Sei sulla pagina 1di 5

JAVA TITLES KNOWLEDGE AND DATA ENGINEERING Project Code NSJ01 NSJ02 NSJ03 NSJ04 NSJ05 NSJ06 NSJ07

NSJ08 NSJ09 NSJ10 NSJ11 NSJ12 NSJ13 NSJ14 NSJ15 NSJ16 NSJ17 NSJ18 NSJ19 NSJ20 Project Title Experience Transfer for the Configuration Tuning in Large-Scale Computing Systems Answering Frequent Probabilistic Inference Queries in Databases Constrained Skyline Query Processing against Distributed Data Sites Design and Implementation of an Intrusion Response System for Relational Databases Efficient Techniques for Online Record Linkage Energy Time Series Forecasting Based on Pattern Sequence Similarity Anonymous Publication of Sensitive Transactional Data Privacy-Preserving OLAP: An Information-Theoretic Approach Ranking Spatial Data by Quality Preferences Usher: Improving Data Quality with Dynamic Forms A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems Clustering with Multi-Viewpoint based Similarity Measure Sketch4Match-Content Based Image Retrival System Using Sketches A Competitive Study of Cryptography Techniques over Block Cipher Decision Trees for Uncertain Data Extended XML Tree Pattern Matching Theories and Algorithms Discovering Conditional Functional Dependencies Ranking Spatial Data by Quality Preferences The Co QUOS Approach to Continuous Queries in Unstructured Overlays Effective Navigation of Query Results Based on Concept Hierarchies MOBILE COMPUTING Project Code NSJ21 NSJ22 NSJ23 NSJ24 NSJ25 Project Title An Improved Geocast for Mobile Ad Hoc Networks Analysis of Best Channel Feedback and Its Adaptive Algorithms for Multicarrier Wireless Data Systems Data Delivery Properties of Human Contact Networks Dynamic Conflict-Free Transmission Scheduling for Sensor Network Querie Efficient Data Collection in Wireless Sensor Networks with Path-Constrained Mobile Sinks

Old #1 New#12, Sona Complex, 2nd Floor, 52nd Street, 7th Avenue, Ashok Nagar, Chennai 600 083. Phone: 044 45022280, E-Mail: notussoft@gmail.com , web: www.notussoft.in

NSJ26 NSJ27 NSJ28 NSJ29 NSJ30 NSJ31

Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems Processing Continuous Range Queries with Spatiotemporal Tolerance Secure High-Throughput Multicast Routing in Wireless Mesh Networks Stealthy Attacks in Wireless Ad HocNetworks: Detection and Countermeasure A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks

IMAGE PROCESSING Project Code NSJ32 NSJ33 NSJ34 NSJ35 NSJ36 Project Title A New Hybrid Method for Image Approximation Using the Easy Path Wavelet Transform Graph Cuts for Curvature Based Image Denoising Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts Image Denoising in Mixed PoissonGaussian Noise Practical Bounds on Image Denoising:From Estimation to Information

MULTIMEDIA Project Code NSJ37 NSJ38 NSJ39 NSJ40 NSJ41 NSJ42 Project Title Interactive Image Segmentation With Multiple Linear Reconstructions in Windows Semi-Automatic Tagging of Photo Albums via Exemplar Selection and Tag Inference Collaborative Face Recognition for Improved Face Annotation in Personal Photo Collections Shared on Online Social Networks Reduced-Reference Image Quality Assessment Using Reorganized DCT-Based Image Representation Perceptually Guided Fast Compression of 3-D Motion Capture Data Optimal Bandwidth Assignment for Multiple Description Coded Video DEPENDABLE AND SECURE COMPUTING Project Code NSJ43 Project Title A Stochastic Model for Quantitative Security Analyses of Networked Systems

Old #1 New#12, Sona Complex, 2nd Floor, 52nd Street, 7th Avenue, Ashok Nagar, Chennai 600 083. Phone: 044 45022280, E-Mail: notussoft@gmail.com , web: www.notussoft.in

NSJ44 NSJ45 NSJ46 NSJ47 NSJ48 NSJ49 NSJ50 NSJ51 NSJ52 NSJ53 NSJ54 NSJ55

Deadlock-Free Adaptive Routing in Meshes with Fault-Tolerance Ability Based on Channel Overlapping Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Iliac Approach Balancing Revocation and Storage Trade-Offs in Secure Group Communication Nymble: Blocking Misbehaving Users in Anonymizing Networks Detecting Kernel-Level Root kits Using Data Structure Invariants Improving Security and Performance in the Tor Network through Tunable Path Selection Prime: Byzantine Replication under Attack PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance ELMO: Energy Aware Local Monitoring in Sensor Networks Modelling and Detection of Camouflaging Worm Nymble Blocking Misbehaving Users in Anonymizing Networks Sat A Security Architecture Achieving Anonymity And Traceability In Wireless Mesh Networks Firewalls

PARALLEL AND DISTRIBUTED COMPUTING Project Code NSJ56 NSJ57 NSJ58 NSJ59 NSJ60 Project Title Trace back of DDoS Attacks Using Entropy Variations Multi spanning Tree Zone-Ordered Label-Based Routing Algorithms for Irregular Networks Joint Optimization of Complexity and Overhead for the Routing in Hierarchical Networks Passive Network Performance Estimation for Large-Scale, Data-Intensive Computing Supporting Scalable and Adaptive Metadata Management in Ultra large-Scale File Systems

DISTRIBUTED NETWORKING Project Code NSJ61 NSJ62 NSJ63 NSJ64 NSJ65 Project Title A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks Delay-Optimal Opportunistic Scheduling and Approximations: The Log Rule Energy-Efficient Protocol for Cooperative Networks Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration

Old #1 New#12, Sona Complex, 2nd Floor, 52nd Street, 7th Avenue, Ashok Nagar, Chennai 600 083. Phone: 044 45022280, E-Mail: notussoft@gmail.com , web: www.notussoft.in

NSJ66 NSJ67 NSJ68 NSJ69 NSJ70 NSJ71 NSJ72

How Bad Are Selfish Investments in Network Security? Improved Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks Maelstrom: Transparent Error Correction for Communication Between Data Centres Star-Block Design in Two-Level Survivable Optical Networks Towards Systematic Design of Enterprise Networks Buffer Sizing for 802.11 Based Networks Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

SOFTWARE ENGINEERING Project Code NSJ73 NSJ74 NSJ75 NSJ76 NSJ77 Project Title Platforms: A Web Development Platform Comparison by an Exploratory Experiment Searching for Emergent Platform Properties Bristlecone: Language Support for Robust Software Applications An Attack Surface Metric Improving Source Code Lexicon via Traceability and Information Retrieval Which Crashes Should I Fix First?:Predicting Top Crashes at an Early Stage to Prioritize Debugging Efforts

APPLICATION ORIENTED

Project Code NSJ78 NSJ79 NSJ80 NSJ81 NSJ82 NSJ83 NSJ84 NSJ85

Project Title Progressive parametric query optimization A generic local algorithm for mining data streams in large distributed systems A relation-based page rank algorithm for semantic web search engines Glib: a concurrency control protocol for clipping indexing Video event classification and image segmentation based on no causal multidimensional hidden Marko models Security analysis of the sasi protocol Flexible rollback recovery in dynamic heterogeneous grid computing Intrusion detection in network security

Old #1 New#12, Sona Complex, 2nd Floor, 52nd Street, 7th Avenue, Ashok Nagar, Chennai 600 083. Phone: 044 45022280, E-Mail: notussoft@gmail.com , web: www.notussoft.in

NSJ86 NSJ87 NSJ88 NSJ89 NSJ90 NSJ91 NSJ92 NSJ93 NSJ94 NSJ95 NSJ96 NSJ97 NSJ98 NSJ99 NSJ100 NSJ101 NSJ102 NSJ103 NSJ104 NSJ105 NSJ106 NSJ107 NSJ108 NSJ109 NSJ110 NSJ111 NSJ112 NSJ113 NSJ114 NSJ115 NSJ116 NSJ117 NSJ118

Cryptanalysis of a generalized ring signature scheme Pdcs: security and privacy support for data-centric sensor networks No-reference video quality monitoring for h.264/avc coded video Differentiated bandwidth allocation with TCP protection in core routers Node isolation model and age-based neighbour selection in unstructured p2p networks A traffic engineering approach for placement and selection of network services Multiple routing configuration for fast ip network recovery Multipath dissemination in regular mesh topologies Dynamic routing with security considerations Simplistic way to find file sharing and gift giving Resource management using quiver Evaluation of the efficacy of fec coding for combating network packet losses using a modelbased approach Technique for finding shortest path in constrained network Less-structured p2p system designing for expected high churn Improving active packet loss measurement using a geometric approach Multiple conflicting information providers For truth discovery on web Efficient access to high dimensional databases-an index based approach Detection and projecting of multi attribute transactional data Fast access and retrieval of temporal patterns-index based approach Inter-domain packet filter-a approach to migrate ip spoofing Data transfer in network using intermediaries efficient and confidential approach Fault prediction in object-oriented system using conceptual cohesion of classes Image reconstruction-Gaussian approach Cfa (lossless compression scheme for bayer) color filter array images Shape description in multi scale edge field Performance degradation and eliminating them-sensor network Data transfer using sockets- a multi task approach Bug tracing method-a novel approach Lan communication-an efficient approach Lord of Links Collusive piracy prevention in p2p content delivery network Mitigating denial-of-service attacks on the chord overlay network: a location hiding approach Face Regonation

Old #1 New#12, Sona Complex, 2nd Floor, 52nd Street, 7th Avenue, Ashok Nagar, Chennai 600 083. Phone: 044 45022280, E-Mail: notussoft@gmail.com , web: www.notussoft.in

Potrebbero piacerti anche