in real time. 
2014 
37 ISDDM 09 Keyword Query Routing 
Keyword search is an intuitive paradigm 
for searching linked data sources on the 
web. We propose to route keywords only 
to relevant sources to reduce the high cost 
of processing keyword search queries 
over all sources. 
2014 
38 ISDDM 10 A Cocktail Approach for 
Travel Package 
Recommendation 
In this paper, we first analyze the 
characteristics of the existing travel 
packages and develop a tourist-area-season 
topic (TAST) model. 
2014 
39 
ISDDM 11 Ginix: Generalized Inverted 
Index for Keyword Search 
This paper presents a more efficient index 
structure, the Generalized Inverted Index 
(Ginix), which merges consecutive IDs in 
inverted lists into intervals to save storage 
space. 
2013
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page31 
40 ISDDM 12 Maximum Likelihood 
Estimation from Uncertain 
Data in the Belief Function 
Framework 
The proposed method is based on the 
maximization of generalized - 
likelihood criterion, which can be 
interpreted as a degree of agreement 
between the statistical model 
and the uncertain observations. 
2013 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING 
SNO P. CODE PROJECT TITLES DESCRIPTION YEAR 
41 ISDCC 01 Decentralized Access Control 
with Anonymous 
Authentication of Data Stored 
in Clouds 
We propose a new decentralized access 
control scheme for secure data storage 
in clouds that supports anonymous 
authentication. 
2014 
42 ISDCC 02 Identity-Based Distributed 
Provable Data Possession in 
Multi-Cloud Storage 
The proposed ID-DPDP protocol is 
provably secure under the hardness 
assumption of the standard CDH 
problem. 
2014 
43 ISDCC 03 Oruta: Privacy-Preserving 
Public Auditing for Shared 
Data in the Cloud 
In this paper, we propose a novel 
Privacy-preserving mechanism that 
supports public auditing on shared data 
stored in the cloud. In particular, we 
exploit ring signatures to compute 
verification metadata needed to audit 
the correctness of shared data. 
2014 
44 ISDCC 04 Privacy-Preserving Multi- 
Keyword Ranked Search over 
Encrypted Cloud Data 
In this paper, for the first time, we 
define and solve the challenging 
problem of privacy-preserving multi-keyword 
ranked search over encrypted 
data in cloud computing (MRSE). 
2014 
45 ISDCC 05 Shared Shared Authority Based 
Privacy-Preserving 
Authentication Protocol In 
Cloud Computing 
In this paper, we propose a shared 
authority based privacy-preserving 
authentication protocol (SAPA) to 
address above privacy issue for cloud 
storage. 
2014 
46 ISDCC 06 Scalable Distributed Service 
Integrity Attestation for 
Software-as-a-Service Clouds 
In this paper, we present IntTest, a 
scalable and effective service integrity 
attestation framework for SaaS clouds. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page32 
47 ISDCC 07 Dynamic Heterogeneity-Aware 
Resource Provisioning in the 
Cloud 
Abstract—Data centers consume 
tremendous amounts of energy in terms 
of power distribution and cooling. 
2014 
48 ISDCC 08 Enabling Data Integrity 
Protection in Regenerating- 
Coding-Based Cloud Storage: 
Theory and Implementation 
In this Paper To protect outsourced data 
in cloud storage against corruptions, 
adding fault tolerance to cloud storage, 
along with efficient data integrity 
checking.. 
2014 
49 ISDCC 09 Key-Aggregate Cryptosystem 
for Scalable Data Sharing in 
Cloud Storage 
In this paper, we show how to securely, 
efficiently, and flexibly share data with 
others in cloud storage. 
2014 
50 ISDCC 10 NCCloud: A Network-Coding- 
Based Storage System in a 
Cloud-of-Clouds 
In this Paper To provide fault tolerance 
for cloud storage, recent studies 
propose to stripe data across multiple 
cloud vendors. 
2014 
51 ISDCC 11 Distributed, Concurrent, and 
Independent Access to 
Encrypted Cloud Databases 
In this paper, The proposed architecture 
has the further advantage of eliminating 
intermediate proxies that limit the 
elasticity, availability, and scalability . 
2014 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING 
SNO P. CODE PROJECT TITLES DESCRIPTION YEAR 
52 ISDMC 01 Friendbook: A Semantic-based 
Friend Recommendation 
System for Social Networks 
In this paper, we present Friendbook, a 
novel semantic-based friend 
recommendation system for social 
networks, which recommends friends 
to users based on their life styles. 
2014 
53 ISDMC 02 Efficient Authentication for 
Mobile and Pervasive 
Computing 
We propose provably secure 
authentication codes that are more 
efficient than any message 
authentication code in the literature. 
2014 
54 ISDMC 03 Energy-Efficient Reliable 
Routing Considering Residual 
Energy in Wireless Ad Hoc 
Networks 
In this paper, We propose two novel 
energy-aware routing algorithms for 
wireless ad hoc networks, called 
reliable minimum energy cost routing 
(RMECR). 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page33 
55 ISDMC 04 Defending Against 
Collaborative Attacks by 
Malicious Nodes in MANETs: 
A Cooperative Bait Detection 
Approach 
In This paper attempts to resolve this 
issue by designing a dynamic source 
routing (DSR)-based routing 
mechanism, which is referred to as the 
cooperative bait detection scheme. 
2014 
56 ISDMC 05 Keylogging-resistant Visual 
Authentication Protocols 
In this paper, we demonstrate how 
careful visualization design can 
enhance not only the security but also 
the usability of authentication. 
2014 
57 ISDMC 06 Optimal Distributed Malware 
Defense in Mobile Networks 
with Heterogeneous Devices 
In this paper, we investigate the 
problem of how to optimally distribute 
the content-based signatures of 
malware. 
2014 
58 ISDMC 07 STARS: A Statistical Traffic 
Pattern Discovery System for 
MANETs 
In this paper, we show that MANETs 
are still vulnerable under passive 
statistical traffic analysis attacks. 
2014 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING 
SNO P.CODE TITLES DESCRIPTION YEAR 
59 ISDIP 01 Scene Text Recognition in 
Mobile Applications by 
Character Descriptor and 
Structure Configuration 
This paper proposes a method of scene 
text recognition from detected text 
regions. In text detection, our 
previously proposed algorithms are 
applied to obtain text regions from 
scene image. 
2014 
60 ISDIP 02 How to Select Good 
Neighboring Images in Depth- 
Map Merging Based 3D 
Modeling 
This paper is intended to tackle this 
issue for large scale scene 
reconstruction where many unordered 
images are captured and used with 
substantial varying scale 
2014 
61 ISDIP 03 QR Images: Optimized Image 
Embedding in QR Codes 
This paper introduces the concept of 
QR images, an automatic method to 
embed QR codes into color images with 
bounded probability of detection error. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page34 
62 ISDIP 04 A Fragile Watermarking 
Algorithm for Hologram 
Authentication 
A fragile watermarking algorithm for 
hologram authentication is presented in 
this paper. In the proposed algorithm, 
the watermark is embedded in the 
discrete cosine transform (DCT) 
2014 
63 ISDIP 05 Weakly Supervised Photo 
Cropping 
In this paper, we propose weakly 
supervised photo cropping, where a 
manifold embedding algorithm is 
developed to incorporate image-level 
semantics and image global. 
2014 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING 
SNO P.CODE TITLES DESCRIPTION YEAR 
64 ISDGC01 Rateless Codes and Random 
Walks for P2P Resource 
Discovery in Grids 
In this paper, the system is represented as a 
set of nodes connected to form a P2P 
network where each node holds a piece of 
information that is required to be 
communicated to all the participants. 
2014 
65 ISDGC02 PRGA:Privacy-preserving 
Recording &Gateway-assisted 
Authentication of Power Usage 
Information for Smart Grid 
In this paper, we propose a scheme 
such that even the control center does 
not know which user makes the 
requests of using more power or 
agreements of using less power until 
the power is actually used. 
2014 
66 ISDGC03 On the Design of Mutually 
Aware Optimal 
Pricing and Load Balancing 
Strategies for Grid Computing 
Systems 
Managing resources and cleverly 
pricing them on computing systems is a 
challenging task. Resource sharing 
demands careful load . 
2014 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 
SNO P.CODE PROJECT TITLES DESCRIPTION YEAR 
67 ISDSE 01 Modular Software Model 
Checking for Distributed 
Systems 
This paper proposes cachebased model 
checking, which relaxes this limitation 
to some extent by verifying one process 
at a time and running other processes in 
another execution environment. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page35 
68 ISDSE 02 COALA - System for Visual 
Representation of 
Cryptography Algorithms 
This paper presents a novel software 
system for Cryptographic Algorithm 
visual representation (COALA), which 
was developed to support a Data 
Security course at the School of 
Electrical Engineering, University of 
Belgrade. 
2014 
69 ISDSE 03 GOSSIPKIT: A Unified 
Component Framework for 
Gossip 
In this paper, we consider how 
component frameworks, which have 
been widely applied to implement 
middleware solutions, can facilitate the 
development of gossip-based systems 
in a way that is both generic and 
simple. 
2014 
TECHNOLOGY: DOTNET 
DOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA 
SNO P.CODE PROJECT TITLES DESCRIPTION YEAR 
70 ISDMM01 A Generative Model for 
Concurrent Image Retrieval 
and ROI Segmentation 
This paper proposes a probabilistic 
generative model that concurrently 
tackles the problems of image retrieval 
and region-of-interest (ROI) 
segmentation. 
2014 
71 ISDMM02 Adaptive Watermarking and 
Tree Structure Based Image 
Quality Estimation 
The proposed scheme uses the 
embedded watermark to estimate the 
degradation of cover image under 
different distortions. 
2014 
72 ISDMM03 An Adaptive Energy-Efficient 
Stream Decoding System for 
Cloud Multimedia Network 
on Multicore Architectures 
As the technology of applying a cloud 
network to cloud multimedia matures, a 
solution to the present demand for high 
quality and diversified cloud multimedia 
can be provided. 
2014 
73 ISDMM04 Generalized Equalization 
Model for Image Enhancement 
In this paper, we propose a generalized 
equalization model for image 
enhancement. 
2014 
74 ISDMM 05 Reversible Data Hiding in 
Encrypted JPEG BitStream 
In This paper a framework of reversible 
data hiding (RDH) in an encrypted 
JPEG bit stream. 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page36 
DOTNET APPLICATION PROJECTS 
TECHNOLOGY : DOTNET 
DOMAIN : NON IEEE BASED PROJECTS 
SNO P.CODE PROJECT TITLE 
1 ISNID 01 Real Time Data Communications Between Automated Command Centers 
2 ISNID 02 The Research Of Economy Hotel In One City Room Allocation And Global 
Optimization Based On Revenue Management 
3 ISNID 03 Steady-State Circular Errors For Basic Tracking Filters 
4 ISNID 04 Knowledge Excavation Of Knowledge Base In College Libraries 
5 ISNID 05 A Contextualization Method Of Browsing Events In Web-Based Learning 
Content Management System For Personalized Learning 
6 ISNID 06 In-Network Real-Time Performance Monitoring With Distributed Event 
Processing 
7 ISNID 07 A Prediction Study On Tourist Amount Based On Web Search Data 
8 ISNID 08 A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory 
9 ISNID 09 
Physical Layer Assisted Authentication For Distributed Ad Hoc Wireless Sensor 
Networks 
10 ISNID 10 E-Business And E-Commerce Applications And Trends In The Retailing Sector 
11 ISNID 11 An Effective Self-Adaptive Load Balancing Algorithm For Peer-To-Peer 
Networks 
12 ISNID 12 Combining Web Services To Manage Real-Time Navigation Data Distribution 
13 ISNID 13 The Dynamic Competition Diffusion Model Of B2C E-Commerce In Potential 
Customers 
14 ISNID 14 The Effect Of Pairs In Program Design Tasks
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page37 
15 ISNID 15 Content-Based Routing In Mobile Ad Hoc Networks 
16 ISNID 16 Browsing Management System 
17 ISNID 17 Performance Analysis Of MIMO Multi Relay System In Cooperative Relay 
Network 
18 ISNID 18 Improving Wireless Physical Layer Security Via Cooperating Relays 
19 ISNID 19 Analysis Of Ego Network Structure In Online Social Networks 
20 ISNID 20 P2P-Based Locking In Real-Time Collaborative Editing Systems 
21 ISNID 21 Minimizing File Download Time In Stochastic Peer-To-Peer Networks 
22 ISNID 22 An Efficient Parallel Algorithm For Secured Data Communications Using RSA 
Public Key Cryptography Method 
23 ISNID 23 Rateless Forward Error Correction For Topology-Transparent Scheduling 
24 ISNID 24 Secure Communication In 802.11 Networks With A Novel Protocol Using 
Quantum Cryptography 
25 ISNID 25 Personal Computer Voice Control Software 
26 ISNID 26 In-Depth Packet Inspection Using A Hierarchical Pattern Matching Algorithm 
27 ISNID 27 
Securing Node Capture Attacks For Data Aggregation In Wireless Sensor 
Networks 
28 ISNID 28 Persuasive Cued Click-Points: Design, Implementation, And Evaluation Of A 
Knowledge-Based Authentication Mechanism 
29 ISNID 29 Multi Factor Authentication Method For Banking Applications 
30 ISNID 30 Joint Topology Control And Authentication Design In Mobile Ad Hoc Networks 
With Cooperative Communications 
31 ISNID 31 Effective Software Merging In The Presence Of Object-Oriented Refactorings 
32 ISNID 32 Distributed Broadcast File Management System 
33 ISNID 33 Downloading Secured File Using Multiple Servers
Iris Solutions 
34 ISNID 34 An Adaptive Reputation-Based Trust Framework For Peer-To-Peer Applications 
35 ISNID 35 Measuring Capacity Bandwidth Of Targete Path Segments 
36 ISNID 36 Comparative Evaluation Of Algorithms For Effective Data Leakage Detection 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page38 
NS2 
37 ISNID 37 
Learning To Adapt Web Information Extraction Knowledge And Discovering 
New Attributes Via A Bayesian Approach 
38 ISNID 38 Online Insurance Management System 
39 ISNID 39 A Service-Based Distributed Query Processor For The Grid 
TECHNOLOGY : NS2 
DOMAIN : IEEE TRANSACTIONS MOBILE AD HOC NETWORKS 
SNO P.CODE PROJECT TITLE YEAR 
01 ISNMA 01 
PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad 
Hoc Networks 
2014 
02 ISNMA 02 Adaptive Scheduling in MIMO-Based Heterogeneous Ad Hoc Networks 2014 
03 ISNMA 03 
Transmission Sequence Design and Allocation for Wide-Area Ad Hoc 
Networks 
2014 
04 ISNMA 04 
Delay and Capacity Analysis in MANETs with Correlated Mobility and 
f-cast Relay 
2014 
05 ISNMA 05 
Joint Mobile Data Gathering and Energy Provisioning in Wireless 
Rechargeable Sensor Networks 
2014 
06 ISNMA 06 
A Context-Aware M2M-Based Middleware for Service Selection in 
Mobile Ad-Hoc Networks 
2014 
07 ISNMA 07 
Performance Improvement of Topology-Transparent Broadcast 
Scheduling in Mobile Ad Hoc Networks 
2014 
08 ISNMA 08 
A New Approach to the Directed Connectivity in Two-Dimensional 
Lattice Networks 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page39 
TECHNOLOGY : NS2 
DOMAIN : IEEE TRANSACTIONS ON WIRELESS SENSOR NETWORK 
SNO P.CODE TITLES YEAR 
01 ISNWS 01 
Energy-Efficient Reliable Routing Considering Residual Energy in 
Wireless Ad Hoc Networks 
2014 
02 ISNWS 02 
Localization-Oriented Network Adjustment in Wireless Ad Hoc and 
Sensor Networks 
2014 
03 ISNWS 03 
A Novel Approach to Trust Management in Unattended Wireless Sensor 
Networks 
2014 
04 ISNWS 04 Secure Continuous Aggregation in Wireless Sensor Networks 2014 
05 ISNWS 05 
A Scalable and Mobility-Resilient Data Search System for Large-Scale 
Mobile Wireless Networks 
2014 
06 ISNWS 06 Fast Data Collection in Linear Duty-Cycled Wireless Sensor Networks 2014 
07 ISNWS 07 
Optimal Prediction Likelihood Tree Based Source- Channel ML Decoder 
for Wireless Sensor Networks 
2014 
08 ISNWS 08 
A Stochastic Time-domain Model for Burst Data Aggregation in IEEE 
802.15.4 Wireless Sensor Networks 
2014 
09 ISNWS 09 
Accuracy of Homology Based Coverage Hole Detection for Wireless 
Sensor Networks on Sphere 
2014 
10 ISNWS 10 Energy-Efficient RSSI-Based Localization for Wireless Sensor Networks 2014 
11 ISNWS 11 
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless 
Sensor Networks 
2014 
09 ISNMA 09 
A Channel Hopping Multi-Channel MAC Protocol for Mobile Ad Hoc 
Networks 
2014 
10 ISNMA 10 
Security Enhancements for Mobile Ad Hoc Networks with Trust 
Management Using Uncertain Reasoning 
2014 
11 ISNMA 11 
BRACER: A Distributed Broadcast Protocol in Multi-hop Cognitive 
Radio Ad Hoc Networks with Collision Avoidance 
2014 
12 ISNMA 12 
Efficient and Reliable MPEG-4 Multicast MAC Protocol for Wireless 
Networks 
2014 
13 ISNMA 13 
AASR: Authenticated Anonymous Secure Routing for MANETs in 
Adversarial Environments 
2014
Iris Solutions 
We will provide online support and deliver a project anywhere. 
Also contact us to develop your own idea. 
Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org 
Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, 
Page40 
12 ISNWS 12 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks 
in Wireless Ad Hoc Networks 
2014 
TECHNOLOGY : NS2 
DOMAIN : IEEE TRANSACTIONS ON VEHICULAR AD HOC NETWORKS 
SNO P.CODE TITLES YEAR 
01 ISNVA 01 
A Vehicular Networking Perspective on Estimating Vehicle Collision 
Probability at Intersections 
2014 
02 ISNVA 02 
DOVE: Data Dissemination to a Desired Number of Receivers in 
VANET 
2014 
03 ISNVA 03 
A Scalable Bandwidth-Efficient Hybrid Adaptive Service Discovery 
Protocol for Vehicular Networks with Infrastructure Support 
2014 
04 ISNVA 04 
Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc 
Networks 
2014 
05 ISNVA 05 
Vehicle Mobility and Communication Channel Models for Realistic and 
Efficient Highway VANET Simulation 
2014 
06 ISNVA 06 
A Fuzzy Multi-metric QoS-balancing Gateway Selection Algorithm in a 
Clustered VANET to LTE Advanced Hybrid Cellular Network 
2014 
07 ISNVA 07 Maximizing Network Topology Lifetime using Mobile Node Rotation 2014 
08 ISNVA 08 
An Evolutionary Game Theory Based Approach for Cooperation in 
VANETs Under Different Network Conditions 
2014 
09 ISNVA 09 
Performance-Aware Mobile Community-based VoD Streaming over 
Vehicular Ad Hoc Networks 
2014 
10 ISNVA 10 
Multiple Vehicles Collaborative Data Download Protocol via Network 
Coding 
2014

More Related Content

PDF
2014 ieee project list for free, ieee 2014 project abstracts,ieee projects li...
PDF
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...
PDF
2015 - 2016 IEEE Project Titles and abstracts in Java
DOCX
Final year project in trichy,Final project Titles
PDF
Survey on Digital Video Watermarking Techniques, Attacks and Applications
PDF
Truzzt box 3.2-en
PDF
Whitepaper - Software Defined Networking for the Telco Industry
PDF
Android titles adrit solutions
2014 ieee project list for free, ieee 2014 project abstracts,ieee projects li...
IEEE 2014 Project Titles for ME,M.Tech,BE,B.Tech,M.Sc,MCA,IEEE Java Project t...
2015 - 2016 IEEE Project Titles and abstracts in Java
Final year project in trichy,Final project Titles
Survey on Digital Video Watermarking Techniques, Attacks and Applications
Truzzt box 3.2-en
Whitepaper - Software Defined Networking for the Telco Industry
Android titles adrit solutions

What's hot (14)

PDF
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
PDF
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
PDF
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
PDF
Mobile Computing IEEE 2014 Projects
PDF
IRJET - Image Watermarking using QR Code
PDF
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
PDF
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
PDF
IRJET- Crypto-Currencies How Secure are they?
PDF
Image authentication for secure login
PDF
Nz2422822287
PDF
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
PDF
Mobile computing-ieee-2014-projects
PDF
Bhadale group of companies - quantum technology programs catalogue
PDF
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Wireless and Mobile Computing Build Secure and Maintain Wireless Solutions
Mobile Computing IEEE 2014 Projects
IRJET - Image Watermarking using QR Code
Identity based Encryption Utilizing Revocable Capacity of Distributed Computi...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IRJET- Crypto-Currencies How Secure are they?
Image authentication for secure login
Nz2422822287
IRJET- A Survey on Private Messaging based on QR Code using Visual Secret Sha...
Mobile computing-ieee-2014-projects
Bhadale group of companies - quantum technology programs catalogue
A Survey on Secure Data Sharing with Forward Security in Cloud Computing
Ad

Similar to IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TITLES WITH ABSTRACT, IEEE-PROJECT-TITLES-2014-IN-ANDROID-JAVA-DOTNET-NS2-J2EE-PROJECTS 2014-15 (20)

PDF
IEEE 2013 Java, Android, J2EE, Dotnet, NS2 project titles, Dotnet Project tit...
PDF
IEEE 2014 PROJECT TITLES FOR ME, M.TECH, BE, B.TECH, (CSE, IT) MSC, MCA PROJ...
PPTX
E2matrix
PDF
Securing the network perimeter
PDF
EPLQ:Efficient privacy preserving spatial range query for smart phones
PDF
Networking java titles Adrit Solution
PDF
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
PDF
IEEE Projects 2012-2013 Network Security
PDF
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
PDF
Modern computer network technologies
PDF
Secure Data Transmission using IBOOS in VANET
DOCX
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
PDF
What Is Openstack And Its Importance
PDF
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
PDF
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
PDF
Knowing where the safe zone is ovum october 22 2013
PPTX
Application-of-Cloud-Computing.pptx
PDF
Insights success the 10 most trusted networking solution provider companies 2...
PDF
Security aspects-of-mobile-cloud-computing
PDF
710201940
IEEE 2013 Java, Android, J2EE, Dotnet, NS2 project titles, Dotnet Project tit...
IEEE 2014 PROJECT TITLES FOR ME, M.TECH, BE, B.TECH, (CSE, IT) MSC, MCA PROJ...
E2matrix
Securing the network perimeter
EPLQ:Efficient privacy preserving spatial range query for smart phones
Networking java titles Adrit Solution
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IEEE Projects 2012-2013 Network Security
Network security java ieee projects 2012 @ Seabirds ( Trichy, Pudukkottai, Ta...
Modern computer network technologies
Secure Data Transmission using IBOOS in VANET
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
What Is Openstack And Its Importance
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
Knowing where the safe zone is ovum october 22 2013
Application-of-Cloud-Computing.pptx
Insights success the 10 most trusted networking solution provider companies 2...
Security aspects-of-mobile-cloud-computing
710201940
Ad

More from John Britto (8)

PDF
IEEE 2015-2016 PROJECT TITLES IN ANDROID, JAVA, DOTNET, NS2 FOR BE, B.TECH, M...
PDF
IEEE 2015-16 PROJECT TITLES FOR ME, M.TECH, BE, B.TECH (CSE, IT) MCA, MSC-CS...
PDF
2015 IEEE PROJECT TITLES FOR BE, B.TECH, ME, M.TECH, CSE, IT
PDF
BEST IEEE 2015 PROJECTS FOR ME, M.TECH, BE, B.Tech-CSE,IT, MCA, M.Sc Compute...
PDF
IRIS SOLUTIONS - IEEE 2012 ENGINEERING PROJECT TITLES FOR CSE, IT
PDF
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles IEEE 2012 Software Project...
PDF
Me, m.tech, be, b.tech, m.sc, mca, project titles ieee 2012 software titles,...
PDF
IEEE 2012 PROJECT TITLES FOR CSC & IT, IEEE 2012 PROJECT TITLES | IEEE 2012 ...
IEEE 2015-2016 PROJECT TITLES IN ANDROID, JAVA, DOTNET, NS2 FOR BE, B.TECH, M...
IEEE 2015-16 PROJECT TITLES FOR ME, M.TECH, BE, B.TECH (CSE, IT) MCA, MSC-CS...
2015 IEEE PROJECT TITLES FOR BE, B.TECH, ME, M.TECH, CSE, IT
BEST IEEE 2015 PROJECTS FOR ME, M.TECH, BE, B.Tech-CSE,IT, MCA, M.Sc Compute...
IRIS SOLUTIONS - IEEE 2012 ENGINEERING PROJECT TITLES FOR CSE, IT
Me, M.Tech, BE, B.Tech, M.Sc, MCA, Project titles IEEE 2012 Software Project...
Me, m.tech, be, b.tech, m.sc, mca, project titles ieee 2012 software titles,...
IEEE 2012 PROJECT TITLES FOR CSC & IT, IEEE 2012 PROJECT TITLES | IEEE 2012 ...

Recently uploaded (20)

PDF
Digital Logic Computer Design lecture notes
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
introduction to datamining and warehousing
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
web development for engineering and engineering
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Project quality management in manufacturing
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
Digital Logic Computer Design lecture notes
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
bas. eng. economics group 4 presentation 1.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
R24 SURVEYING LAB MANUAL for civil enggi
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
introduction to datamining and warehousing
OOP with Java - Java Introduction (Basics)
web development for engineering and engineering
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Project quality management in manufacturing
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Safety Seminar civil to be ensured for safe working.
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Mechanical Engineering MATERIALS Selection
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf

IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TITLES WITH ABSTRACT, IEEE-PROJECT-TITLES-2014-IN-ANDROID-JAVA-DOTNET-NS2-J2EE-PROJECTS 2014-15

  • 1. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page1 TABLE OF CONTENTS ABOUT IRIS 2 JAVA IEEE TRANSACTIONS ON NETWORKING 3 IEEE TRANSACTIONS ON NETWORK SECURITY 5 IEEE TRANSACTIONS ON DATA MINING 7 IEEE TRANSACTIONS ON CLOUD COMPUTING 10 IEEE TRANSACTIONS ON MOBILE COMPUTING 13 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 15 IEEE TRANSACTIONS ON IMAGE PROCESSING 16 IEEE TRANSACTIONS ON GRID COMPUTING 18 IEEE TRANSACTIONS ON MULTI MEDIA 19 J2EE IEEE TRANSACTIONS ON WEB SERVICES & PERVASIVE COMPUTING 20 ANDROID IEEE TRANSACTIONS ON CLOUD COMPUTING & CONTEXT AWARE 21 IEEE TRANSACTIONS ON MOBILE COMPUTING, DATA ENGINEERING 23 DOTNET IEEE TRANSACTIONS ON NETWORKING 25 IEEE TRANSACTIONS ON NETWORK SECURITY 26 IEEE TRANSACTIONS ON DATA MINING 29 IEEE TRANSACTIONS ON CLOUD COMPUTING 31 IEEE TRANSACTIONS ON MOBILE COMPUTING 32 IEEE TRANSACTIONS ON IMAGE PROCESSING 33 IEEE TRANSACTIONS ON GRID COMPUTING 34 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 34 IEEE TRANSACTIONS ON MULTI MEDIA 35 NS2 38
  • 2. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page2 About Iris "Iris Solutions - A Boon for Young Technocrats" Global presence of technocrats is no more a dream in this world. We make it possible by ensuring all the quality standards within an individual which has to be the identity of a successful technocrat. Irrespective of the technologies and the domain in which a particular project gets shaped, we support all kind of student needs in terms of monetary values as well as the time factor. Students apart from doing a particular project should know how the project is getting shaped. We are aware in making this thing to happen. Research and Development plays a vital role in enhancing one’s self development in terms of up gradation and moving forward. When you are searching for a good channel to inhibit yourself with such a platform, IRIS comes handy. Apart from providing simulation based training, we also provide industrial experts in sharing their valuable suggestions and even Industry oriented training at required cases. In short we strive hard to fulfill the student requirements in terms of each and every department of the developing their skills.
  • 3. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page3 JAVA TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON NETWORKING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJNW 01 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing we propose a clustering method that uses hybrid CS for sensor networks. CHs use CS to transmit data to sink. We first propose an analytical model that studies the relationship between the size of clusters and number of transmissions in the hybrid CS method, 2014 2 ISJNW 02 Secure Data Retrieval for Decentralized Disruption- Tolerant Military Networks We propose a secure data retrieval scheme using CP-ABE for decentralized DTNs where multiple key authorities manage their attributes independently. 2014 3 ISJNW 03 STARS: A Statistical Traffic Pattern Discovery System for MANETs In this paper, we show that MANETs are still vulnerable under passive statistical traffic analysis attacks. we present a STARS works passively to perform traffic analysis based on statistical characteristics of captured raw traffic. 2014 4 ISJNW 04 Enabling Trustworthy Service Evaluation in Service- Oriented Mobile Social Networks We propose a (TSE) system to enable users to share (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users' reviews about its services without requiring any third trusted authority. 2014 5 ISJNW 05 Network Codes Resilient to Jamming and Eavesdropping We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. 2014
  • 4. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page4 6 ISJNW 06 VSPN: VANET-Based Secure and Privacy-Preserving Navigation In this paper, we propose a navigation scheme that utilizes the online road information collected VANET. The proposed scheme has the advantage of using real-time road conditions to compute a better route and at the same time. 2014 7 ISJNW 07 Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming To facilitate efficient information exchange, wireless networks have been proposed to be widely used in the smart grid, which provide jamming resilience via multiple frequency and code channels, must be adapted to smart grid for secure wireless communications, 2014 8 ISJNW 08 A Social Network Based File Sharing System in Mobile Peer-to-peer Networks We propose a social network based file sharing system in mobile P2P networks. It takes advantage of node mobility and builds communities based on social network. 2014 9 ISJNW 09 ReDS: A Framework for Reputation-Enhanced DHTs we present Reputation for Directory Services (ReDS), a framework for enhancing lookups in redundant DHTs by tracking how well other nodes service lookup requests. 2014 10 ISJNW 10 Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks We propose two secure and efficient data transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, 2014 11 ISJNW 11 Continuous and Transparent User Identity Verification for Secure Internet Services Session management in distributed Internet services is traditionally based on username and password, and explicit logouts and timeouts that expire due to idle activity of the user. 2014
  • 5. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page5 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY SNO P.CODE TITLES DESCRIPTION YEAR 14 ISJNS 01 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks we propose an improvement for iterative filtering techniques by providing an initial approximation for such algorithms which makes them not only collusion robust, but also more accurate and faster converging. 2014 15 ISJNS 02 RRE: A Game-Theoretic Intrusion Response and Recovery Engine In this paper, we propose a new approach to automated response called the Response and Recovery Engine (RRE). Our engine employs a game-theoretic response strategy against adversaries modeled as opponents in a two-player Stackelberg stochastic game. 2014 16 ISJNS 03 An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System Efficient and trustworthy file querying is important to the overall performance of peer-to-peer (P2P) file sharing systems. Emerging methods are beginning to address this by exploiting online social networks (OSNs). 2014 17 ISJNS 04 SeLeCT: Self-Learning Classifier for Internet Traffic In this paper, we propose SeLeCT, a Self- Learning Classifier for Internet traffic. It uses unsupervised algorithms along with 2014 12 ISJNW 12 Error Minimizing Framework For Localizing Jammers In Wireless Networks We aim to design a framework that can localize one or multiple jammers with a high accuracy. Most of existing jammer-localization schemes utilizes indirect measurements affected by jamming attacks. 2013 13 ISJNW 13 Enabling Efficient WiFi- Based vehicular content distribution In this paper, we introduce Cooperative Content Distribution System for Vehicles which operates upon a network of infrastructure APs to collaboratively distribute contents to moving vehicles 2013
  • 6. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page6 an adaptive learning approach to automatically let classes of traffic emerge, being identified. Select automatically groups flows into pure clusters using alternating simple clustering and filtering. 18 ISJNS 05 To Shut Them Up or To Clarify: Restraining the Spread of Rumors in Online Social Networks In this paper, we focus on this part of work. The difficulty is that there does not exist a universal standard to evaluate them. To address this problem, we carry out a series of empirical and theoretical analysis on the basis of the introduced mathematical model. 2014 19 ISJNS 06 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. we design and validate a dynamic trust management protocol for secure routing optimization in DTN . 2014 20 ISJNS 07 PROFILR: Toward Preserving Privacy and Functionality in Geo social Networks In this paper, we propose to take first steps toward addressing the conflict between profit and privacy in geo social networks. We introduce PROFILR, a framework for constructing location centric profiles (LCPs), aggregates built over the profiles of users. 2014 21 ISJNS 08 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization We propose a decentralized cloud firewall framework for individual cloud customers. We investigate how to dynamically allocate resources to optimize resources provisioning cost. 2014 22 ISJNS 09 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks A data discovery and dissemination protocol for (WSNs) is responsible for updating configuration parameters .We proposes DiDrip n/w, It allows the network owners to authorize multiple network users with different privileges to simultaneously. 2014 23 ISJNS 10 Cost-Effective Authentic and Anonymous Data Data sharing with a large number of participants must take into account several 2014
  • 7. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page7 Sharing with Forward Security issues, including efficiency, data integrity and privacy of data owner. 24 ISJNS 11 SORT:A Self organizing Trust Model for Peer-to-Peer System This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. 2013 25 ISJNS 12 Unprivileged Black-Box Detection of User –Space Key We propose a new detection technique that simulates carefully crafted keystroke sequences in input and observes the behavior of the keylogger in output to unambiguously identify it among all the running processes. 2013 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON DATA MINING SNO P.CODE TITLES DESCRIPTION YEAR 26 ISJDM 01 Data Mining with Big Data Big Data concerns large-volume, growing data sets with multiple, autonomous sources. This article presents a HACE theorem that character izes the features of the Big Data revolution, and proposes a Big Data processing model. 2014 27 ISJDM 02 OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage In this paper, we propose a new one-to-many data linkage method that links between entities of different natures. The proposed method is based on a one-class clustering tree (OCCT) that characterizes the entities that should be linked together. 2014 28 ISJDM 03 KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications It aims at presenting a personalized service recommendation list and recommending the most appro-priate services to the users effectively. Specifically, keywords are used to indicate users' preferences, and a user-based Collaborative Filtering algorithm. 2014
  • 8. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page8 29 ISJDM 04 An Efficient Clustering Sentence-Level Text Using A Novel Hierarchical Fuzzy Relational Clustering Algorithm Clustering is the process of grouping or aggregating of data items. Sentence clustering mainly used in variety of applications such as classify and categorization of documents, automatic summary generation etc. 2014 30 ISJDM 05 PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications In this paper, we first observe an interesting similarity between this privacy-preserving traffic padding (PPTP) issue and another well studied problem, privacy-preserving data publishing(PPDP). 2014 31 ISJDM 06 Motif-based Hyponym Relation Extraction from Wikipedia Hyperlinks* This approach automatically constructs motif-based features from the hyperlink structure of a domain; every hyperlink is mapped to a 13-dimensional feature vector based on the 13 types of three-node motifs. 2014 32 ISJDM 07 Cost Minimization for Big Data Processing in Geo-Distributed Data Centers In this paper, we are motivated to study the cost minimization problem via a joint optimization of these three factors for big data services in geo-distributed data centers. 2014 33 ISJDM 08 Trinity: On Using Trinary Trees for Unsupervised Web Data Extraction Web data extractors are used to extract data from web documents in order to feed automated processes. we propose a technique that works on two or more web documents generated by the same server-side template and can later be used to extract data . 2014 34 ISJDM 09 Knowledge Fusion for Probabilistic Generative Classifiers with Data Mining Applications In this paper, we introduce a new way of fusing classifiers at the level of parameters of classification rules. This technique is based on the use of probabilistic generative classifiers using multinomial distributions for categorical input dimensions. 2014 35 ISJDM 10 CoRE: A Context-Aware Relation Extraction Method for We propose to formulate search queries for each query entity α based on some 2014
  • 9. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page9 Relation Completion auxiliary information, so that to detect its target entity β from the set of retrieved documents. 36 ISJDM 11 Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data In this paper, we start with a known set A of activities that we wish to monitor. We formally define the probability that a sequence of observations is unexplained A. 2014 37 ISJDM 12 An Unsupervised Feature Selection Framework for Social Media Data In this paper, we study the differences between social media data and traditional attribute-value data, investigate if the relations revealed in linked data can be used to select relevant features, and propose a novel unsupervised feature selection framework for linked social media data. 2014 38 ISJDM 13 Hadoop Based Enhanced Cloud Architecture For Bioinformatic Algorithms In this paper we present an enhanced Hadoop architecture to reduce computation by utilizing ―Common Features‖ before performing redundant computation. The enhanced Hadoop architecture allows the jobs to share these common features among them. 2014 39 ISJDM 14 An Empirical Performance Evaluation of Relational Keyword Search Techniques We present the most extensive empirical performance evaluation of relational keyword search techniques to appear to date in the literature. Our results indicate that many existing search techniques do not provide acceptable performance . 2014 40 ISJDM 15 Making Use of Partial Knowledge About Hidden States in HMMs: An Approach Based on Belief Functions This paper addresses the problem of parameter estimation and state prediction in hidden Markov models based on observed outputs and partial knowledge of hidden states expressed in the belief function framework. 2014 41 ISJDM 16 Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs In this paper, we define the problem of clustering correlated probabilistic graphs. To solve the challenging 2014
  • 10. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page10 problem, we propose two algorithms, namely the $PEEDR$ and the $CPGS$ clustering algorithm 42 ISJDM 17 Information Theoretic Outlier Detection For Large-Scale Categorical Data In this paper, we propose a formal definition of outliers and an optimization model of outlier detection, via a new concept of holoentropy that takes both entropy. We propose two practical 1-parameter outlier detection methods, named ITB-SS and ITB-SP. 2013 43 ISJDM 18 Secure Provenance Transmission For Streaming Data In this paper, we propose a novel approach to securely transmit provenance for streaming data by embedding provenance into the inter packet timing domain while addressing the above mentioned issues. 2013 44 ISJDM 19 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development Twitter has received much attention recently. An important characteristic of Twitter is its real-time nature. We investigate the real-time interaction of events such as earthquakes in Twitter and propose an algorithm to monitor tweets and to detect a target event. 2013 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 45 ISJCC 01 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud In this paper, we propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data 2014 46 ISJCC 02 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System In this paper, we present PACK, a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. Cloud 2014
  • 11. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page11 based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined. 47 ISJCC 03 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing In this paper, we propose a shared authority based privacy-preserving authentication protocol (SAPA) to address above privacy issue for cloud storage. 2014 48 ISJCC 04 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage In this paper, we show how too securely, efficiently, and flexibly share data with others in cloud storage. The novelty is that one can aggregate any set of secret keys and make them as compact as a single key. 2014 49 ISJCC 05 Cloud Genius: A Hybrid Decision Support Method for Automating the Migration of Web Application Clusters to Public Clouds In this paper, we expand on the additional complexity of facilitating migration support for multi-component web applications. we present an evolutionary migration process for web application clusters distributed over multiple locations.. 2014 50 ISJCC 06 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing Advancements in cloud computing are leading to a promising future for collaborative cloud computing (CCC), where globally-scattered distributed cloud resources belonging to different organizations or individuals. 2014 51 ISJCC 07 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds In this paper, we present IntTest, a scalable and effective service integrity attestation framework for SaaS clouds. IntTest provides a novel integrated attestation graph analysis scheme that can provide stronger attacker 2014 52 ISJCC 08 NCCloud: A Network- Coding-Based Storage System in a Cloud-of-Clouds To provide fault tolerance for cloud storage, recent if a cloud suffers from a permanent failure and loses all its data, We present a proxy-based storage system for fault-tolerant multiple-cloud storage called NCCloud, which achieves cost-effective repair for a 2014
  • 12. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page12 permanent single-cloud failure. 53 ISJCC 09 Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data In this paper, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing (MRSE). 2014 54 ISJCC 10 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. The cloud verifies the authenticity of the series without knowing the user's identity before storing data 2014 55 ISJCC 11 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Several alternatives exist for storage services, while data confidentiality solutions for the database as a service paradigm are still immature. 2014 56 ISJCC 12 Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services The rapid development of Internet of things (IoT) technology makes it possible for connecting various smart objects together through the Internet and providing more data interloper - ability methods for application. 2014 57 ISJCC 13 PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System In this paper, a novel authorized accessible privacy model (AAPM) is established. Patients can authorize physicians by setting an access tree supporting flexible threshold Predicates. 2014 58 ISJCC 14 Performance and cost evaluation of an adaptive encryption architecture for cloud databases We propose a novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the trade-off between the required data confidentiality level and the flexibility of the cloud database structures at design time. 2014 59 ISJCC 15 Scalable And Secure Sharing Of Personal Health Records In We propose a novel patient-centric framework and a suite of mechanisms 2013
  • 13. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page13 Cloud Computing Using ABE for data access control to PHRs stored in semi trusted servers. To achieve fine-grained and scalable data access control for PHRs. 60 ISJCC 16 pCloud: A Distributed System for Practical PIR we present pCloud, a distributed system that constitutes the first attempt towards practical cPIR. Our approach assumes a disk-based architecture that retrieves one page with a single query. 2013 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 61 ISJMC 01 Friendbook: A Semantic-based Friend Recommendation System for Social Networks We present Friendbook, a novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs. 2014 62 ISJMC 02 Optimal Multicast Capacity and Delay Tradeoffs in MANETs In this paper we give a global perspective of multicast capacity and delay analysis in MANETs. we consider four node mobility models: (1) two-dimensional (2) two-dimensional hybrid random walk, (3) one-dimensional (4) one-dimensional hybrid random walk. 2014 63 ISJMC 03 Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks We propose two novel energy-aware routing algorithms for wireless ad hoc networks, called reliable minimum energy cost routing and reliable minimum energy routing .RMECR addresses three important requirements of ad hoc networks energy-efficiency, reliability, and prolonging network . 2014 64 ISJMC 04 Wormhole Attack Detection Algorithms in Wireless Network Coding Systems In this paper, we quantify wormholes’ devastating harmful impact on network coding system performance.we propose DAWN, a Distributed detection 2014
  • 14. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page14 Algorithm against Wormhole in wireless Network coding systems, by the change of the flow directions of packets caused by wormholes 65 ISJMC 05 A Location-Privacy Threat Stemming from the Use of Shared Public IP Addresses This paper presents a concrete and wide spread example of situation where a user’s location privacy is unintentionally compromised by others, specifically the location-privacy threat that exists at access points that have a single public IP . 2014 66 ISJMC 06 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks In this paper, we propose a QoS-Oriented Distributed routing protocol (QOD) to enhance the QoS support capability of hybrid networks. Taking advantage of fewer transmission hops and any cast transmission features of the hybrid networks. 2014 67 ISJMC 07 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs We propose a P2P content-based file sharing system, namely SPOON, for disconnected MANETs. The system uses an interest extraction algorithm to derive a node's interests from its files for content-based file searching. 2013 68 ISJMC 08 A Joint Design for Distributed Stable Routing and Channel Assignment Over Multihop and Multiflow Mobile Ad Hoc Cognitive Networks In this paper, we propose a cross-layer distributed approach, called mobility-prediction- based joint stable routing and channel assignment (MP-JSRCA), to maximize the network throughput by jointly selecting stable routes based on mobility prediction 2014 69 ISJMC 09 The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data This paper presents a study on place characterization in people's everyday life based on data recorded continuously by smartphones.we study human mobility from sequences of place visits, including visiting patterns on different place categories. 2014 70 ISJMC 10 Efficient Privacy-Preserving Authentication in We propose a novel three-round anonymous roaming protocol that does 2014
  • 15. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page15 Wireless Mobile Networks not require the participation of Home servers. The proposed protocol uses a pseudo-identity-based sign-cryption scheme o perform efficient revocation 71 ISJMC 11 EAACK:A Secure Intrusion Detection System For MANETs In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive acknowledgment specially designed for MANETs. EAACK demonstrates higher malicious-Behavior-detection rates in certain circumstances while does not greatly affect the network performances. 2013 72 ISJMC 12 Toward Privacy Preserving And Collusion Resistance In A Location Proof Updating System We propose A Privacy-Preserving location proof Updating System (APPLAUS) in which co-located Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. 2013 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON INFORMATION FORENSCIS & SECURITY SNO P.CODE TITLES DESCRIPTION YEAR 73 ISJIF 01 Contrast Enhancement Based Forensics In Digital Image Contrast enhancement is typically used to adjust the global brightness and contrast of digital images. we propose two novel algorithms to detect the contrast enhancement involved manipulations in digital images 2014 74 ISJIF 02 Subset Membership Encryption And Its Applications To Oblivious Transfer In this paper, we propose a novel cryptographic notion called subset membership encryption (SME), and provide a very efficient SME scheme 2014 TECHNOLOGY: JAVA
  • 16. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page16 DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING SNO P.CODE TITLES DESCRIPTION YEAR 75 ISJSE 01 iTree: Efficiently Discovering High-Coverage Configurations Using Interaction Trees This paper presents an improved iTree algorithm .The key improvements are based on our use of composite proto-interactions a construct that improves iTree’s ability to correctly learn key configuration option combinations. 2014 76 ISJSE 02 Continuous and Transparent User Identity Verification for Secure Internet Services This paper explores promising alternatives offered by applying biometrics in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification 2014 77 ISJSE 03 Analyzing Critical Decision- Based Processes Process modeling, process analysis, model verification, decision errors, safety-critical workflows, non-functional requirements, domain-specific languages, formal specification 2014 78 ISJSE 04 On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices We proposeSPAG-C (Smart Phone Automated GUI testing tool with Camera), an extension of SPAG, to test an Adroid hardware device. Our goal is to further reduce the time required to record test cases and increase reusability of the test oracle without compromising test accuracy. 2014 79 ISJSE 05 Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler This paper develops a novel approach with an event-based Scheduler (EBS) and an ant colony optimization (ACO) algorithm. The proposed approach represents a plan by a task list and a Planned employee allocation matrix. 2013
  • 17. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page17 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING SNO P.CODE TITLES DESCRIPTION YEAR 80 ISJIP 01 Frame-Based Recovery of Corrupted Video Files Using Video Codec Specifications Recovery of a damaged or altered video file plays a crucial role in searching for evidences to resolve a criminal case. This paper presents a frame-based recovery technique of a corrupted video file using the specifications of a codec used to encode the video data. 2014 81 ISJIP 02 Multi label Image Classification via High-Order Label Correlation Driven Active Learning we propose a high-order label correlation driven active learning (HoAL) approach that allows the iterative learning algorithm.The proposed approach is tested on public data sets. 2014 82 ISJIP 03 Full-Reference Quality Estimation for Images With Different Spatial Resolutions In this paper, we begin by Identifying the potential weaknesses of previous approaches used to estimate the quality of experience, we design a QE to estimate the quality of a distorted image with a lower resolution. 2014 83 ISJIP 04 Single Image Interpolation via Adaptive Nonlocal Sparsity-Based Modeling Single image interpolation is a central and extensively studied problem in image processing.we proposes a novel image interpolation method which combines these two forces - non-local self-similarities and sparse representation modeling. 2014 84 ISJIP 05 Object-Oriented Shadow Detection and Removal From Urban High-Resolution Remote Sensing Images Change detection, inner–outer outline profile line (ioopl), object-oriented, relative radiometric correction, shadow Detection, shadow removal 2014 85 ISJIP 06 Measures of Effective Video Tracking In this paper, we survey existing multi target tracking performance scores and, after discussing their limitations, we propose three parameter-independent 2014
  • 18. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page18 measures for evaluating multi target video tracking. 86 ISJIP 07 Energy Preserving QMF for Image Processing Implementation of new bi orthogonal filter banks (BFB) for image compression and denoising is performed, using test images with diversified characteristics. These new BFB’sare linear-phase, have odd lengths, and with a critical feature. 2014 87 ISJIP 08 A Novel Joint Data Hiding And Compression Scheme Based On SMVQ And Image Inpainting In this paper, we propose a novel joint data-hiding and compression scheme for digital images using side match vector quantization (SMVQ) and image inpainting. 2013 88 ISJIP 09 Context Dependent Logo Matching And Recognition We contribute, through this paper, to the design of a novel variational framework able to match and recognize multiple instances of multiple reference logos in image archives 2013 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 89 ISJGC 01 Data Attack Isolation in Power Networks Using Secure Voltage Magnitude Measurements In this paper a procedure to detect and isolate data attacks on power network power flow measurements is proposed. This method can be used in conjunction with available bad data detection (BDD) methods to isolate multiple bad data which are otherwise difficult to handle. 2014 90 ISJGC 02 PRGA: Privacy-preserving Recording &Gateway-assisted Authentication of Power Usage Information for Smart Grid We propose a scheme such that even the control center does not know which user makes the requests of using more power or agreements of using less power until the power is actually used.. 2014
  • 19. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page19 91 ISJGC 03 Resource Selection for Tasks with Time Requirements Using Spectral Clustering We propose an algorithm for assigning tasks to resources that minimizes the violations of the tasks’ time requirements while simultaneously maximizing the resources’ utilization efficiency for a given number of resources. 2014 92 ISJGC 04 On the Design of Mutually Aware Optimal Pricing and Load Balancing Strategies for Grid Computing Systems Managing resources and cleverly pricing them on computing systems is a challenging task. Resource sharing demands careful load balancing and often strives to achieve a win-win situation between resource providers and users 2013 TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA SNO P.CODE TITLES DESCRIPTION YEAR 93 ISJMM 01 An Adaptive Energy-Efficient Stream Decoding System for Cloud Multimedia Network on Multi-core Architectures This paper proposed an adaptive energy-efficient stream decoding system for cloud multimedia network on multicore systems. The overall dynamic energy-efficient design was planned in a systematic viewpoint. 2014 94 ISJMM 02 Business Intelligence from Social Media: A Study from the VAST Box Office Challenge The goal is to extract information from this noisy, unstructured data and use it for trend analysis and prediction. This paper presents a visual analytics system which extracts data from Bitly and Twitter to use for box office revenue and user rating predictions. 2014 95 ISJMM 02 Uniform Embedding for Efficient JPEG Steganography In this paper, a class of new distortion functions known as uniform embedding distortion function (UED) is presented for both side-informed and non side-informed secure JPEG steganography. 2014
  • 20. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page20 J2EE TECHNOLOGY: J2EE DOMAIN : WEB SERVICES SNO P.CODE TITLES DESCRIPTION YEAR 01 ISJWS 01 A Technique for Deploying Robust Web Services This paper proposes a mechanism that automatically fixes robustness problems in web services. The approach consists of using robustness testing to detect robustness issues and then mitigate those issues by applying inputs verification based on well-defined parameter domains, including domain dependencies between different parameters. 2014 02 ISJWS 02 Web Image Re-Ranking Using Query-Specific Semantic Signatures we propose a novel image re-ranking Framework, which automatically offline learns different visual semantic spaces for different query keywords through keyword expansions. The visual features of images are projected into their related visual semantic spaces to get semantic signatures.. 2014 03 ISJWS 03 An Empirical Performance Evaluation of Relational Keyword Search Techniques we present the most extensive empirical performance evaluation of relational keyword search techniques to appear to date in the literature. Our results indicate that many existing search techniques do not provide acceptable performance for realistic retrieval tasks 2014 04 ISJWS 04 Scalable Keyword Search on Large RDF Data we propose an effective summarization Algorithm to summarize the RDF data. Given a keyword query, the summaries lend significant pruning powers to exploratory keyword search and result in much better efficiency compared to previous works 2014
  • 21. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page21 TECHNOLOGY: J2EE DOMAIN : PERVASIVE COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 05 ISJPC 01 Efficient Authentication for Mobile and Pervasive Computing We propose two novel techniques for authenticating short encrypted messages that are directed to meet the requirements of mobile and pervasive applications. 2014 06 ISJPC 02 Convenience Probe: A Phone- Based System for Retail Trade-Area Analysis Systematically and quantitatively determining patterns in consumer flow is an important problem in marketing research. 2014 07 ISJPC 03 The Clash between Privacy and Automation in Social Media Classic research on human factors has found that automation never fully eliminates the human operator from the loop. 2014 08 ISJPC 04 Mining Private Information from Public Data: Transantiago, the smartcard-based public transportation system in Santiago, Chile, includes both a subway system and buses. An online information system lets card holders find detailed trip information, including start time and location. 2014 ANDROID TECHNOLOGY: ANDROID DOMAIN : CONTEXT AWARE SNO P.CODE TITLES DESCRIPTION YEAR 01 ISACA 01 Context-Aware QoE Modelling, Measurement and Prediction in Mobile Computing Systems Bayesian networks, context-awareness, decision theory, quality of experience, simulations, prototyping, user tests 2014 02 ISJACA 02 Context-based Access Control Systems for Mobile We propose such an access control mechanism. Our implementation 2014
  • 22. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page22 Devices of context differentiates between closely located sub-areas within the same location. TECHNOLOGY: ANDROID DOMAIN : DATA ENGINEERING SNO P.CODE TITLES DESCRIPTION YEAR 03 ISADE 01 EasySMS: A Protocol for End-to-End Secure Transmission of SMS we propose an efficient and secure protocol called EasySMS, which provides end-to end secure communication through SMS between end users. 2014 04 ISADE 02 Discovery of Ranking Fraud for Mobile Apps We provide a holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps. Specifically, we propose to accurately locate the ranking fraud by mining . 2014 05 ISADE 03 Real-Time City-Scale Taxi Ridesharing We proposed and developed a taxi-sharing system that accepts taxi passengers’ real-time ride requests sent from Smartphone and schedules proper taxis to pick up them via ridesharing, subject to time, capacity. 2014 06 ISADE 04 MOSES: Supporting and Enforcing Security Profiles on Smartphones We present MOSES, a policy-based framework for enforcing software isolation of applications and data on the Android platform. InMOSES, it is possible to define distinct Security Profiles within a single Smartphone. 2014 TECHNOLOGY: ANDROID DOMAIN : CLOUD COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 07 ISACC 01 Keylogging-resistant visual authentication Protocols we propose two visual authentication protocols: one is a one-time-password protocol, and the other is a password- 2014
  • 23. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page23 based authentication protocol 08 ISACC 02 Energy-Aware Web Browsing on Smartphones we introduce a practical data mining based method to predict the user reading time of web pages, based on which the Smartphone can switch to low power state when the reading time is longer than a threshold 2014 09 ISACC 03 Mobiflage: Deniable Storage Encryption for Mobile Devices Mobiflage enables PDE on mobile devices by hiding encrypted volumes within random data in a devices free storage space. 2014 TECHNOLOGY: ANDROID DOMAIN : MOBILE COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 10 ISAMC 01 How Long to Wait? Predicting Bus Arrival Time With Mobile Phone Based Participatory Sensing We present a bus arrival time prediction system based on bus passengers’ participatory sensing. With commodity mobile phones, the bus passengers’ surrounding environmental context is effectively collected and utilized to estimate the bus traveling routes and predict bus arrival time at various bus stops. 2014 11 ISAMC 02 Analysis of Smart Mobile Applications for Healthcare under Dynamic Context Changes This paper proposes a novel technique to analyze SMDCSes taking into account the dynamic changes in the context and the constant interaction of the computing systems with the physical environment 2014 12 ISAMC 03 Face-to-Face Proximity Estimation Using Bluetooth On Smartphones we demonstrate through experimental studies the efficacy of Bluetooth for this exact purpose. We propose a proximity estimation model to determine the distance based on the RSSI values of Bluetooth and light sensor data in different environments. 2014
  • 24. Iris Solutions TECHNOLOGY: JAVA DOMAIN : NON IEEE BASED PROJECTS We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page24 JAVA APPLICATION PROJECTS SNO P.CODE TITLES 1 ISJNI01 Security Environment In Travel Individuality Using Aadhaar 2 ISJNI02 Organize A Data Storage System With Security In Cloud Computing 3 ISJNI03 E Compiler For Java With Security Editor 4 ISJNI04 Medicare And Medicate Distributed System 5 ISJNI05 Scheduling On TimeTable Management System 6 ISJNI06 Web Portal 7 ISJNI07 Book Warehouse Management System 8 ISJNI08 Human Resource Management System 9 ISJNI09 A Conceptual View Of Web Based E-Learning System 10 ISJNI10 Inventory Management System 11 ISJNI11 Learner Reports Database Management System 12 ISJNI12 Monitoring Online Tests Through Data Visualization 13 ISJNI13 Framework For Adaptive Intrusion Detection System 14 ISJNI14 Agile Routing Protocol in p2p Networks
  • 25. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page25 DOTNET TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON NETWORKING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISDNW 01 OSA: An Optical Switching Architecture for Data Center Networks With Unprecedented Flexibility In this paper, we present the design, implementation, and evaluation of OSA, a novel Optical Switching Architecture for DCNs. 2014 2 ISDNW 02 A Trust-Aware System for Personalized User Recommendations in Social Networks In this paper,we introduce a framework for handling trust in social networks. 2014 3 ISDNW 03 SeLeCT: Self-Learning Classifier for Internet Traffic In this paper SeLeCT, a Self-Learning Classifier for Internet Traffic. 2014 4 ISDNW 04 Robust Multi-Factor Authentication for Fragile Communications In this paper is two-fold. In a slow connection situation, we present a secure generic multi-factor authentication protocol to speed up the whole authentication process. 2014 5 ISDNW 05 Network Codes Resilient to Jamming and Eavesdropping In this Paper, We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. 2014 6 IDSNW 06 Network Resource Allocation for Users With Multiple Connections: Fairness and Stability This paper studies network resource allocation between users that manage multiple connections, possibly through different routes, where each connection is subject to congestion control. 2014 7 ISDNW 07 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System In this paper, we present PACK (Predictive ACKs),a novel end-to-end traffic redundancy elimination (TRE) system, designed for cloud computing customers. 2014
  • 26. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page26 8 ISDNW 08 Privacy-Preserving Quantification of Cross-Domain Network Reachability In this paper, we propose the first cross-domain privacy-preserving protocol for quantifying network reachability. 2014 9 ISDNW 09 Identity-Based Secure Distributed Data Storage Schemes In this paper, we propose two identity-based secure distributed data storage (IBSDDS) schemes. 2014 10 ISDNW 10 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks In this paper, we propose to use spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography. 2013 TECHNOLOGY : DOTNET DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY SNO P.CODE TITLES DESCRIPTION YEAR 11 ISDNS 01 A System for Denial-of- Service Attack Detection Based on Multivariate Correlation Analysis In this paper, we present a DoS attack detection system that uses multivariate correlation analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between network traffic features. 2014 12 ISDNS 02 An Error-Minimizing Framework for Localizing Jammers in Wireless Networks In this paper, we aim to design a framework that can localize one or multiple jammers with a high accuracy. 2014 13 ISDNS 03 Behavioral Malware Detection in Delay Tolerant Networks In this paper, we first propose a general behavioral characterization of proximity malware which based on naive Bayesian model. 2014 14 ISDNS 04 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels In this paper the deployment of special purpose MACs, named E-MACs. The main motivation behind this work is the observation that, since the message must be both encrypted and authenticated, there might be some redundancy in the computations performed by the two primitives. 2014
  • 27. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page27 15 ISDNS 05 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption This paper presents a novel approach to provide confidentiality and authentication in a broker-less content-based publish/subscribe system. 2014 16 ISDNS 06 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks In this paper, we propose a scalable authentication scheme based on elliptic curve cryptography .While enabling intermediate nodes authentication. 2014 17 ISDNS 07 Privacy-Preserving Authenticated Key-Exchange Over Internet In this paper, we develop a family of privacy-preserving authenticated DHKE protocols named deniable Internet key-exchange (DIKE), both in the traditional PKI setting and in the identity-based setting. 2014 18 ISDNS 08 Further Observations on Smart- Card-Based Password- Authenticated Key Agreement in Distributed Systems This paper initiates the study of two specific security threats on smart-card-based password authentication in distributed systems. 2014 19 ISDNS 09 Secure and Efficient Data Transmission for Cluster- Based Wireless Sensor Networks In this paper ,We propose two secure and efficient data transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/offline digital signature (IBOOS) scheme, respectively. 2014 20 ISDNS 10 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing In this paper, we design and validate a dynamic trust management protocol for secure routing optimization in DTN environments in the presence of well-behaved, selfish and malicious nodes. 2014 21 ISDNS 11 Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks We consider the problem of secure detection in wireless sensor networks operating over insecure links. 2014
  • 28. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page28 22 ISDNS 12 A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices In this paper, we propose a model to estimate P2P traffic matrices in operational networks. Important factors are considered, including the number of peers, the localization ratio of P2P traffic, and the network distance. 2014 23 ISDNS 13 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks In this paper, we propose iTrust, a probabilistic misbehavior detection scheme, for secure DTN routing toward efficient trust establishment. 2014 24 ISDNS 14 A Scalable and Modular Architecture for High Performance Packet Classification In this paper we propose a novel modular Bit-Vector (BV) based architecture to perform high-speed packet classification on Field Programmable Gate Array (FPGA). 2014 25 ISDNS 15 Secret Key Generation in the Two-Way Relay Channel With Active Attackers In This paper studies the key generation problem in the two-way relay channel, in which there is no direct channel between the key generating terminals. 2014 26 ISDNS 16 Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution In this paper, a novel scheme of data hiding directly in the encrypted version of H.264/AVC video stream is proposed, which includes the following three parts, i.e., H.264/AVC video encryption, data embedding, and data extraction. 2014 27 ISDNS 17 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. 2013
  • 29. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page29 28 ISDNS 18 Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems In this paper, where an eavesdropper is present. Distributed pre coding through multiple relay nodes can be used to enhance the received signal power a t the destination node and to mitigate the signal leakage to the eavesdropper, simultaneously. 2013 TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON DATAMINING SNO P. CODE PROJECT TITLES DESCRIPTION YEAR 29 ISDDM 01 An Empirical Performance Evaluation of Relational Keyword Search Systems In this paper, we present a thorough empirical performance evaluation of relational keyword search systems. 2014 30 ISDDM 02 The Role of Hubness in Clustering High Dimensional Data In this paper, we take a novel perspective on the problem of clustering high-dimensional data. Instead of attempting to avoid the curse of dimensionality by observing a lower dimensional feature subspace, we embrace dimensionality by taking advantage of inherently high-dimensional phenomena. 2014 31 ISDDM 03 Scalable Similarity Search With Topology Preserving Hashing In this paper, we propose a novel hashing method to solve these two issues jointly. The proposed method is referred to as topology preserving hashing (TPH). 2014 32 ISDDM 04 Facilitating Document Annotation Using Content and Querying Value In this paper, we present algorithms that identify structured attributes that are likely to appear within the document, by jointly utilizing the content of the text and the query workload. 2014 33 ISDDM 05 Web Image Re-Ranking Using Query-Specific Semantic Signatures In this paper, we propose a novel image re-ranking framework, which automatically offline learns different visual semantic spaces for different query keywords through keyword expansions. 2014
  • 30. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page30 34 ISDDM 06 Supporting Privacy Protection in Personalized Web Search I In this paper, PWS framework called UPS t that can adaptively generalize profiles by queries while respecting user specified privacy requirements. 2014 35 ISDDM 07 Secure Mining of Association Rules in Horizontally Distributed Databases The main ingredients in our protocol are two novel secure multi-party algorithms one that computes the union of private subsets that each of the interacting players hold, and another that tests the inclusion of an element held by one player in a subset held by another. 2014 36 ISDDM 08 Fast Nearest Neighbor Search with Keywords In this paper, has a few deficiencies that seriously impact its efficiency. Motivated by this, we develop a new access method called the spatial inverted index that extends the conventional inverted index to cope with multidimensional data, and comes with algorithms that can answer nearest neighbor queries with keywords in real time. 2014 37 ISDDM 09 Keyword Query Routing Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. 2014 38 ISDDM 10 A Cocktail Approach for Travel Package Recommendation In this paper, we first analyze the characteristics of the existing travel packages and develop a tourist-area-season topic (TAST) model. 2014 39 ISDDM 11 Ginix: Generalized Inverted Index for Keyword Search This paper presents a more efficient index structure, the Generalized Inverted Index (Ginix), which merges consecutive IDs in inverted lists into intervals to save storage space. 2013
  • 31. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page31 40 ISDDM 12 Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework The proposed method is based on the maximization of generalized - likelihood criterion, which can be interpreted as a degree of agreement between the statistical model and the uncertain observations. 2013 TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING SNO P. CODE PROJECT TITLES DESCRIPTION YEAR 41 ISDCC 01 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds We propose a new decentralized access control scheme for secure data storage in clouds that supports anonymous authentication. 2014 42 ISDCC 02 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage The proposed ID-DPDP protocol is provably secure under the hardness assumption of the standard CDH problem. 2014 43 ISDCC 03 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud In this paper, we propose a novel Privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. 2014 44 ISDCC 04 Privacy-Preserving Multi- Keyword Ranked Search over Encrypted Cloud Data In this paper, for the first time, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted data in cloud computing (MRSE). 2014 45 ISDCC 05 Shared Shared Authority Based Privacy-Preserving Authentication Protocol In Cloud Computing In this paper, we propose a shared authority based privacy-preserving authentication protocol (SAPA) to address above privacy issue for cloud storage. 2014 46 ISDCC 06 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds In this paper, we present IntTest, a scalable and effective service integrity attestation framework for SaaS clouds. 2014
  • 32. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page32 47 ISDCC 07 Dynamic Heterogeneity-Aware Resource Provisioning in the Cloud Abstract—Data centers consume tremendous amounts of energy in terms of power distribution and cooling. 2014 48 ISDCC 08 Enabling Data Integrity Protection in Regenerating- Coding-Based Cloud Storage: Theory and Implementation In this Paper To protect outsourced data in cloud storage against corruptions, adding fault tolerance to cloud storage, along with efficient data integrity checking.. 2014 49 ISDCC 09 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage In this paper, we show how to securely, efficiently, and flexibly share data with others in cloud storage. 2014 50 ISDCC 10 NCCloud: A Network-Coding- Based Storage System in a Cloud-of-Clouds In this Paper To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. 2014 51 ISDCC 11 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases In this paper, The proposed architecture has the further advantage of eliminating intermediate proxies that limit the elasticity, availability, and scalability . 2014 TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING SNO P. CODE PROJECT TITLES DESCRIPTION YEAR 52 ISDMC 01 Friendbook: A Semantic-based Friend Recommendation System for Social Networks In this paper, we present Friendbook, a novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their life styles. 2014 53 ISDMC 02 Efficient Authentication for Mobile and Pervasive Computing We propose provably secure authentication codes that are more efficient than any message authentication code in the literature. 2014 54 ISDMC 03 Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks In this paper, We propose two novel energy-aware routing algorithms for wireless ad hoc networks, called reliable minimum energy cost routing (RMECR). 2014
  • 33. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page33 55 ISDMC 04 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach In This paper attempts to resolve this issue by designing a dynamic source routing (DSR)-based routing mechanism, which is referred to as the cooperative bait detection scheme. 2014 56 ISDMC 05 Keylogging-resistant Visual Authentication Protocols In this paper, we demonstrate how careful visualization design can enhance not only the security but also the usability of authentication. 2014 57 ISDMC 06 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices In this paper, we investigate the problem of how to optimally distribute the content-based signatures of malware. 2014 58 ISDMC 07 STARS: A Statistical Traffic Pattern Discovery System for MANETs In this paper, we show that MANETs are still vulnerable under passive statistical traffic analysis attacks. 2014 TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING SNO P.CODE TITLES DESCRIPTION YEAR 59 ISDIP 01 Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration This paper proposes a method of scene text recognition from detected text regions. In text detection, our previously proposed algorithms are applied to obtain text regions from scene image. 2014 60 ISDIP 02 How to Select Good Neighboring Images in Depth- Map Merging Based 3D Modeling This paper is intended to tackle this issue for large scale scene reconstruction where many unordered images are captured and used with substantial varying scale 2014 61 ISDIP 03 QR Images: Optimized Image Embedding in QR Codes This paper introduces the concept of QR images, an automatic method to embed QR codes into color images with bounded probability of detection error. 2014
  • 34. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page34 62 ISDIP 04 A Fragile Watermarking Algorithm for Hologram Authentication A fragile watermarking algorithm for hologram authentication is presented in this paper. In the proposed algorithm, the watermark is embedded in the discrete cosine transform (DCT) 2014 63 ISDIP 05 Weakly Supervised Photo Cropping In this paper, we propose weakly supervised photo cropping, where a manifold embedding algorithm is developed to incorporate image-level semantics and image global. 2014 TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 64 ISDGC01 Rateless Codes and Random Walks for P2P Resource Discovery in Grids In this paper, the system is represented as a set of nodes connected to form a P2P network where each node holds a piece of information that is required to be communicated to all the participants. 2014 65 ISDGC02 PRGA:Privacy-preserving Recording &Gateway-assisted Authentication of Power Usage Information for Smart Grid In this paper, we propose a scheme such that even the control center does not know which user makes the requests of using more power or agreements of using less power until the power is actually used. 2014 66 ISDGC03 On the Design of Mutually Aware Optimal Pricing and Load Balancing Strategies for Grid Computing Systems Managing resources and cleverly pricing them on computing systems is a challenging task. Resource sharing demands careful load . 2014 TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING SNO P.CODE PROJECT TITLES DESCRIPTION YEAR 67 ISDSE 01 Modular Software Model Checking for Distributed Systems This paper proposes cachebased model checking, which relaxes this limitation to some extent by verifying one process at a time and running other processes in another execution environment. 2014
  • 35. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page35 68 ISDSE 02 COALA - System for Visual Representation of Cryptography Algorithms This paper presents a novel software system for Cryptographic Algorithm visual representation (COALA), which was developed to support a Data Security course at the School of Electrical Engineering, University of Belgrade. 2014 69 ISDSE 03 GOSSIPKIT: A Unified Component Framework for Gossip In this paper, we consider how component frameworks, which have been widely applied to implement middleware solutions, can facilitate the development of gossip-based systems in a way that is both generic and simple. 2014 TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA SNO P.CODE PROJECT TITLES DESCRIPTION YEAR 70 ISDMM01 A Generative Model for Concurrent Image Retrieval and ROI Segmentation This paper proposes a probabilistic generative model that concurrently tackles the problems of image retrieval and region-of-interest (ROI) segmentation. 2014 71 ISDMM02 Adaptive Watermarking and Tree Structure Based Image Quality Estimation The proposed scheme uses the embedded watermark to estimate the degradation of cover image under different distortions. 2014 72 ISDMM03 An Adaptive Energy-Efficient Stream Decoding System for Cloud Multimedia Network on Multicore Architectures As the technology of applying a cloud network to cloud multimedia matures, a solution to the present demand for high quality and diversified cloud multimedia can be provided. 2014 73 ISDMM04 Generalized Equalization Model for Image Enhancement In this paper, we propose a generalized equalization model for image enhancement. 2014 74 ISDMM 05 Reversible Data Hiding in Encrypted JPEG BitStream In This paper a framework of reversible data hiding (RDH) in an encrypted JPEG bit stream. 2014
  • 36. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page36 DOTNET APPLICATION PROJECTS TECHNOLOGY : DOTNET DOMAIN : NON IEEE BASED PROJECTS SNO P.CODE PROJECT TITLE 1 ISNID 01 Real Time Data Communications Between Automated Command Centers 2 ISNID 02 The Research Of Economy Hotel In One City Room Allocation And Global Optimization Based On Revenue Management 3 ISNID 03 Steady-State Circular Errors For Basic Tracking Filters 4 ISNID 04 Knowledge Excavation Of Knowledge Base In College Libraries 5 ISNID 05 A Contextualization Method Of Browsing Events In Web-Based Learning Content Management System For Personalized Learning 6 ISNID 06 In-Network Real-Time Performance Monitoring With Distributed Event Processing 7 ISNID 07 A Prediction Study On Tourist Amount Based On Web Search Data 8 ISNID 08 A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory 9 ISNID 09 Physical Layer Assisted Authentication For Distributed Ad Hoc Wireless Sensor Networks 10 ISNID 10 E-Business And E-Commerce Applications And Trends In The Retailing Sector 11 ISNID 11 An Effective Self-Adaptive Load Balancing Algorithm For Peer-To-Peer Networks 12 ISNID 12 Combining Web Services To Manage Real-Time Navigation Data Distribution 13 ISNID 13 The Dynamic Competition Diffusion Model Of B2C E-Commerce In Potential Customers 14 ISNID 14 The Effect Of Pairs In Program Design Tasks
  • 37. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page37 15 ISNID 15 Content-Based Routing In Mobile Ad Hoc Networks 16 ISNID 16 Browsing Management System 17 ISNID 17 Performance Analysis Of MIMO Multi Relay System In Cooperative Relay Network 18 ISNID 18 Improving Wireless Physical Layer Security Via Cooperating Relays 19 ISNID 19 Analysis Of Ego Network Structure In Online Social Networks 20 ISNID 20 P2P-Based Locking In Real-Time Collaborative Editing Systems 21 ISNID 21 Minimizing File Download Time In Stochastic Peer-To-Peer Networks 22 ISNID 22 An Efficient Parallel Algorithm For Secured Data Communications Using RSA Public Key Cryptography Method 23 ISNID 23 Rateless Forward Error Correction For Topology-Transparent Scheduling 24 ISNID 24 Secure Communication In 802.11 Networks With A Novel Protocol Using Quantum Cryptography 25 ISNID 25 Personal Computer Voice Control Software 26 ISNID 26 In-Depth Packet Inspection Using A Hierarchical Pattern Matching Algorithm 27 ISNID 27 Securing Node Capture Attacks For Data Aggregation In Wireless Sensor Networks 28 ISNID 28 Persuasive Cued Click-Points: Design, Implementation, And Evaluation Of A Knowledge-Based Authentication Mechanism 29 ISNID 29 Multi Factor Authentication Method For Banking Applications 30 ISNID 30 Joint Topology Control And Authentication Design In Mobile Ad Hoc Networks With Cooperative Communications 31 ISNID 31 Effective Software Merging In The Presence Of Object-Oriented Refactorings 32 ISNID 32 Distributed Broadcast File Management System 33 ISNID 33 Downloading Secured File Using Multiple Servers
  • 38. Iris Solutions 34 ISNID 34 An Adaptive Reputation-Based Trust Framework For Peer-To-Peer Applications 35 ISNID 35 Measuring Capacity Bandwidth Of Targete Path Segments 36 ISNID 36 Comparative Evaluation Of Algorithms For Effective Data Leakage Detection We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page38 NS2 37 ISNID 37 Learning To Adapt Web Information Extraction Knowledge And Discovering New Attributes Via A Bayesian Approach 38 ISNID 38 Online Insurance Management System 39 ISNID 39 A Service-Based Distributed Query Processor For The Grid TECHNOLOGY : NS2 DOMAIN : IEEE TRANSACTIONS MOBILE AD HOC NETWORKS SNO P.CODE PROJECT TITLE YEAR 01 ISNMA 01 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2014 02 ISNMA 02 Adaptive Scheduling in MIMO-Based Heterogeneous Ad Hoc Networks 2014 03 ISNMA 03 Transmission Sequence Design and Allocation for Wide-Area Ad Hoc Networks 2014 04 ISNMA 04 Delay and Capacity Analysis in MANETs with Correlated Mobility and f-cast Relay 2014 05 ISNMA 05 Joint Mobile Data Gathering and Energy Provisioning in Wireless Rechargeable Sensor Networks 2014 06 ISNMA 06 A Context-Aware M2M-Based Middleware for Service Selection in Mobile Ad-Hoc Networks 2014 07 ISNMA 07 Performance Improvement of Topology-Transparent Broadcast Scheduling in Mobile Ad Hoc Networks 2014 08 ISNMA 08 A New Approach to the Directed Connectivity in Two-Dimensional Lattice Networks 2014
  • 39. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page39 TECHNOLOGY : NS2 DOMAIN : IEEE TRANSACTIONS ON WIRELESS SENSOR NETWORK SNO P.CODE TITLES YEAR 01 ISNWS 01 Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks 2014 02 ISNWS 02 Localization-Oriented Network Adjustment in Wireless Ad Hoc and Sensor Networks 2014 03 ISNWS 03 A Novel Approach to Trust Management in Unattended Wireless Sensor Networks 2014 04 ISNWS 04 Secure Continuous Aggregation in Wireless Sensor Networks 2014 05 ISNWS 05 A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks 2014 06 ISNWS 06 Fast Data Collection in Linear Duty-Cycled Wireless Sensor Networks 2014 07 ISNWS 07 Optimal Prediction Likelihood Tree Based Source- Channel ML Decoder for Wireless Sensor Networks 2014 08 ISNWS 08 A Stochastic Time-domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks 2014 09 ISNWS 09 Accuracy of Homology Based Coverage Hole Detection for Wireless Sensor Networks on Sphere 2014 10 ISNWS 10 Energy-Efficient RSSI-Based Localization for Wireless Sensor Networks 2014 11 ISNWS 11 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks 2014 09 ISNMA 09 A Channel Hopping Multi-Channel MAC Protocol for Mobile Ad Hoc Networks 2014 10 ISNMA 10 Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning 2014 11 ISNMA 11 BRACER: A Distributed Broadcast Protocol in Multi-hop Cognitive Radio Ad Hoc Networks with Collision Avoidance 2014 12 ISNMA 12 Efficient and Reliable MPEG-4 Multicast MAC Protocol for Wireless Networks 2014 13 ISNMA 13 AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments 2014
  • 40. Iris Solutions We will provide online support and deliver a project anywhere. Also contact us to develop your own idea. Mail: info@irisprojects.com website: www.irisprojects.com, www.irissolutions.org Our branches: Trichy: 9943 314 314, Kovai: 9943 357 357, Tanjore: 9943 317 317, Page40 12 ISNWS 12 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2014 TECHNOLOGY : NS2 DOMAIN : IEEE TRANSACTIONS ON VEHICULAR AD HOC NETWORKS SNO P.CODE TITLES YEAR 01 ISNVA 01 A Vehicular Networking Perspective on Estimating Vehicle Collision Probability at Intersections 2014 02 ISNVA 02 DOVE: Data Dissemination to a Desired Number of Receivers in VANET 2014 03 ISNVA 03 A Scalable Bandwidth-Efficient Hybrid Adaptive Service Discovery Protocol for Vehicular Networks with Infrastructure Support 2014 04 ISNVA 04 Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks 2014 05 ISNVA 05 Vehicle Mobility and Communication Channel Models for Realistic and Efficient Highway VANET Simulation 2014 06 ISNVA 06 A Fuzzy Multi-metric QoS-balancing Gateway Selection Algorithm in a Clustered VANET to LTE Advanced Hybrid Cellular Network 2014 07 ISNVA 07 Maximizing Network Topology Lifetime using Mobile Node Rotation 2014 08 ISNVA 08 An Evolutionary Game Theory Based Approach for Cooperation in VANETs Under Different Network Conditions 2014 09 ISNVA 09 Performance-Aware Mobile Community-based VoD Streaming over Vehicular Ad Hoc Networks 2014 10 ISNVA 10 Multiple Vehicles Collaborative Data Download Protocol via Network Coding 2014