Iris Solutions
IEEE PRJECT TITLE BOOK 2013-14
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
JAVA
TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON NETWORKING
SNO P.CODE TITLES DESCRIPTION YEAR
1
ISJNW01 An Error Minimizing Framework for Localizing Jammers in Wireless Networks
in this paper, we aim to design a framework that can localize one Or multiple jammers with a high accuracy. Most of existing jammerlocalization schemes utilize indirect measurements (e.g.,hearing ranges) affected by jamming attacks, which makes it difficult to localize jammers accurately
2013
2
ISJNW02 Incentive-Driven and PrivacyPreserving Message Dissemination in Large Scale Mobile Networks
In this paper, we propose a new type 2013 of incentive-driven and privacypreserving systems for large scale message dissemination in mobile networks. To distribute incentives which encourage forwarding behaviors, such as monetary rewards, we want to keep track of the forwarder list. Here, We investigate a fundamental scheduling problem of both theoretical and practical importance, called multi-task schedulability problem, i.e., given multiple data forwarding tasks, to determine the maximum number of tasks that can be scheduled within their deadlines and work out such a schedule. We 2013
3
ISJNW03 Understanding Multi-Task Schedulability in DutyCycling Sensor Networks
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
4 ISJNW04 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks In this paper, we focus on the issue of certificate revocation to isolate attackers from further participating in network activities. For quick and accurate certificate revocation, we propose the Cluster-based Certificate Revocation With Vindication Capability (CCRVC) scheme. In this paper, we introduce Cooperative Content Distribution System for Vehicles (CCDSV) which operates upon a network of infrastructure APs to collaboratively distribute contents to moving vehicles. In This Project, we propose schemes to Balance the trade –offs between data availability and query delay under different system settings and requirements. Mobile nodes in one partition are not able to access data hosted by nodes in other partitions ,and hence significantly degrade the performance of data access. To deal with this problem, we apply data replication techniques. The ability to trace request execution paths is critical for diagnosing performance faults in large-scale distributed systems. Previous blackbox and white-box approaches are either inaccurate or invasive. We present a novel semantics-assisted gray-box tracing approach, called Rake, which can accurately trace individual request by observing network traffic. 2013
5
ISJNW05 Enabling Efficient WiFiBased Vehicular Content Distribution
2013
6
ISJNW06 Balancing the Trade-Offs between query Delay and data availability in MANETs
2013
7
ISJNW07 Rake: Semantics Assisted Network-Based Tracing Framework
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
8 ISJNW08 MeasuRouting:A Framework For Routing Assisted Traffic Monitoring. In this paper we present a theoretical framework for Misrouting. Furthermore, as proofs-of-concept, we present synthetic and pratical monitoring applications to showcase the utility enhancement achieved with MeasuRouting. 2012
TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY
SNO P.CODE TITLES DESCRIPTION YEAR
8
ISJNS01
SORT: A Self-Organizing Trust This paper presents distributed Model for Peer-to-Peer Systems algorithms that enable a peer to reason about trustworthiness of Other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local Information available and do not try to learn global trust information. Unprivileged Black-Box Detection of User-Space Keyloggers We propose a new detection technique that simulates carefully crafted keystroke sequences in input and observes the behavior of the keylogger in output to unambiguously identify it among all the running processes. We have prototyped our technique as an unprivileged application, hence matching the same ease of deployment of a keylogger executing in unprivileged mode
2013
9
ISJNS02
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
10 ISJNS03 Automatic Reconfiguration for Large-Scale Reliable Storage Systems In this paper, we present a complete solution for dynamically changing system membership in a large-scale Byzantine-fault-tolerant system. We present a service that tracks system membership and periodically notifies other system nodes of changes Content distribution via network coding has received a lot of attention lately. However, direct application of network coding may be insecure. In particular, attackers can inject "bogus” data to corrupt the content distribution process so as to hinder the information dispersal or even deplete the network resource. Therefore, content verification is an important and practical issue when network coding is employed. In this paper, we present a novel probabilistic protocol (COKE) to allow two wireless communicating parties to commit over-the-air (OTA) on a shared secret, even in the presence of a globally eavesdropping adversary. The proposed solution leverages no crypto but just plaintext messages exchange. 2013
11
ISJNS04
On the Security and Efficiency of Content Distribution via Network Coding
2013
ISJNS05
COKE Crypto-Less Over-theAir Key Establishment
2013
ISJNS06
Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis
The use of virtual machines (VMs) to provide computational infrastructure and services to organizations is increasingly prevalent in the modern IT industry. The growing use of this technology has been driven by a desire to increase utilization of resources through server consolidation. Virtualization has also made the dream of such utility computing platforms as cloud computing a reality.
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
12 ISJNS07 Packet-Hiding Methods for Preventing Selective Jamming Attacks. In this paper, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. As real-time traffic such as video or voice increases on the Internet, ISPs are required to provide stable quality as well as connectivity at failures. For ISPs, how to effectively improve the stability of these qualities at failures with the minimum investment cost is an important issue, and they need to effectively select a limited number of locations to add link facilities 2012
13
ISJNS08
Efficient Network Modification to Improve QoS Stability at Failures
2011
TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON DATA MINING
SNO P.CODE TITLES DESCRIPTION YEAR
14
ISJDM01 Tweet Analysis for Real-Time Twitter has received much attention Event Detection and Earthquake recently. An important characteristic of Reporting System Development Twitter is its real-time nature. We investigate the real-time interaction of events such as earthquakes in Twitter and propose an algorithm to monitor tweets and to detect a target event. To detect a target event, we devise a classifier of tweets based on features such as the keywords in a tweet, the number of Words and their context. ISJDM02 A Fast Clustering-Based Feature Subset Selection Feature selection involves identifying a subset of the most useful features that
2013
15
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
Algorithm for HighDimensional Data produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a subset of features, the effectiveness is related to the quality of the subset of features. Based on these criteria, a fast clustering-based feature selection algorithm (FAST) is proposed and experimentally evaluated in this paper. In this paper, we propose a genetic programming approach to record deduplication that combines several different pieces of evidence extracted from the data content to find a deduplication function that is able to identify whether two entries in a repository are replicas or not. 2013
16
ISJDM03 A Genetic Programming Approach to Record Deduplication
17
ISJDM04 Clustering Sentence-Level Text This paper presents a novel fuzzy Using a Novel Fuzzy Relational clustering algorithm that operates on Clustering Algorithm relational input data; i.e., data in the form of a square matrix of pairwise similarities between data Objects. The algorithm uses a graph representation of the data, and operates in an Expectation-Maximization framework in which the graph centrality of an object in the graph is interpreted as a likelihood. ISJDM05 Dynamic Personalized Recommendation on Sparse Data In this paper, a novel dynamic personalized recommendation algorithm is proposed, in which information contained in both ratings and profile contents are utilized by exploring latent relations between ratings, a set of dynamic features are designed to
2013
18
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
describe user preferences in multiple phases, and finally a recommendation is made by adaptively weighting the features. 19 ISJDM06 Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework We consider the problem of parameter estimation in statistical models in the case where data are uncertain and Represented as belief functions. The proposed method is based on the maximization of a generalized likelihood criterion, which can be Interpreted as a degree of agreement between the statistical model and the uncertain observations. 2013
20
ISJDM07 Ranking on Data Manifold with In this paper, we introduce a novel Sink Points Approach, Manifold Ranking with Sink Points (MRSPs), to address diversity as well as relevance and importance in ranking. Specifically, our approach uses a manifold ranking process over the data manifold, which can naturally find the most relevant and Important data objects.
2013
TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
21
ISJMC01 Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding
Compared to single-hop networks such as Wi-Fi, multihop infrastructure wireless mesh networks (WMNs) can potentially embrace the broadcast benefits of a wireless medium in a more flexible manner. Rather than being point-to-point, links in the WMNs may originate from a single node and reach more than one other node
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
22 ISJMC02 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
In
this paper, we address the issues by proposing a fully distributed cooperative solution that is robust against independent and colluding adversaries, and can be impaired only by an overwhelming presence of adversaries. Results show that our protocol can thwart more than 99 percent of the attacks under the best possible conditions for the adversaries, with minimal false positive rates. This paper introduces cooperative caching policies for minimizing electronic content provisioning cost in Social Wireless Networks (SWNET). SWNETs are formed by mobile devices, such as data enabled phones, electronic book readers etc., sharing common interests in electronic content, and physically gathering together in public places
2013
23
ISJMC03 Distributed Cooperative Caching in Social Wireless Networks
2013
24
ISJMC04 EAACK—A Secure Intrusion- In this paper, we propose and Detection System for MANETs implement a new intrusion-detection system named Enhanced Adaptive acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher maliciousBehavior-detection rates in certain circumstances while does not greatly affect the network performances. ISJMC05 EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks In this paper, we propose an Expedite Message Authentication Protocol (EMAP) for VANETs, which replaces the time-consuming CRL checking process by an efficient revocation checking process. The revocation check process in EMAP uses
2013
25
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
a keyed Hash Message Authentication Code HMAC, where the key used in calculating the HMAC is shared only between non revoked On-Board Units 26 ISJMC06 Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications In this paper, we look at early trends, and opportunities and benefits for new CMM applications and services. We analyze the challenges imposed by mob ile cloud computing that need to be addressed to make CMM applications viable, including response time, user experience, cloud computing cost, mobile network bandwidth, and scalabi lity to large number of CMMusers, besides other important cloud computing issues like energy consumption, privacy, and security. This paper presents a novel pulse switching protocol framework for ultra light-weight wireless network applications. The key Idea is to abstract a single Ultra Wide Band (UWB) pulse as the information switching granularity. Pulse switching is shown to be sufficient for on-off style event monitoring applications for which a monitored parameter can be modeled using a binary variable. This paper exploits the Clear Channel Assessment (CCA) mechanism in WiFi devices and proposes novel policing framework, WiCop, that can effectively control the temporal white-spaces between WiFi transmissions. Such temporal white-spaces can be utilized for delivering low duty cycle WPAN traffic. We have implemented and validated WiCop on SORA, a software defined radio platform. 2013
27
ISJMC07 Pulse Switching: Toward a Packet-Less Protocol Paradigm for Event Sensing
2013
WiCop: Engineering WiFi Temporal White-Spaces for Safe Operations of Wireless Personal Area Networks in Medical Applications
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
28 ISJMC08 Quality-Differentiated Video Multicast in Multirate Wireless Networks In this work, we investigate a rateadaptive video multicast scheme that can provide heterogeneous clients differentiated visual qualities matching their channel conditions. We first propose a rate scheduling model that selects the optimal transmission bit rate for each video frame to maximize the total visual quality for a multicast group subject to the minimum-visual-qualityguaranteed constraint. we propose A Privacy-Preserving location proof Updating System (APPLAUS) in which colocated Bluetooth enabled mobile devices mutually generate location proofs and send updates to a location proof server. Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server. 2013
29
ISJMC09 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
2013
30
ISJMC10 Vampire Attacks: Draining Life This paper explores resource depletion from Wireless Ad Hoc Sensor attacks at the routing protocol layer, Networks which permanently disable networks by quickly draining nodes’ battery power. These “Vampire” attacks are not specific to any specific protocol, but rather rely on the properties of many popular classes of routing Protocols.
2013
TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
SNO P.CODE TITLES DESCRIPTION YEAR
61
ISJSE01
Ant Colony Optimization for
this paper develops a novel approach
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
Software Project Scheduling and Staffing with an EventBased Scheduler with an event-based Scheduler (EBS) and an ant colony optimization (ACO) algorithm. The proposed approach represents a plan by a task list and a Planned employee allocation matrix. this paper proposes a rule-based program differencing approach that automatically discovers and Represents systematic changes as logic rules. To demonstrate the viability of this approach, we instantiated this approach at two Different abstraction levels in Java: first at the level of application programming interface (API) names and signatures, and second at the level of code elements and structural dependences. 2013
62
ISJSE02
Identifying and Summarizing Systematic Code Changes via Rule Inference
TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
31
ISJCC01
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
In this paper, we present a system that uses virtualization technology to allocate data center resources dynamically based on application demands and support green computing by optimizing the number of servers in use we propose a novel patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve finegrained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file.
2013
32
ISJCC02
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
33 ISJCC03 PACK: Prediction-Based Cloud In this paper, we present PACK, a novel Bandwidth and Cost Reduction end-to-end traffic redundancy System elimination (TRE) system, designed for cloud computing customers. Cloudbased TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation And storage would be optimized. ANTELOPE: A Semanticaware Data Cube Scheme for Cloud Data Center Networks we present ANTELOPE, a scalable distributed data-centric scheme in cloud data centers, in which we systematically take into account both the property of network architecture and the optimization of data placement. This paper presents a novel Multimessage Ciphertext Policy AttributeBased Encryption (MCP-ABE) technique, and employs the MCP-ABE to design an access control scheme for sharing scalable media based on data consumers’ attributes (e.g., age, nationality, or gender) rather than an explicit list of the consumers’ names. In this paper, we consider a wireless cloud computing system in which the wireless service provider operates a data center and provides cloud services to its subscribers at dynamic prices. We propose a joint optimization of scheduling and pricing decisions for delay-tolerant batch services to maximize the service provider’s longterm profit. In this paper we present pCloud, a distributed system that constitutes the first attempt towards practical cPIR. Our approach assumes a disk-based 2013
34
ISJCC04
2013
35
ISJCC05
Attribute-Based Access to Scalable Media in CloudAssisted Content Sharing Networks
2013
36
ISJCC06
Dynamic Scheduling and Pricing in Wireless Cloud Computing
2013
37
ISJCC07
pCloud: A Distributed System for Practical PIR
2012
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
architecture that retrieves one page with a single query. Using a striping technique, we distribute the database to a number of cooperative peers, and leverage their computational resources to process cPIR queries in parallel. We implemented pCloud on the PlanetLab network, and experimented extensively with several system parameters results. TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING
SNO P.CODE TITLES DESCRIPTION YEAR
61
ISJIM01
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
In this paper, we propose a novel joint data-hiding and compression scheme for digital images using side match vector quantization (SMVQ) and image inpainting. The two functions of data hiding and image compression can be integrated into one single module seamlessly. Conventional visual cryptography (VC) suffers from a pixel-expansion problem, or an uncontrollable display quality problem for recovered images, and lacks a general approach to construct visual secret sharing schemes (VSSs) for general access structures (GASs). The rapid development of computer hardware and Internet technology makes large scale data dependent models computationally tractable, and opens a bright avenue for annotating images through innovative machine learning algorithms. This paper proposes a new approach to
2013
62
ISJIM02
Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints
2013
ISJIM03
Multiview Hessian Regularization for Image Annotation
2013
ISJIM04
Optimized 3D Watermarking
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
for Minimal Surface Distortion 3D watermarking by ensuring the optimal preservation of mesh surfaces. A new 3D surface preservation function metric is defined consisting of the distance of a vertex displaced by watermarking to the original surface, to the watermarked object surface as well as the actual vertex displacement.
TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
61
ISJGC01
On the Design of Mutually Aware Optimal Pricing and Load Balancing Strategies for Grid Computing Systems
Managing resources and cleverly pricing them on computing systems is a challenging task. Resource sharing demands careful load balancing and often strives to achieve a win-win situation between resource providers and users. Toward this goal, we consider a joint treatment of load balancing and pricing. This paper aims at providing a key agreement protocol for smart grid to cope with access control of appliances/devices located inside a Home Area Network (HAN) by a set of controllers outside the HAN. The commands/packets initiated by the controllers in crisis cases should be delivered fast and immune from any interruption. Executing large scale application programs in grids requires resources from several Grid Service Providers (GSPs). These providers form Virtual
2013
62
ISJGC02
Multilayer Consensus ECCBased Password Authenticated Key-Exchange (MCEPAK) Protocol for Smart Grid System
2013
ISJGC03
A Merge-and-Split Mechanism for Dynamic Virtual Organization Formation in Grids
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
Organizations (VOs) by pooling their resources together to provide the required capabilities to execute the application.
JAVA APPLICATION PROJECTS
TECHNOLOGY : JAVA DOMAIN : NON IEEE BASED PROJECTS
SNO P.CODE PROJECT TITLE
1 2 3 4 5 6 7 8 9 10 11 12 13
ISNIJ01 ISNIJ02 ISNIJ03 ISNIJ04 ISNIJ05 ISNIJ06 ISNIJ07 ISNIJ08 ISNIJ09 ISNIJ10 ISNIJ11 ISNIJ12 ISNIJ13
Inventory Management System Human Capital Management System CMS Measures Management System MIS For Alumni Students A Conceptual View Of Web Based E-Learning System Marking large scale deliberation online management system Printed Work To Spoken Vibration Converter Quiver: Consistent And Scalable Sharing For Edge Services Design And Implementation Of Scalable Edge Based Admission Strong Barrier Coverage For Intrusion Detection In Wireless Sensor Network A Dynamic Path Identification Mechanism To Defend Against Ddos Mittigating Performance Degradation In Congested Sensor Networks Efficient Dynamic Probabilistic Packet Marking Scheme
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
14 15 16 17 18 19 20 ISNIJ14 ISNIJ15 ISNIJ16 ISNIJ17 ISNIJ18 ISNIJ19 ISNIJ20
Dynamic Adaptation Of Checkpoints And Rescheduling In Grid Fully Predictable HPC Infrastructure Using Admission Control With Virtualization E Compiler For Java With Security Editor Change Point Monitoring For Detection Of Dos Attacks Bi-Criteria Scheduling With Dynamic Instantiation For Workflow Execution On Grids Eight Times Acceleration Of Geospatial Data Archiving Automatic Reconfiguration In Wireless Mesh Networks
ANDROID
TECHNOLOGY: ANDROID DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
1
ISACC01 A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing
It proposes thematic taxonomy of current DAPFs, reviews current offloading frameworks by using thematic taxonomy and analyzes the implications and critical aspects of current offloading frameworks. Further, it investigates commonalities and deviations in such frameworks on the basis significant parameters such as offloading scope, migration granularity, partitioning approach, and migration pattern. Finally, we put forward open research issues in distributed
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
application processing for MCC that remain to be addressed. 2 ISACC02 A Network and Device Aware , this study presented a network and QoS Approach for Cloud-Based device-aware Quality of Service (QoS) Mobile Streaming. approach that provides multimedia data suitable for a terminal unit environment via interactive mobile streaming services, further considering the overall network environment and adjusting the interactive transmission frequency and the dynamic multimedia transcoding, to avoid the waste of bandwidth and terminal power. 2013
TECHNOLOGY: ANDROID DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
3
ISAMC01 Wireless Machine-to-Machine Healthcare Solution Using Android Mobile Devices in Global Networks
This paper presents a prototype machine-to machine (M2M) healthcare solution that combines mobile and IPv6 techniques in a wireless sensor network to monitor the health condition of patients and provide a wide range of effective, comprehensive, and convenient healthcare services. In this paper, We describe a prototype non-cryptographic location authentication system we constructed, and explain how to design both voice and data transmissions with distinct, discernible traffic signatures. Using both analytical modeling and empirical results from our implementation, we demonstrate that these signatures can be reliably detected even in the presence of heavy cross-traffic
2013
4
ISAMC02 Traffic Signature-based Mobile Device Location Authentication
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
introduced by other femtocell users TECHNOLOGY: ANDROID DOMAIN : IEEE TRANSACTIONS ON DATA ENGINEERING
SNO P.CODE TITLES DESCRIPTION YEAR
5
ISADE01 PMSE: A Personalized Mobile Search Engine
In this paper, We propose a personalized mobile search engine (PMSE) that captures the users’ preferences in the form of concepts by mining their click through data. Due to the importance of location information in mobile search, PMSE classifies these concepts into content concepts and location concepts. In addition, users’ locations (positioned by GPS) are used to supplement the location concepts in PMSE. In this paper, smart phones and multimedia technologies are proposed as an innovative way to tackle the formation of students, at different levels, in the Industrial Informatics (II) subject of the Industrial Electronics Engineering (IEE) degree. II instructs future Engineers in the design of IT systems to control industrial processes. An application of the Smartphone multimedia tool is presented to show how students interact with the developed system
2013
6
ISADE02 Smartphone-Based Industrial Informatics Projects and Laboratories
2013
TECHNOLOGY: ANDROID DOMAIN : IEEE TRANSACTIONS ON CONTEXT AWARE SERVICES
SNO P.CODE TITLES DESCRIPTION YEAR
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
7 ISACS01 A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments’ Integration In this survey paper, we aim to assemble all the ”puzzle-pieces” of the emerging research area of Context Aware Mobile and Wireless Networking (CAMoWiN) in order to provide the reader aholistic representation of the work having been done in the past emphasizing in recent research effort. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based. 2013
8
ISACS02 Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
2013
TECHNOLOGY: MULTIMEDIA DOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA
SNO P.CODE TITLES DESCRIPTION YEAR
3
ISJMM01 Learning to Photograph: A Compositional Perspective
In this paper, we present an intelligent 2013 photography system which can recommend the most user-favored view rectangle for arbitrary camera input, from a photographic compositional perspective. Automating this process is difficult, due to the subjectivity of human’s aesthetics judgment and large variations of image contents, where heuristic compositional rules lack generality.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
4 ISJMM02 Affective Labeling in a Content- Affective labeling of multimedia content 2013 Based Recommender System for has proved to be useful in recommender Images systems. In this paper we present a methodology for the implicit acquisition of affective labels for images. It is based on an emotion detection technique that takes as input the video sequences of the users’ facial expressions. ISJMM03 Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information In this paper, we propose a scheme that 2013 is able to enrich textual answers in cQA with appropriate media data. Our scheme consists of three components: answer medium selection, query generation for multimedia sea rch, and multimedia data selection and presentation.
5
DOTNET
TECHNOLOGY : DOTNET DOMAIN : IEEE TRANSACTIONS ON NETWORKING
SNO P.CODE TITLES DESCRIPTION YEAR
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
1 ISDNW01 Dynamic Service Contract In this paper, we propose and validate Enforcement in Service-Oriented DoWSS, a doubly weighted algorithm Networks for service traffic shaping. We show via simulation that Do WSS possesses several advantages: It eliminates the approximation issues, prevents starvation, and contains the rapid credit consumption issue in existing creditbased approaches. 2013
2
ISDNW02 Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
Our approach is based on proposing a 2013 metric that evaluates the vulnerability of a system. We then useour vulnerability metric to evaluate a data structure which is commonly used in network mechanisms-the Hash table data structure.
Design and Performance In this paper, we propose an efficient 2013 Evaluation of Overhearing-Aided data caching algorithm which makes use Data Caching of the overhearing property of wireless in Wireless Ad Hoc Networks communication to improve caching performance.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
IP-Geolocation Mapping for Moderately Connected Internet Regions In this paper, however, we investigate a large region of moderately connected Internet and find the delay-distance correlation is weak. But we discover a more probable rule—with high probability the shortest delay comes from the closest distance. 2013
3
ISDNW03 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
In this paper, we propose to use spatial 2013 information, a physical property associated with each node, hard to falsify,and not reliant on cryptography, as the basis for 1) detecting spoofing attacks; 2) determining the no of attackers when multiple adversaries masquerading as the same node identity; and 3)localizing multiple adv ersaries.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
4 ISDNW04 Robust Tracking of Small-Scale In this paper, we propose a new 2013 Mobile Primary User in framework, called Sequential Monte Cognitive Radio Networks Carlo combined with shadow-fading estimation (SOLID), for accurate, attack/fault-tolerant tracking of smallscale mobile primary users. The key idea underlying SOLID is to exploit the temporal shadow fading correlation in sensing results induced by the primary user's mobility. Specifically, SOLID augments conventional Sequential Monte Carlo (SMC)-based target tracking with shadow-fading estimation.
5
ISDNW05 Attacks and Defenses in the Data We demonstrate-to our 2013 Plane of Networks knowledge the firstpractical attack that exploits a vulnerability in packet processing software to launch a devastating denial-of-service attack from within the network infrastructure. This attack uses only a single attack packet to consume the full link bandwidth of the router's outgoing link.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
6. IDSNW06 A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model In this paper,We 2013 present a privacy preservingreputation pr otocol for the malicious adversarial mod el. The malicious users in this model actively attempt to learn the private feedback values of honest users as well as to disrupt the protocol. Our protocol does not require centralized entities, trusted third parties, or specialized platforms, such as anonymous networks and trusted hardware.
In this paper, we investigate how an IDSNW07 Privacy Vulnerability of Published Anonymous Mobility adversary ,when equipped with a small Traces amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes’ privacy as a function of the nodal mobility, the inference strategies of adversaries, and any noise that may appear in the trace or the side information.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
Security Analysis of a Single In this paper, however, we demonstrative Sign-On Mechanism for that their scheme is actually insecure as Distributed Computer Networks it fail s to meet credential privacy and soundness of authentication. Specifically,we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user’s credential and then to impersonate the user to access resources and services offered by other service providers.
Identity-Based Secure Distributed Data Storage Schemes
In this paper, we propose two identity- 2013 based secure distributed data storage (IBSDDS) schemes. Our schemes can capture the following properties: (1) The file owner can decide the access permission independently without the help of the private key generator (PKG); (2) For one query, a receiver can only access one file, instead of all files of the owner; (3) Our schemes are secure against the collusion attacks, namely even if the receiver can compromise the proxy servers, he cannot obtain the owner’s secret key.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
Detecting Influential Spreaders in A hybrid of node degree and k-shell 2013 Complex, Dynamic Networks index is more effective at identifying influential spreaders and has less computational overhead than either of these traditional measures
Dynamic Authentication with Sensory Information for the Access Control Systems.
In this work, we introduce a dynamic authentication with sensory information for the access control systems. By combining sensory information obtained from onboard sensors on the access cards as well as the original encoded identification information, we are able to effectively tackle the problems such as access card loss, stolen and duplication. Our solution is backward-compatible with existing access
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
TECHNOLOGY : DOTNET DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY
SNO P.CODE TITLES DESCRIPTION YEAR
7
ISDNS01 EAACK—A Secure Intrusion- In this paper, 2013 Detection System for MANETs Access card authentication is critical and essential for many modern access control systems, which have been widely deployed in various governments, commercial and residential environments. Although advanced biometric authentication methods such as fingerprint and iris identification can further identify the user who is requesting authorization, they incur high system costs and access privileges cannot be transferred among trusted users. ISDNS02 Cooperative Message Authentication in Vehicular Cyber-Physical Systems In this paper, we address the issue of large computation overhead caused by the safety message authentication. Specially, a cooperative message authentication protocol (CMAP) is developed to alleviate vehicles’ computation burden. With CMAP, all the vehicles share their verification results with each other in a cooperative way, so that the number of safety messages that each vehicle needs to verify reduces significantly 2013
8
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
ISDNS03 SORT: A Self-ORganizing Trust This paper presents distributed Model for Peer-to-Peer Systems algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations. Peers create their own trust network in their proximity by using local information available and do not try to learn global trust information. ISDNS04 Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing ISDNS05 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems This paper proposes a scalable two-level predictive mechanism capable of predicting a program’s AVF on a SMT/CMP architecture from easily measured metrics. Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denialof-Service (DDoS). 2013
9
ISDNS06 Modeling Propagation Dynamics Social network worms, such as email 2013 of Social Network Worms worms and facebook worms, pose a critical security threat to the Internet. Modeling their propagation dynamics is essential to predict their potential damages and develop countermeasures. Although several analytical models have been proposed for modeling propagation dynamics of social network worms, there are two critical problems unsolved: temporal dynamics and spatial dependence.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
10 ISDNS07 On the Security of End-to-End In this paper, we explore the security of 2013 Measurements Based on Packet- measurements based on the packet-pair Pair Dispersions technique. We propose lightweight countermeasures to detect attacks on bandwidth measurements; our technique can detect whether delays were inserted within t he transmission of a packet-pair (e.g., by bandwidth shapers). We further propose a novel scheme for remote path identification using the distribution of packet-pair dispersions and we evaluate its accuracy, robustness, and potential use. In this paper, we design an authorization 2013 ISDNS08 Authorization Control for a Semantic Data Repository security model enforced on a semantic through an Inference Policy model’s entities (concepts) and also Engine propagate on their individuals in the OWL database through an inference policy engine. We provide TBox access control for the construction of a TBox family and propagate this based on the construction of concept taxonomies. ISDNS09 A large-scale study of the time required to compromise a computer system The paper also analyzes whether time to 2013 compromise increase for each successful intrusion of a computer system. The results regarding this property suggest that time to compromise decrease along the number of intrusions of a system.
11
12
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
13 ISDNS10 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounterbased social networks. To highlight these challenges we examine one recently proposed encounter-based social network design and compare it to a set of idealized security and functionality requirements. 2013
14
15
ISDNS11 Secrecy Capacity Enhancement In this paper, where an eavesdropper is With Distributed Precoding in present. Distributed pre coding through Multirelay Wiretap Systems multiple relay nodes can be used to enhance the received signal power a t the destination node and to mitigate the signal leakage to the eavesdropper, simultaneously. ISDNS12 Strong Secrecy in Bidirectional To increase the spectral efficiency of Broadcast Channels With future wireless networks, it is important Confidential Messages to wisely integrate multiple services at the physical layer. Here the efficient integration of confidential services inthe three-node bidirectional relay channel is studied. A relay node establishes a bidirectionalcommunication between two other nodes using a decode-andforward protocol, which is also known as two-way relaying
2013
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
16 ISDNS13 Entrusting Private Computation This paper focuses specifically on and Data to Untrusted Networks NP-complete problems and demonstrates how sTile-based systems can solve important realworld problems, such as protein folding, image recognition, and resource allocation. We present the algorithms involved in sTile and formally prove that sTile-based systems preserve privacy. Discovery and Resolution of Anomalies in Web Access Control Policies In this paper, we represent an innovative policy anomaly analysis approach for Web access control policies, focusing on XACML policy.We introduce a policybased segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions, along with an intuitive visualization representation of analysis results. 2013
17
ISDNS14
2013
18
ISDNS15
Extending Attack Graph-Based The attack graph is an abstraction that Security Metrics and reveals the ways an attacker can Aggregating Their Application leverage vulnerabilities in a network to violate a security policy. When used with attack graph-based security metrics, the attack graph may be used to quantitatively assess security relevant aspects of a network. Dynamic Authentication with Sensory Information for the Access Control Systems
2012
19
ISDNS16
Access card authentication is critical and 2013 essential for many modern access control systems, which have been widely deployed in various government, commercial and residential environments.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
20 ISDNW17 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies In this article, we introduce AMPLE an efficient traffic engineering and management system that performs adaptive traffic control by using multiple virtualized routing topologies In this paper we present a theoretical framework for MeasuRouting. Furthermore, as proofs-of-concept, we present synthetic and practical monitoring applications to showcase the utility enhancement achieved with MeasuRouting. 2012
21
ISDNW18 MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
2012
TECHNOLOGY : DOTNET DOMAIN : IEEE TRANSACTIONS ON DATAMINING
SNO P. CODE PROJECT TITLES DESCRIPTION YEAR
22
ISDDM01 Transductive Multilabel Learning via Label Set Propagation
In this paper, we study the problem of transductive multilabel learningand propose a novel solution, called Trasductive Multilabel Classification (TraM), to effectively assign a set of multiple labels to each instance. Different from supervised multilabel learningmethods, we estimate the label sets of the unlabeled instances effectively by utilizing the information from both labeled and unlabeled data.
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Page
27
Iris Solutions
23 The proposed method is based on the ISDDM02 Maximum Likelihood Estimation from Uncertain Data maximization of a in the Belief Function generalized likelihood criterion, which Framework can be interpreted as a degree of agreement between the statistical model and the uncertain observations. ISDDM03 Mining User Queries with Markov Chains: Application to Online Image Retrieval We propose a novel method for automatic annotation, indexing and annotation-based retrievalof images. The new method, that we call Markovian Semantic Indexing (MSI), is presented in the context of an online image retrieval system. Geometric interpretations of the proposed distance are provided and its relation to a clustering in the keyword space is investigated. 2013
24
2013
25
26
ISDDM04 A Rough-Set-Based Incremental This paper focuses on a new Approach for Updating incremental method for updating Approximations under Dynamic approximations of VPRS while objects Maintenance Environments in the information system dynamically alter. It discusses properties of information granulation and approximations under the dynamic environment while objects in the universe evolve over time. ISDDM05 Radio Database Compression The aim of the proposed technique is to for Accurate Energy-Efficient reduce the computation cost and Localization transmission load in the mobile-based in Fingerprinting Systems implementations. The presented method may be called Block-based Weighted Clustering (BWC) technique, which is applied in a concatenated locationradio signal space, and attributes different weight factors to the location and radio components.
2013
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
27 ISDDM06 Fuzzy Web Data Tables Integration Guided by an Ontological and Terminological Resource In this paper, we present the design of ONDINE system which allows the loading and the querying of a data warehouse opened on the Web, guided by an Ontological and Terminological Resource (OTR). The data warehouse, composed of data tables extracted from Web documents, has been built to supplement existing local data sources 2013
28
ISDDM07 A New Algorithm for Inferring User Search Goals with Feedback Sessions
we propose a framework to discover 2013 different user search goals for a query by clustering the proposed feedback sessions. Feedback s essions are constructed from user clickthrough logs and can efficiently reflect the information needs of users.
29
ISDDM08 Information-Theoretic Outlier In this paper, we propose a formal 2013 Detection for Large-Scale definition of outliers and an optimization Categorical Data model of outlier detection, via a new concept of holoentropy that takes both entropy and total correlation into consideration. We propose two practical 1-parameter outlier detection methods, named ITB-SS and ITB-SP, which require no user-defined parameters for deciding whether an object is an outlier. Service Skyline Service composition is emerging as an ISDDM09 Efficient Computation for Composite effective vehicle for integrating existing Service Selection web services to create value-added and personalized composite services. We propose to exploit the dominance relationship among service providers to find a set of “best” possible composite services, referred to as a composite service skyline. 2013
30
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
31 ISDDM10 Secure Transmission Data Provenance In this paper, we propose a novel 2013 for Streaming approach to securely transmit provenance for streaming data by embedding provenance into the interpacket timing domain while addressing the above mentioned issues. As provenance is hidden in another hostmedium, our solution can be conceptualized as watermarking technique. ISDDM11 Generative Models for Item We propose a social correlation 2013 Adoptions Using Social framework that considers a social Correlation correlation matrix representing the degrees of correlation from every user to the users friends, in addition to a set of latent factors representing topics of interests of individual users. Based on the framework, we develop two generative models, namely sequential and unified, and the corresponding parameter estimation approaches. Evaluation ISDDM12 Scalable Trajectory Queries Imprecise Location Data 33 34 of In this paper, we study how to efficiently 2013 over evaluate trajectory queries over imprecise objects, by proposing a novel concept, u-bisector, which is an extension of bisector specified for imprecise data.. In this paper, we address the problem of optimizing the settings of a Bloom Filter (BF). We show that the optimal setting of BF in terms of traffic cost is determined by the statistical information of the involved inverted lists. 2012
32
45
ISDDM13 Optimizing Bloom Filter Settings in Peer-to-Peer Multi keyword Searching
TECHNOLOGY : DOTNET DOMAIN : IEEE TRANSACTIONS ON CLOUD COMPUTING
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
SNO P. CODE PROJECT TITLES DESCRIPTION YEAR
35
ISDCC01
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
In this paper, we propose a novel 2013 patient-centric framework and a suite of mechanisms for data access control to PHRs stored in semitrusted servers. To achieve fine-grained and scalable data access control for PHRs, we leverage attribute-based encryption (ABE) techniques to encrypt each patient’s PHR file.
36
ISDCC02
37
ISDCC03
A Hierarchical Approach for the The goal of this paper is to devise 2013 Resource Management of Very resource allocation policies for Large Cloud Platforms virtualized cloud environments that satisfy performance and availability guarantees and minimize energy costs in very large cloud service centers. We present a scalable distributed hierarchical framework based on a mixed-integer non-linear optimization of resource management acting at multiple time-scales. Toward Secure Multikeyword In this paper, we focus on addressing 2013 Top-kk Retrieval over data privacy issues using SSE. For the Encrypted Cloud Data first time, we formulate the privacy issue from the aspect of similarity relevance and scheme robustness. We observe that server-side ranking based on orderpreserving encryption (OPE) inevitably leaks data privacy.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
38 ISDCC04 On the Performance of Byzantine Fault-Tolerant MapReduce MapReduce is often used for critical data processing, e.g., in the context of scientific or financial simulation. However, there is evidence in the literature that there are arbitrary (or Byzantine) faults that may corrupt the results of MapReduce withou t being detected.
39
ISDCC05
BtrPlace: A Flexible The massive amount of resources found 2013 Consolidation Manager for in datacenters makes it possible to Highly Available Applications provide high availability to multi-tier applications. Virtualizing these applications makes it possible to consolidate them on servers, reducing runtime costs. We present BtrPlace, a flexible consolidation manager that is customized through configuration scripts written by the application and datacenter administrators. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing In this paper, we study the problem of 2013 optimal multiserver configuration for profit maximization in a cloud computing environment. To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multiserver system
ISDCC06
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
40 ISDCC07 Performance Analysis of Cloud In this paper, we requests, we describe a 2012 novel approximate analytical model for Computing Centers performance evaluation of cloud server Using M/G/m/m+r Queuing farms and solve it to obtain accurate Systems estimation of the complete probability distribution of the request response time and other important performance indicators.
TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING
SNO P.CODE TITLES DESCRIPTION YEAR
61
ISDIM01 Colorization-Based Compression Using Optimization
In this paper, we formulate the colorization-based coding problem into an optimization problem, i.e., an L minimization problem. In colorizationbased coding, the encoder chooses a few representative pixels (RP) for which the chrominance values and the positions are sent to the decoder, whereas in the decoder, the chrominance values for all the pixels are reconstructed by colorization methods. Dominant sets are a new graph partition method for pairwise data clustering proposed by Pavan and Pelillo. We address the problem of dominant sets with a coalitional game model, in which each data point is treated as a player and similar data points are encouraged to group together for cooperation. This paper introduces a novel framework for examplar-based inpainting. It consists in performing first
2013
62
ISDIM02 Image Denoising With Dominant Sets by a Coalitional Game Approach
2013
ISDIM03 Hierarchical super-resolutionbased inpainting
2013
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
the inpainting on a coarse version of the input image. A hierarchical superresolution algorithm is then used to recover details on the missing areas. ISDIM04 Personal Photo Enhancement In this paper, we propose a framework using Internet Photo Collections to overcome the imperfections of personal photos of tourist sites using the rich information provided by large scale Internet photo collections. Our method deploys state-of-the-art techniques for constructing initial 3D models from photo collections. The same techniques are then used to register personal photos to these models, allowing us to augment personal 2D images with 3D information. 2013
TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON GRID COMPUTING
SNO P.CODE TITLES DESCRIPTION YEAR
61
ISDGC01 Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective
2013 In this paper, we study an optimization problem of leveraging the cloud domain to reduce the cost of information management in the SG. We propose a cloud-based SG information management model and present a cloud and network resource optimization framework to solve the cost reduction problem in cloud-based SG information storage and computation. This work proposes the use of bioinspired knowledge acquisition for Fuzzy Systems founded on Swarm 2013
62
ISDGC02 Swarm Fuzzy Systems: Knowledge Acquisition in Fuzzy Systems and its
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
Applications in Grid Computing Intelligence Particle Swarm Optimization (SI-PSO). Swarm-based models consider knowledge entities as particles that move in the space to reach the higher quality. .
TECHNOLOGY : DOTNET DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
SNO P.CODE PROJECT TITLES DESCRIPTION YEAR
78
ISDSE01 Self-Organizing Roles on Agile Software Development Teams
79
ISDSE02 The Human Element in Social Networking
80
ISDSE03 Generating Test Cases for Real-Time Systems Based on Symbolic Models
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
81 ISDSE04 Beyond Data Mining
82
ISDSE05 A Theoretical and Empirical Analysis of the Role of Test Sequence Length in Software Testing for Structural Coverage In this paper, we analyze the role that the length plays in software testing, in particular branch coverage. We show that, on “difficult” software testing Bench marks, longer test sequences make their testing trivial. Hence, we argue that the choice of the length of the test sequences is very important in software testing. In this paper, we present the first automated technique to detect vulnerable and unsafe dynamic component loadings. Our analysis has two phases: 1) apply dynamic binary instrumentation to collect runtime information on component loading and 2) analyze the collected information to detect vulnerable component loadings 2012
83
ISDSE06 Automatic Detection of Unsafe Dynamic Component Loadings
2012
TECHNOLOGY : DOTNET DOMAIN : IEEE TRANSACTIONS ON MULTIMEDIA
SNO P.CODE PROJECT TITLES DESCRIPTION YEAR
78
ISDMM0 Group Delay based Methods for Speaker Segregation and its 1 Application in Multi-medi Information Retrieval
A novel method of single channel speaker segregation using the group delay cross correlation function is proposed in this paper. The group delay function, which is the negative derivative of the phase spectrum yields robust spectral estimates.
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
79 ISDMM0 Query-Adaptive Image Search With Hash Codes 2 This paper introduces an approach that enables query-adaptive ranking of the returned images with equal Hamming distances to the queries. This is achieved by firstly offline learning bitwise weights of the hash codes for a diverse set of predefined semantic concept classes. Partial duplicate images often have large non-duplicate regions and small duplicate regions with random rotation, which lead to the following problems: 1) large number of noisy features from the nonduplicate regions; 2) small number of representative features from the duplicate regions; 3) randomly rotated or deformed duplicate regions.
80
ISDMM0 Robust Spatial Consistency Graph Model for Partial 3 Duplicate Image Retrieval
DOTNET APPLICATION PROJECTS
TECHNOLOGY : DOTNET DOMAIN : NON IEEE BASED PROJECTS
SNO P.CODE PROJECT TITLE
1 2 3 4 5
ISNID01 ISNID02 ISNID03 ISNID04 ISNID05
Security Evaluation For Graphical Password
Multi Level Authentication Method For Banking Applications Spoken Vibration To Access Personal Computer Effective Software Merging In The Presence Of Object-Oriented Refactoring Electronic Money Market Management System
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
6 7 8 9 10 11 ISNID06 ISNID07 ISNID08 ISNID09 ISNID10 ISNID11
Website Positioning System. Online Financial Protection Management System The Effect Of Virtual Community Culture And Group Cohesion On Knowledge Sharing Knowledge-Based Integrated Financial Forecasting System Multi Track Trading Sytem. Grid Accounting Services Architecture (Gasa) For Distributed Systems Sharing And Integration Reducing Transfer Time In Wireless Networks By Simultaneous Multiple Packet Transmission Detecting Lost Items In Shopping Carts Systematized Collection Of Student Using Internet And Intranet
Load Balancing In Parallel Computers
12 13 14 15 16 17 18 19 20 21 22
ISNID12 ISNID13 ISNID14 ISNID15 ISNID16 ISNID17 ISNID18 ISNID19 ISNID20 ISNID21 ISNID22
Supervised Neighborhood Topology Learning For Human Action Recognition Enhancing Download Performance In An Intranet Synthesis Of Few-Layer Gase Nanosheets For High Performance Photo detectors. The Color Blindness Removal Technique In Image The Color Blindness Removal Technique In Image Enhanced Security Control System In The Online Exam Webpage Understanding Beyond Page Level Search
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
23 24 25 26 27 28 ISNID23 ISNID24 ISNID25 ISNID26 ISNID27 ISNID28
A Novel Framework For Semantic Annotation And Personalized Retrieval Of Sports Video Anticipating Digitized Pictures From Cracks Based On Edge Detection Method Enhanced Hierarchical Multi Pattern Matching Algorithm Characterizing Files In The Modern Gnutella Network Semantics-Based Access Control Approach For Web Service Web Services Such As E-Commerce Applications Detecting Traffic Anomalies Through Aggregate Analysis Of Packet Header Data Managing Central Monitoring In Distributed Systems Semantic Web Technologies For E-Learning Bridging Information Gap Downlink Performance Of Wireless Networks Using MPT Packet Transmission] Mobility Reduces Uncertainty In Manets Post-Mining Of Association Rules Using Ontologies Authentication Protocol For Wireless Sensor Networks Keyword Ranking Analysis For Orthogonal Data Embedding For Binary Images In Morphological Transform Domain A High Capacity Approach Identification And Removal Of Cracks In Digital Images Proactive Data Quality Management For Data Warehouse Systems . [Multiple
29
ISNID29
30 31 32 33 34 35 36 37
ISNID30 ISNID31 ISNID32 ISNID33 ISNID34 ISNID35 ISNID36 ISNID37
38 39
ISNID38 ISNID39
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
40 41 42 43 44 45 46 47 48 49 50 ISNID40 ISNID41 ISNID42 ISNID43 ISNID44 ISNID45 ISNID46 ISNID47 ISNID48 ISNID49 ISNID50
Path-History-Based Access Control For Mobile Agents Distributed Collaborative Distributed Editing System Web Ranking Software
Evaluating The Scalability Of P2P Based Video On Demand Service Using Real Traces Efficient Learning-Based Image Enhancement Image Watermarking Systems
Virtual Observers In A Mobile Surveillance System Content-Based Routing In Mobile Ad Hoc Networks Human Resources Software Systems A Path Identification Mechanism To Defend Against DDos Attacks The Effect Of Pairs In Program Design Tasks
NS2
TECHNOLOGY : NS2 DOMAIN : IEEE BASED PROJECTS 01 02 ISNS01 ISNS02 Cluster –Based Certificate Revocation Woith Vindication Capability For Mobile Ad- Hoc Networks Eaack- A Secure Intrusion –Detecion System For Manets
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
03 04 05 06 07 08 09 09 10 11 12 13 14 15 ISNS03 ISNS04 ISNS05 ISNS06 ISNS07 ISNS08 ISNS09 ISNS09 ISNS10 ISNS11 ISNS12 ISNS13 ISNS14 ISNS15 Genetic Algorithm For Energy Efficient Qos Multicast Routing Evolving Network Model With Local –Area Preference For Mobile Ad-Hoc Network Light Weight Sybil Attack Detection In Manets Self –Organising Seamless Multimedia Streaming In Dense Manets A Neighbor Coverage – Based Probabilistic Rebroadcast For Reducing Routing Overhead In Mobile Ad –Hoc Networks Routing Protocol Based On Grover’s Searching Algorithm For Mobile Ad - Hoc Networks New Approach For Mobile Ad- Hoc Networks Unity Issue In Asuspicious Environment New Approach For Mobile Ad- Hoc Networks Unity Issue In Asuspicious Environment New Power –Aware Multicast Algorithm For Mobile Ad –Hoc Networks Enhanced Olsr For Defense Against Dos Attack In Ad Hoc Networks An Adaptive Hello Messaging Scheme For Neighbor Discovery In On-Demand Manet Routing Protocols Hybrid Flooding Scheme For Mobile Ad Hoc Networks –March 2013eight Sybil Attack Detection In Manets Self –Organising Seamless Multimedia Streaming In Dense Manets A Neighbor Coverage – Based Probabilistic Rebroadcast For Reducing Routing Overhead In Mobile Ad –Hoc Networks
SNO P.CODE
TITLES
16 17
Vampire Attacks:Draining Life From Wireless Ad Hoc Sensor Networks Classification And Experimental Analysis For Clone Detection Approaches In Wireless Sensor Networks
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem
Iris Solutions
18 19 20 21 22 23 24 Channel Aware Encryption And Decision Fusion For Wireless Sensor Networks Energy Efficient Transmission Scheme For Mobile Data Gathering In Wireless Sensor Networks .Path Planning Algorithm For Mobile Anchor –Based Localization In Wireless Sensor Net Works Decentralised Hypothesis Testing In Wireless Sensor Networks In The Presence Of Misbehaving Nodes Tour Planning For Mobile Data- Gathering Mechanisms In Wireless Sensor Networks Joint Contention And Sleep Control For Lifetime Maximization In Wireless Sensor Networks Exploiting Ubiquitious Data Collection For Mobile Users In Wireless Sensor Networks Clustering Algorithm For Non - Uniformly Distributed Nodes Inwireless Sensor Networks Energy –Efficient Routing Protocols In Wireless Sensor Networks :A Survey Load Balanced Clustering Algorithm With Distributed Self – Organisationfor Wireless Sensor Networks Ldts:A Light Weight And Dependable Trust System For Clustered Wireless Sensor Networks
25 26 27 28
SNO P.CODE
TITLES
29 30 31 32 33
Emap:Expedite Message Authentication Protocol For Vehicular Ad Hoc Networks Evaluation Of The Use Of Guard Nodes For Securing The Routing In Vanet Team:Trust Extended Authentication Mechanismfor Vehicular Ad Hoc Networks Discovery And Verification Of Neighbor Positions In Mobile Ad Hoc Networks Investigating A Junction –Based Multipath Source Routing Algorithm For Vanet
#73/1, 3rd Floor, Salai Road, Thillai Nagar, Trichy-18 Ph: 0431-4023660 Mail:
[email protected] website: www.irisprojects.com, Our branches: Kovai: 9943 357 357, Tanjore: 9943 317 317, , Trichy: 9943 314 314, Chennai, Madurai, Nellai, Erode, Salem