SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Iris Solutions

      Titles For ME / M.Tech, BE / B.Tech, M.Sc, MCA

                      TABLE OF CONTENTS


ABOUT IRIS                                                                                2

JAVA
       IEEE TRANSACTIONS ON NETWORKING                                                    3
       IEEE TRANSACTIONS ON NETWORK SECURITY                                              6
       IEEE TRANSACTIONS ON DATA MINING                                                   9
       IEEE TRANSACTIONS ON MOBILE COMPUTING                                              11
       IEEE TRANSACTIONS ON IMAGE PROCESSING                                              13
       IEEE TRANSACTIONS ON SOFTWARE ENGINEERING                                          14
       IEEE TRANSACTIONS ON GRID & CLOUD COMPUTING                                        15
       IEEE TRANSACTIONS ON J2EE                                                          16
DOTNET
       IEEE TRANSACTIONS ON NETWORKING                                                    18
       IEEE TRANSACTIONS ON NETWORK SECURITY                                              21
       IEEE TRANSACTIONS ON DATA MINING                                                   23
       IEEE TRANSACTIONS ON MOBILE COMPUTING                                              25
       IEEE TRANSACTIONS ON IMAGE PROCESSING                                              28
       IEEE TRANSACTIONS ON GRID & CLOUD COMPUTING                                        29
       IEEE TRANSACTIONS ON SOFTWARE ENGINEERING                                          31
                                                                                               1
                                                                                               Page




#165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                 Mail: irisprojects@yahoo.com website: www.irisprojects.com,
   Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                            Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions


                                            About Iris

                     "Iris Solutions - A Boon for Young Technocrats"

         Global presence of technocrats is no more a dream in this world. We make it possible by

ensuring all the quality standards within an individual which has to be the identity of a successful

technocrat.

         Irrespective of the technologies and the domain in which a particular project gets shaped, we

support all kind of student needs in terms of monetary values as well as the time factor. Students apart

from doing a particular project should know how the project is getting shaped. We are aware in making

this thing to happen.

         Research and Development plays a vital role in enhancing one‘s self development in terms of up

gradation and moving forward. When you are searching for a good channel to inhibit yourself with such

a platform, IRIS comes handy. Apart from providing simulation based training, we also provide

industrial experts in sharing their valuable suggestions and even Industry oriented training at required

cases.

         In short we strive hard to fulfill the student requirements in terms of each and every department

of the developing their skills.
                                                                                                             2
                                                                                                             Page




      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions

                                     JAVA
TECHNOLOGY: JAVA
DOMAIN    : IEEE TRANSACTIONS ON NETWORKING

SNO    P.CODE                TITLES                              DESCRIPTION                      YEAR
 1    ISJNW01 Self-Reconfigurable Wireless         In this project, ARS outperforms existing      2011
              Mesh Networks                        failure-recovery schemes in improving
                                                   channel-efficiency by more than 90% and in
                                                   the ability of meeting the application
                                                   bandwidth demands. Multihop wireless
                                                   mesh networks experience frequent link
                                                   failures caused by channel interference.
 2    ISJNW02 Delay-Optimal Opportunistic          In this project, the design of multiuser       2011
              Scheduling and Approximations        opportunistic packet schedulers for users
                                                   sharing a time-varying wireless channel
                                                   from performance and robustness points of
                                                   view. Markov decision process framework
                                                   used to compute and characterize mean-
                                                   delay-optimal scheduling policies.
 3    ISJNW03 Adaptive Fault-Tolerant QoS          Use of fault tolerance mechanisms through      2011
              Control Algorithms for               redundancy improves query reliability in the
              Maximizing System Lifetime of        presence of unreliable wireless
              Query-Based Wireless Sensor          communication and sensor faults; it cause
              Networks                             the energy of the system to be quickly
                                                   depleted.
 4    ISJNW04 Optimizing Resource Conflicts in     The two factors are formulated in a matrix     2011
              Workflow Management Systems          form and the optimal solution is found by
                                                   applying concepts of the generalized
                                                   eigenvalue analysis. A rough outline of an
                                                   agent-based architecture is proposed to
                                                   achieve runtime integration of our algorithm
                                                   into a functional WfMS.
 5    ISJNW05 Predictable high performance         In this project we present a design and        2011
              Computing using Feedback and         implementation of a predictable HPC
              admission control                    system using feedback control and
                                                   admission control. By creating a virtualized
                                                                                                         3


                                                   application layer and opportunistically
                                                                                                         Page




                                                   multiplexing is the concurrent application.

      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
6    ISJNW06 Attribute-Based Access Control        A cryptographic approach to enforce a fine-     2011
             with Efficient Revocation in Data     grained access control on the outsourced
             Outsourcing Systems                   data that is dual encryption protocol
                                                   exploiting the combined features of the
                                                   cipher text policy attribute-based encryption
                                                   and group key management algorithm.
7    ISJNW07 Load Balance with Imperfect        A novel load balancing algorithm that is           2011
             Information in Structured Peer-to- unique in that each participating peer is
             Peer Systems                       based on the partial knowledge of the
                                                system to estimate the probability
                                                distributions of the capacities of peers and
                                                the loads of virtual servers, resulting in
                                                imperfect knowledge of the system state.
8    ISJNW08 A Distributed Algorithm for           A distributed algorithm used for computing      2011
             Finding All Best Swap Edges of a      all best swap edges for a minimum-diameter
             Minimum-Diameter Spanning             spanning tree. The best possible way of
             Tree                                  reconnecting the network is to replace the
                                                   failed link by a single other link called a
                                                   swap link. A swap that minimizes the
                                                   diameter of the resulting swap tree.
9    ISJNW09 Decomposing Workload Bursts           We present a new framework for runtime     2011
             for Efficient Storage Resource        scheduling of a client‘s workload based on
             Management                            decomposition and recombination of the
                                                   request stream. Finally, we show how the
                                                   framework can be used to improve estimates
                                                   of the aggregate resource requirements of
                                                   multiple concurrent clients.
10   ISJNW10 Monitoring The Impact Of P2P          We present an classification for broadband      2011
             Users On A Broadband                  users into a P2P and non-P2P group based
             Operator‘s Network Over time          on the amount of communication partners
                                                   (―peers‖) they in a dedicated timeframe. We
                                                   derive their impact on network
                                                   characteristics like the number of active
                                                   users and their aggregate bandwidth.
11   ISJNW11 Metadata Distribution and             This paper makes two contributions. First,      2011
             Consistency Techniques for            we present a dynamic metadata distribution
             Large-Scale Cluster File Systems      policy (DDG) to improve the metadata
                                                   throughput by using a triple-defined
                                                   distribution. Second, S2PC-MP reduces the
                                                   overhead of failure-free execution and
                                                   ensures quick recovery in the presence of
                                                   metadata server failures or client failures.
                                                                                                          4



12   ISJNW12 Flexible Robust Group Key             A novel 2-round GKA protocol that offers a      2011
                                                                                                          Page




             Agreement                             natural trade-off between message size and
     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
                                                  the desired level of fault tolerance. The new
                                                  protocol is also the disruption attack by the
                                                  malicious insider.
13   ISJNW13 Site-Based Partitioning And          The pagerank algorithm is an important          2011
             Repartitioning Techniques For        component. The pagerank computation
             Parallel Page Rank Computation       which is frequently repeated must be
                                                  performed in parallel with high-efficiency
                                                  and low-preprocessing overhead while
                                                  considering the initial distributed nature of
                                                  the web matrices.
14   ISJNW14 Stabilization of Flood Sequencing    In this project we discuss a family of four     2010
             Protocols in Sensor Networks         flood sequencing protocols that use
                                                  sequence numbers to distinguish between
                                                  fresh and redundant flood messages.
15   ISJNW15 A Near-Optimal Algorithm             In this project, we propose a novel topology    2010
             Attacking the Topology Mismatch      matching algorithm based on the
             Problem in Unstructured Peer-to-     Metropolis-Hastings method. Our proposal
             Peer Networks.                       is guided by our insight analytical model
                                                  and is close to the optimal design.
16   ISJNW16 A Dynamic Performance-Based          A protocol, Performance Adaptive UDP            2010
             Flow Control Method for High-        which aims to dynamically and
             Speed Data Transfer                  autonomously maximize performance under
                                                  different systems. A mathematical model
                                                  and related algorithms are proposed to
                                                  describe the theoretical basis behind
                                                  effective buffer and CPU management.
17   ISJNW17 Priority of packet inference with    We present an end-to-end approach for PFP       2010
             back up path                         inference and its associated tool, POPI
                                                  which enables users to discover such
                                                  network policies through measurements of
                                                  packet losses of different packet types.
18   ISJNW18 On the Benefits of Cooperative       Cooperative Cache can improve the system        2010
             Proxy Caching for Peer-to-Peer       performance in wireless P2P networks. We
             Traffic                              propose a novel asymmetric cooperative
                                                  cache approach, where the data requests are
                                                  transmitted to the cache layer on every
                                                  node.
                                                                                                         5
                                                                                                         Page




     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
TECHNOLOGY: JAVA
DOMAIN    : IEEE TRANSACTIONS ON NETWORK SECURITY

SNO    P.CODE                TITLES                               DESCRIPTION                       YEAR
 1    ISJNS01    SAT: A Security Architecture       In this project, we propose SAT, a security     2011
                 Achieving Anonymity and            architecture mainly consisting resolves the
                 Traceability in Wireless Mesh      conflicting security requirements of
                 Networks                           unconditional anonymity for honest users
                                                    and traceability of misbehaving users.
 2    ISJNS02    Peering Equilibrium Multipath      Our scheme relies on a game theory            2011
                 Routing: A Game Theory             modeling, with a non-cooperative potential
                 Framework for Internet Peering     game considering both routing and
                 Settlements                        congestions costs. We compare different
                                                    PEMP policies to BGP Multipath schemes
                                                    by emulating a realistic peering scenario.
                                                    Our results show that the routing cost can be
                                                    decreased by roughly 10% with PEMP. The
                                                    stability of routes can be significantly
                                                    improved and that congestion can be
                                                    practically avoided on the peering links.
 3    ISJNS03    An Obfuscation-Based Approach      We address this problem and present a           2011
                 for Protecting Location Privacy    solution based on different obfuscation
                                                    operators introduce an adversary model and
                                                    provide an analysis of the proposed
                                                    obfuscation operators to evaluate their
                                                    robustness against adversaries aiming to
                                                    reverse the obfuscation effects to retrieve a
                                                    location that better approximates the
                                                    location of the users
 4    ISJNS04    Providing Transaction Guarantees   Aims to demonstrate that randomization can 2011
                 in Asynchronous Systems with       be a very competitive approach even in
                 No Assumptions on the Accuracy     hostile environments where arbitrary faults
                 of Failure Detection               can occur. A stack of randomized intrusion-
                                                    tolerant protocols is described and its
                                                    performance evaluated under several settings
                                                    in both local-area-network and wide-area-
                                                    network environments. The stack provides a
                                                    set of relevant services ranging from basic.
 5    ISJNS05    Modeling and Detection of          Our scheme uses the Power Spectral              2011
                 Camouflaging Worm                  Density (PSD) distribution of the scan
                                                    traffic volume and its corresponding
                                                                                                           6



                                                    Spectral Flatness Measure (SFM) to
                                                                                                           Page




                                                    distinguish the C-Worm traffic from
      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
                                                   background traffic. The performance data
                                                   clearly demonstrates that our scheme can
                                                   effectively detect the C-Worm propagation.
6    ISJNS06    Analysis of a Botnet Takeover      We present the design of an advanced             2011
                                                   hybrid peer-to-peer botnet. Compared with
                                                   current botnets, the proposed botnet is
                                                   harder to be shut down, monitored, and
                                                   hijacked. It provides individualized
                                                   encryption and control traffic dispersion.
7    ISJNS07    Efficient Network Modification to As real-time traffic such as video or voice       2011
                Improve QoS Stability at Failures increases on the Internet, ISPs are required
                                                  to provide stable quality as well as
                                                  connectivity at failures. For ISPs, how to
                                                  effectively improve the stability of these
                                                  qualities at failures with the minimum
                                                  investment cost is an important issue, and
                                                  they need to effectively select a limited
                                                  number of locations to add link facilities.
8    ISJNS08    Comparative Evaluation of          1) Formalizing the problem of spoofed            2011
                Spoofing Defenses                  traffic filtering and defining novel
                                                   effectiveness measures, 2) observing each
                                                   defense as selfish or altruistic and
                                                   differentiating their performance goals, 3)
                                                   defining optimal core deployment points for
                                                   defenses that need core support, and 4)
                                                   evaluating all defenses in a common and
                                                   realistic setting.
9    ISJNS09    Traceback of DDoS Attacks          We categorize packets that are passing           2011
                Using Entropy Variations           through a router into flows, which are
                                                   defined by the upstream router where a
                                                   packet came from, and the destination
                                                   address of the packet. In this project, we use
                                                   flow entropy variation or entropy variation
                                                   interchangeably.
10   ISJNS10    Weak State Routing for Large-      Weak State Routing (WSR) is a novel              2010
                Scale Dynamic Networks             routing protocol that uses weak state along
                                                   with random directional walks for
                                                   forwarding packets. When a packet reaches
                                                   a node that contains a weak state about the
                                                   destination with higher confidence than that
                                                   held by the packet, the walk direction is
                                                   biased. The packet reaches the destination
                                                                                                           7



                                                   via a sequence of directional walks,
                                                                                                           Page




                                                   punctuated by biasing decisions.
     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
11   ISJNS11    On the Quality of Service of     Estimating the parameters of the failure           2010
                Crash-Recovery Failure Detectors detector to achieve a required QoS to
                                                 configuring the crash-recovery failure
                                                 detector. We investigate the impact of the
                                                 dependability of the monitored process on
                                                 the QoS of our failure detector
12   ISJNS12    An Advanced Hybrid Peer-to-       Compared with current botnets, the                2010
                Peer Botnet                       proposed botnet is harder to be shut down,
                                                  monitored, and hijacked. It provides robust
                                                  network connectivity, individualized
                                                  encryption and control traffic dispersion,
                                                  limited botnet exposure by each bot, and
                                                  easy monitoring and recovery by its
                                                  botmaster.
13   ISJNS13    Authenticated Group Key           Key transfer protocols rely on a mutually     2010
                Transfer Protocol Based on Secret trusted key generation center (KGC) to
                Sharing                           select session keys and transport session
                                                  keys to all communication entities secretly.
                                                  In this paper, we propose an authenticated
                                                  key transfer protocol based on secret sharing
                                                  scheme that KC can broadcast group key
                                                  information to all group members at once
                                                  and only authorized group members can
                                                  recover the group key.
14   ISJNS14    Secure Data Replication in Data   Secret sharing with cryptography                  2010
                Grid                              approaches have been used in distributed
                                                  storage systems to ensure the
                                                  confidentiality, integrity, and availability of
                                                  critical information. specifically, we
                                                  investigate the problem of optimal
                                                  allocation of sensitive data objects that are
                                                  partitioned by using secret sharing scheme
                                                  or erasure coding scheme and/or replicated.
                                                  We develop two heuristic algorithms for the
                                                  two sub problems.
15   ISJNS15    Providing Witness Anonymity       We introduce the concept of witness           2010
                Under Peer-to-Peer Settings       anonymity for peer-to-peer systems, as well
                                                  as other systems with the peer-to-peer
                                                  nature. We propose the Secure Deep Throat
                                                  (SDT) protocol to provide anonymity for the
                                                  witnesses of malicious or selfish behavior to
                                                  enable such peers to report on this behavior
                                                  without fear of retaliation.
                                                                                                           8
                                                                                                           Page




     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
TECHNOLOGY: JAVA
DOMAIN    : IEEE TRANSACTIONS ON DATA MINING

SNO    P.CODE                TITLES                              DESCRIPTION                        YEAR
 1    ISJDM01 Effective Navigation of Query        Ranking and categorization, which can also       2011
              Results Based on Concept             be combined, have been proposed to
              Hierarchies                          alleviate this information overload problem.
                                                   Results categorization for biomedical
                                                   databases is the focus of this work. A
                                                   natural way to organize biomedical citations
                                                   is according to their MeSH annotations.
 2    ISJDM02 Automatic Discovery of Personal      We propose a novel, automatically extracted 2011
              Name Aliases from the Web            lexical pattern-based approach to efficiently
                                                   extract a large set of candidate aliases from
                                                   snippets retrieved from a web search engine.
                                                   We define numerous ranking scores to
                                                   evaluate candidate aliases using three
                                                   approaches: lexical pattern frequency, word
                                                   co-occurrences in an anchor text graph, and
                                                   page counts on the web.
 3    ISJDM03 An Efficient Index for Geographic Given a geographic query that is composed           2011
                                                of query keywords and a location, a
                                                geographic search engine retrieves
                                                documents that are the most textually and
                                                spatially relevant to the query keywords and
                                                the location, respectively, and ranks the
                                                retrieved documents according to their joint
                                                textual and spatial relevances to the query.
 4    ISJDM04 Anonymous Publication of             The problem of anonymizing sparse, high          2011
              Sensitive Transactional Data         dimensional transactional data is solved
                                                   through methods based on 1) local NN-
                                                   search and 2) global data reorganization.
 5    ISJDM05 Efficient Periodicity Mining in      A time series is a collection of data values     2011
              Time Series Databases Using          gathered generally at uniform interval of
              Suffix Trees                         time to reflect certain behavior of an entity.
                                                   Real life has several examples of time series
                                                   such as stock growth, transactions in a
                                                   superstore. A time series is mostly
                                                   characterized by being composed of
                                                   repeating cycles.
                                                                                                           9


 6    ISJDM06 Mining Iterative Generators and   The iterative pattern mining which outputs     2011
                                                                                                           Page




              Representative Rules for Software patterns that are repeated frequently within a
      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
                Specification Discovery           program trace, or across multiple traces, or
                                                  both. Frequent iterative patterns reflect
                                                  frequent program behaviors that likely
                                                  correspond to software specifications.
7    ISJDM07 Mining Web Graphs for                The recommender systems are based on             2011
             Recommendations                      Collaborative Filtering which is a technique
                                                  that automatically predicts the interest of an
                                                  active user by collecting rating information
                                                  from other similar users or items
8    ISJDM08 Managing Multidimensional            A P2P-based framework supporting the           2010
             Historical Aggregate Data in         extraction of aggregates from historical
             Unstructured P2P Networks            multidimensional data is proposed, which
                                                  provides efficient and robust query evaluation
9    ISJDM09 Multimodal Fusion for Video          In this project, we present a flexible and       2010
             Search Reranking                     effective reranking method, called CR-
                                                  Reranking, to improve the retrieval
                                                  effectiveness. Specifically, multimodal
                                                  features are first utilized separately to rerank
                                                  the initial returned results at the cluster
                                                  level, and then all the ranked clusters from
                                                  different modalities are cooperatively used
                                                  to infer the shots with high relevance.
10   ISJDM10 Prospective Infectious Disease       We considered the problem of identifying         2010
             Outbreak Detection Using             outbreak patterns in a syndrome count time
             Markov Switching Models              series using Markov switching models. The
                                                  disease outbreak states are modeled as
                                                  hidden state variables which control the
                                                  observed time series.
11   ISJDM11 LIGHT: A Query-Efficient yet         LIGHT weight Hash Tree (LIGHT)—a                2010
             Low-Maintenance Indexing             query-efficient yet low-maintenance
             Scheme over DHTs                     indexing scheme. LIGHT employs a novel
                                                  naming mechanism and a tree summarization
                                                  strategy for graceful distribution of its index
                                                  structure. We show through analysis that it
                                                  can support various complex queries with
                                                  near-optimal performance.
12   ISJDM12 Deriving Concept-Based User          User profiling is a fundamental component        2010
             Profiles from Search Engine Logs     of any personalization applications. We
                                                  evaluate the proposed methods against our
                                                  previously proposed personalized query
                                                  clustering method. Experimental results
                                                                                                          10


                                                  show that profiles which capture and utilize
                                                  both of the user‘s positive and negative
                                                                                                          Page




                                                  preferences perform the best.
     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
TECHNOLOGY: JAVA
DOMAIN    : IEEE TRANSACTIONS ON MOBILE COMPUTING

SNO    P.CODE                TITLES                              DESCRIPTION                      YEAR
 1    ISJMC01 Design and Performance Analysis      Here we develop two per-user-based             2011
              of Mobility Management               mobility management schemes for WMNs,
              Schemes Based on Pointer             namely, the static anchor scheme and
              Forwarding for Wireless Mesh         dynamic anchor scheme. Both schemes are
              Networks                             based on pointer forwarding. The optimal
                                                   threshold of the forwarding chain length is
                                                   determined for each individual mesh client
                                                   dynamically based on the mesh client‘s
                                                   specific mobility and service patterns.
 2    ISJMC02 Dynamic Conflict-Free                DCQS, a novel transmission scheduling          2011
              Transmission Scheduling for          technique specifically designed for query
              Sensor Network Queries               services in wireless sensor networks. DCQS
                                                   features a planner and a scheduler. The
                                                   planner reduces query latency by
                                                   constructing transmission plans based on the
                                                   precedence constraints in in-network
                                                   aggregation. The scheduler improves
                                                   throughput by overlapping the transmissions
                                                   of multiple query instances concurrently
                                                   while enforcing a conflict-free schedule.
 3    ISJMC03 Multipath Routing and Max-Min        Ensure QoS, an interference-aware max-min 2011
              Fair QoS Provisioning under          fair bandwidth allocation algorithm,
              Interference Constraints in          proposed where multiple paths (determined
              Wireless Multihop Networks           by using the routing metric) coexist for each
                                                   user to the base station succeed in improving
                                                   network performance in terms of delay,
                                                   packet loss ratio, and bandwidth usage.
 4    ISJMC04 Detection of Selfish Manipulation CCA tuning can be exploited by selfish            2011
              of Carrier Sensing in 802.11      nodes to obtain an unfair share of the
              Networks                          available bandwidth. Specifically, a selfish
                                                entity can manipulate the CCA threshold to
                                                ignore ongoing transmissions; this increases
                                                the probability of accessing the medium and
                                                provides the entity a higher, unfair share of
                                                the bandwidth.
 5    ISJMC05 Message-Efficient Location           A better prediction model can significantly    2011
                                                                                                         11


              Prediction for Mobile Objects in     reduce power consumption in a wireless
              Wireless Sensor Networks Using a     sensor network because fewer redundant
                                                                                                         Page




              Maximum Likelihood Technique         sensors will be activated to keep monitoring
      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
                                                  the object. The Gauss-Markov mobility
                                                  model is best mobility models to describe
                                                  object trajectory because it can capture the
                                                  correlation of object velocity in time.
6    ISJMC06 Throughput-Lifetime Trade-Offs       Operating a multi hop wireless network         2011
             in Multi hop Wireless Networks       while achieving both high throughput and
             under an SINR-Based                  high lifetime is a highly desirable design
             Interference Model                   goal.
7    ISJMC07 Efficient Load-AwareRouting          A cluster head estimates traffic load in its   2010
             Scheme For Wireless Mesh             cluster. As the estimated load gets higher,
             networks                             the cluster head increases the routing
                                                  metrics of the routes passing through the
                                                  cluster. Based on the routing metrics, user
                                                  traffic takes a detour to avoid overloaded
                                                  areas and, as a result, the WMN achieves
                                                  global load balancing
8    ISJMC08 Secure Data Collection in            We generate randomized multipath routes,       2010
             Wireless Sensor Networks Using       the routes taken by the ―shares‖ of different
             Randomized Dispersive Routes         packets change over time. The routing
                                                  algorithm becomes known to the adversary,
                                                  the adversary still cannot pinpoint the routes
                                                  traversed by each packet. Besides
                                                  randomness, the generated routes are also
                                                  highly dispersive and energy efficient,
                                                  making them quite capable of
                                                  circumventing black holes.
9    ISJMC09 VEBEK: Virtual Energy-Based          We introduce an energy-efficient VEBEK         2010
             Encryption and Keying for            scheme for WSNs that significantly reduces
             Wireless Sensor Networks             the number of transmissions needed for
                                                  rekeying to avoid stale keys. In addition to
                                                  the goal of saving energy, minimal
                                                  transmission is imperative for some military
                                                  applications of WSNs where an adversary
                                                  could be monitoring the wireless spectrum
10   ISDMC10 MABS: Multicast Authentication       MABS, includes two schemes. The basic          2010
             Based on Batch Signature             scheme (MABS-B) eliminates the
                                                  correlation among packets and thus
                                                  provides the perfect resilience to packet
                                                  loss, and it is also efficient in terms of
                                                  latency, computation, and communication
                                                  overhead due to an efficient cryptographic
                                                                                                        12


                                                  primitive called batch signature, which
                                                  supports the authentication of any number
                                                                                                        Page




                                                  of packets simultaneously.
     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
TECHNOLOGY: JAVA
DOMAIN    : IEEE TRANSACTIONS ON IMAGE PROCESSING


SNO    P.CODE                 TITLES                              DESCRIPTION                        YEAR
 1    ISJIP01    Efficient Relevance Feedback       Content-based image retrieval (CBIR) is the      2011
                                                    mainstay of image retrieval systems.
                                                    Relevance feedback techniques were
                                                    incorporated into CBIR such that more
                                                    precise results can be obtained by taking
                                                    user‘s Feedbacks into account.
 2    ISJIP02    High-quality Reflection           Deal with a problem of separating the effect      2011
                 Separation using Polarized Images of reflection from images captured behind
                                                   glass. The input consists of multiple
                                                   polarized images captured from the same
                                                   view point but with different polarizer
                                                   angles. The output is the high quality
                                                   separation of the reflection layer and the
                                                   background layer from the images.
 3    ISJIP03    Active Learning for Solving the    The result on the face recognition database      2011
                 Incomplete Data Problem in         and palm print palm vein database showed
                 Facial Age Classification by the   that our approach can handle problems with
                 Furthest Nearest-Neighbor          large number of classes. Our contributions
                 Criterion                          are twofold. 1. We proposed the FNN being
                                                    our novel idea, as a generic on-line or active
                                                    learning paradigm. 2. We showed that it can
                                                    be another viable tool for active learning of
                                                    facial age range classification.
 4    ISJIP04    Practical Bounds on Image          The bound was computed directly from the         2011
                 Denoising: From Estimation to      noise-free image that was assumed to be
                 Information                        available. We analyze the bounds formulation
                                                    to show that these two parameters are
                                                    interdependent and they, along with the
                                                    bounds formulation as a whole, have a nice
                                                    information-theoretic interpretation as well.
 5    ISJIP05    An Affine Symmetric Image          The affine symmetry is exploited between         2010
                 Model and Its Applications         structural textures at a local level, the
                                                    objective being to find the minimum
                                                    residual error by estimating the affine
                                                    transform relating two patches of texture.
                                                                                                            13


                                                    Having developed a local model, the
                                                    methodology is extended to the whole
                                                                                                            Page




                                                    image to estimate the global affine relation.
      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions

TECHNOLOGY: JAVA
DOMAIN    : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING

SNO    P.CODE                 TITLES                             DESCRIPTION                         YEAR
 1    ISJSE01    An Attack Surface Metric          Formalize the notion of a system‘s attack         2011
                                                   surface and introduce an attack surface
                                                   metric to measure the attack surface in a
                                                   systematic manner. Our measurement
                                                   method is agnostic to a software system‘s
                                                   implementation language and is applicable
                                                   to systems of all sizes.
 2    ISJSE02    Genetic Algorithms for            A system which uses a genetic algorithm to 2011
                 Randomized Unit Testing           find parameters for randomized unit testing
                                                   that optimize test coverage. Designing GAs
                                                   is somewhat of a black art. We therefore use
                                                   a feature subset selection tool to assess the
                                                   size and content of the representations
                                                   within the GA.
 3    ISJSE03    Efficient Consistency             We use behavioral profiles for the definition 2011
                 Measurement Based on              of a formal notion of consistency which is
                 Behavioral Profiles of Process    less sensitive to model projections than
                 Models                            common criteria of behavioral equivalence
                                                   and allows for quantifying deviation in a
                                                   metric way. The derivation of behavioral
                                                   profiles and the calculation of a degree of
                                                   consistency have been implemented.
 4    ISJSE04    Web development Navigational      We presents a general vision of NDT,              2010
                 Development Techniques            which is an approach to deal with
                                                   requirements in Web systems. It is based on
                                                   conclusions obtained in several comparative
                                                   studies and it tries to fill some gaps detected
                                                   by the research community.

                                                                                                            14
                                                                                                            Page




      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
TECHNOLOGY: JAVA
DOMAIN    : IEEE TRANSACTIONS ON GRID & CLOUD COMPUTING

SNO    P.CODE                 TITLES                                  DESCRIPTION                        YEAR
 1    ISJGC01    Adaptive grid risk-sensitive filter    Based on point-mass approximation, is            2011
                 for non-linear problems               called the adaptive grid risk-sensitive filter.
                                                       Although risk-sensitive estimators have
                                                       been known to be robust compared to their
                                                       risk-neutral counterparts, the
                                                       implementation of risk-sensitive filters
                                                       (RSFs) is almost impossible except for very
                                                       trivial systems like linear Gaussian systems.
 2    ISJGC02    Multicloud Deployment of              We deploy a computing cluster on the top of 2011
                 Computing Clusters for Loosely        a multicloud infrastructure, for solving
                 Coupled MTC Applications              loosely coupled Many-Task Computing
                                                       applications. In this way, the cluster nodes
                                                       can be provisioned with resources from
                                                       different clouds to improve the cost
                                                       effectiveness of the deployment, or to
                                                       implement high-availability strategies.
 3    ISJCC03    Enabling Public Auditability and      To achieve efficient data dynamics, we        2011
                 Data Dynamics for Storage             improve the existing proof of storage
                 Security in Cloud Computing           models by manipulating the classic Merkle
                                                       Hash Tree construction for block tag
                                                       authentication. To support efficient handling
                                                       of multiple auditing tasks, the technique of
                                                       bilinear aggregate signature to extend our
                                                       main result into a multiuser setting, where
                                                       TPA can perform multiple auditing tasks
                                                       simultaneously.
 4    ISJGC04    SOAP Processing Performance           SOAP communications produce considerable 2011
                 and Enhancement                       network traffic, making them unfit for
                                                       distributed, loosely coupled and
                                                       heterogeneous computing environments such
                                                       as the open Internet. Also, they introduce
                                                       higher latency and processing delays than
                                                       other technologies, like Java RMI and
                                                       CORBA. WS research has recently focused
                                                       on SOAP performance enhancement.
 5    ISJGC05    An Improved Ant Algorithm for         Finding optimal schedules for such an             2011
                 Grid Scheduling Problem Using         environment is an NP-hard problem, and so
                                                                                                                15


                 Biased Initial Ants                   heuristic approaches must be used. The goal
                                                       of grid task scheduling is to achieve high
                                                                                                                Page




                                                       system throughput and to allocate various
      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
                                                    computing resources to applications. Many
                                                    different methods have been proposed to
                                                    solve this problem
 6    ISJGC06    Weather data sharing system: an    Intelligent agents can play an important role     2011
                 agent-based distributed data       in helping achieve the ‗data grid‘ vision. In
                 management                         this study, the authors present a multi-agent-
                                                    based framework to implement manage,
                                                    share and query weather data in a
                                                    geographical distributed environment,
                                                    named weather data sharing system
 7    ISJGC07    Bi-Criteria Scheduling Of          Bi-criteria scheduling approaches for             2010
                 Scientific Grid Workflows          scientific work flows are usually restricted
                                                    to certain criterion pairs and require the user
                                                    to define his preferences either as weights
                                                    assigned each criterion or as fixed
                                                    constraints defined for one criterion. The
                                                    first approach has the drawback that
                                                    combining multiple criteria into a single
                                                    objective function is not always intuitive to
                                                    the end-user, while the second requires a
                                                    priori knowledge about the result of the first
                                                    criteria scheduling result
 8    ISJGC08    A Distributed Protocol to Serve We propose a distributed overlay               2010
                 Dynamic Groups For Peer-to-Peer framework for dynamic groups where users
                 Streaming                       may frequently hop from one group to
                                                 another while the total pool of users remain
                                                 stable. SMesh first builds a relatively stable
                                                 mesh consisting of all hosts for control
                                                 messaging. The mesh supports dynamic host
                                                 joining and leaving, and will guide the
                                                 construction of delivery trees



                                      J2EE
TECHNOLOGY: J2EE
DOMAIN    : IEEE TRANSACTIONS ON J2EE

SNO    P.CODE                TITLES                                DESCRIPTION                        YEAR
 1    ISJ2EE1    Integrating Visual Saliency and  Visual saliency. From visual aspect, it is          2011
                 Consistency for Re-ranking Image obvious that salient images would be easier
                                                                                                             16


                 Search Results                   to catch users eyes and it is observed that
                                                                                                             Page




                                                  these visually salient images in the front
                                                  pages are often relevant to the users query.
      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
2   ISJ2EE2    Information Security: End User     Information security is to protect valuable    2011
               Behavior and Corporate Culture     assets. The majority of information security
               (Employee Information              specialists believe that promoting good end
               Management System)                 user behavior and constraining bad end user
                                                  behavior is an important component of an
                                                  effective ISMS. Implementing effective
                                                  information security involves understanding
                                                  security-related risk, then developing and
                                                  implementing appropriate controls.
3   ISJ2EE3    Matching Estimates of the Effect    We compare the use of OLS regression and      2011
               of College Attendance on           propensity score matching methods, and
               Individual Income                  incorporate the role of ldquo common
                                                  support .rdquo Using data from the CHFLS
                                                  Survey, we estimate career outcomes.
4   ISJ2EE4    Attention modeling for video       Overall quality of a distorted video is a   2011
               quality assessment: balancing      weighted average between the global quality
               global quality and local quality   and the local quality. The proposed video
                                                  quality modeling algorithm can improve the
                                                  performance of image quality metrics on
                                                  video quality assessment compared to the
                                                  normal averaged spatiotemporal pooling.
5   ISJ2EE5    Movie summarization based on       Visual saliency is measured by means of a       2011
               audiovisual saliency detection     spatiotemporal attention model driven by
                                                  various feature cues (intensity, color,
                                                  motion). Audio and video curves are
                                                  integrated in a single attention curve, where
                                                  events may be enhanced. The presence of
                                                  salient events is signified on this audiovisual
                                                  curve by geometrical features such as local
                                                  extreme, sharp transition points & level sets.
6   ISJ2EE6    Research on B2B E-Business         The model to B2B E-Business System of          2010
               System of Bookshop Based on        Bookshop, which includes the management
               Web Service                        subsystem of order, book information,
                                                  bookshop information, bill information, and
                                                  customer relations.

                                                                                                         17
                                                                                                         Page




    #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                     Mail: irisprojects@yahoo.com website: www.irisprojects.com,
       Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions

                             DOTNET
TECHNOLOGY: DOTNET
DOMAIN    : IEEE TRANSACTIONS ON NETWORKING

SNO    P.CODE                TITLES                              DESCRIPTION                       YEAR
 1    ISDNW01 Towards Realizable, Low-Cost         In this project, popular broadcast scheduling   2011
              Broadcast Systems for Dynamic        approaches are tested from an
              Environments                         implementation cost aspect, and the results
                                                   render them only conditionally realizable.
 2    ISDNW02 Research on cloud computing          A traditional method of using load balancing 2011
              application in the peer-to-peer      and multiple buffer servers we found that
              based video–on-demand systems        the performance of Hadoop framework was
                                                   improved significantly in feasibility and
                                                   efficiency when dealing with large data.
 3    ISDNW03 A Secure Communication Game          A four terminal network with a source, a      2011
              with a Relay Helping the             destination, an eavesdropper and a jammer
              Eavesdropper                         relay is investigated. The source and the
                                                   jammer relay have conflicting interests. This
                                                   problem is formulated as a non-cooperative
                                                   two-player zero sum continuous game. Two
                                                   cases are studied: 1) the jammer relay does
                                                   not hear the source, and 2) the jammer relay
                                                   is given the source signal causally.
 4    ISDNW04 Optical Layer Security in Fiber-     Our goal is the security threats in an optical   2011
              Optic Networks                       network as well as present several existing
                                                   optical techniques to improve the security. In
                                                   the first part of this paper, we discuss various
                                                   types of security threats that could appear in
                                                   the optical layer of an optical network,
                                                   including jamming, physical infrastructure
                                                   attacks, eavesdropping and interception.
 5    ISDNW05 Model-Based Identification of        A novel model-based approach for dominant 2011
              Dominant Congested Links             congested link identification that is based on
                                                   interpreting probe loss as an unobserved
                                                   (virtual) delay. We develop parameter
                                                   inference algorithms for hidden Markov
                                                   model (HMM) and Markov model with a
                                                                                                           18


                                                   hidden dimension (MMHD) to infer this
                                                   virtual delay.
                                                                                                           Page




      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
6    ISDNW06 Live Streaming With Receiver-        Packet traces are collected from a single or a 2011
             Based Peer-Division                  limited number of measurement points, to
             Multiplexing                         infer various properties of traffic on the
                                                  control and data planes. Although such
                                                  studies are useful to compare different
                                                  systems from the end-user's perspective, it is
                                                  difficult to intuitively understand the
                                                  observed properties without fully reverse-
                                                  engineering the underlying systems.
7    ISDNW07 Adjacent Link Failure                Being reported as the most general            2011
             Localization With Monitoring         monitoring structure for out-of-band failure
             Trails in All-Optical Mesh           localization approach, the monitoring trail
             Networks                             (m-trail) framework has been witnessed with
                                                  great efficiency and promises to serve in the
                                                  future Internet backbone with all-optical
                                                  mesh wavelength division multiplex
                                                  (WDM) networks.
8    ISDNW08 Predictive Resource Management       The monitoring system preserves a high           2011
             of Multiple Monitoring               degree of flexibility, increasing the range of
             Applications                         applications and network scenarios where it
                                                  can be used. We implemented our load-
                                                  shedding-based resource management
                                                  scheme in an existing network monitoring
                                                  system and deployed it in a large research
                                                  and educational network.
9    ISDNW09 Active Monitoring and Alarm          It focuses the error locations (Localization)    2010
             Management for Fault                 which is occurring on the Optical Networks
             Localization in Transparent All-     and when we monitoring the fault
             Optical Networks                     localization, we arrange the alarm to make
                                                  active the users.
10   ISDNW10 Logoot-Undo: Distributed             This project presents the Logoot-Undo            2010
             Collaborative Editing System on      Commutative Replicated Data Type
             P2P Networks                         algorithm, which integrates the ―undo
                                                  anywhere, anytime‖ feature on the
                                                  replicated data‘s in peer to peer network for
                                                  reducing the cost of undo feature.
11   ISDNW11 Multiuser Diversity Gain in          An large cognitive networks granted              2010
             Cognitive Networks                   concurrent spectrum access with license-
                                                  holding users and Dynamic allocation of
                                                  resources to the best link in multiuser n/w.
12   ISDNW12 Correlation-Based Traffic            This paper proposes attacks that exploit the     2010
                                                                                                          19


             Analysis Attacks on Anonymity        timing behavior and applications in low-
             Networks                             latency Anonymity networks.
                                                                                                          Page




     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
13   ISDNW13 Optimal Resource Placement in    This Paper proposes an optimal resource            2010
             Structured Peer-to-Peer Networks (replica or link) placement strategy, which
                                              can optimally trade off the performance gain
                                              and paid cost in Peer-to-Peer Networks
14   ISDNW14 SocioNet: A Social-Based             This paper proposes SocioNet, based on the     2010
             Multimedia Access System for         relationship form social network and share
             Unstructured P2P Networks            contents by preference. Sharing takes place in
                                                  3 ways such as regular, small world, random.
15   ISDNW15 Load Balancing for Parallel          A communication-aware load- balancing          2010
             Applications on Group Of             technique that is capable of improving the
             Systems                              performance of communication-intensive
                                                  applications by increasing the effective
                                                  utilization of networks in cluster
                                                  environments. We introduce a behavior
                                                  model for parallel applications with large
                                                  requirements of network, CPU, memory,
                                                  and disk I/O resources.
16   ISDNW16 Cache Maintenance over Wireless The efficiency of data access in caching            2010
             Ad Hoc Networks                 systems largely depends on the cost for
                                             maintaining cache consistency, which can
                                             be high in wireless ad hoc networks due to
                                             network dynamism. In this paper, we
                                             propose a general consistency model called
                                             Probabilistic Delta Consistency (PDC),
                                             which integrates the flexibility granted by
                                             existing consistency models, covering them
                                             as special cases.
17   ISDNW17 Any Cast Based Packet                We are interested in minimizing the delay     2010
             Forwarding Scheme For MDML           and maximizing the lifetime of event-driven
                                                  wireless sensor networks for which events
                                                  occur infrequently. Sleep–wake scheduling
                                                  could result in substantial delays because a
                                                  transmitting node needs to wait for its next-
                                                  hop relay node to wake up. To reduce delays
                                                  we use ―any cast‖-based packet forwarding
                                                  schemes.
18   ISDNW18 Sharing Memory between               This system protecting shared memory from      2009
             Byzantine Processes Using            the unauthorized node in Network by fine-
             Policy-Enforced Tulle Spaces         grained access policies and it will Transfer
                                                  the data‘s in a network using byzantine
                                                  process.
                                                                                                        20
                                                                                                        Page




     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
TECHNOLOGY: DOTNET
DOMAIN    : IEEE TRANSACTIONS ON NETWORK SECURITY

SNO    P.CODE                 TITLES                             DESCRIPTION                       YEAR
 1    ISDNS01 A Generic Framework for Three-       A well designed three-factor authentication     2011
              Factor Authentication: Preserving    protocol can greatly improve the
              Security and Privacy in              information assurance in distributed
              Distributed Systems                  systems. Three-factor authentication is
                                                   introduced to incorporate the advantages of
                                                   the authentication based on password,
                                                   smart-card and biometrics.
 2    ISDNS02 Deadlock-Free Adaptive Routing       A new deadlock-free adaptive routing            2011
              in Meshes with Fault-Tolerance       algorithm for meshes was proposed for 3D
              Ability Based on Channel             meshes based on a new virtual network
              Overlapping                          partitioning scheme called channel
                                                   overlapping. The proposed deadlock-free
                                                   adaptive routing algorithm was extended to
                                                   a deadlock-free adaptive fault tolerant
                                                   routing algorithm in 3D meshes with the
                                                   same deadlock avoidance technique which
                                                   can outperform other previous methods.
 3    ISDNS03 RITAS: Services for Randomized       A stack of randomized intrusion-tolerant        2011
              Intrusion Tolerance                  protocols is described and its performance
                                                   evaluated under several settings in both
                                                   LAN and wide-area-network environments.
                                                   The stack provides a set of relevant services
                                                   ranging from basic communication
                                                   primitives up to atomic broadcast.
 4    ISDNS04 Online Intrusion Alert               Alert aggregation is an important subtask of    2011
              Aggregation with Generative          intrusion detection. The goal is to identify
              Data Stream Modeling                 and to cluster different alerts—produced by
                                                   low-level intrusion detection systems,
                                                   firewalls, etc.—belonging to a specific
                                                   attack instance which has been initiated by
                                                   an attacker at a certain point in time.
 5    ISDNS05 Replica Placement for Route          Distributed hash tables share storage and       2011
              Diversity in Tree-Based Routing      routing responsibility among all nodes in a
              Distributed Hash Tables              peer-to-peer network. These networks have
                                                   bounded path length unlike unstructured
                                                   networks. The impact of Max Disjoint on
                                                                                                          21


                                                   routing robustness compared to other
                                                                                                          Page




                                                   placements when nodes are compromised at
                                                   random or in a contiguous run.
      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
6    ISDNS06 Prime: Byzantine Replication         This project demonstrates the extent of          2011
             under Attack                         performance degradation possible in some
                                                  existing protocols that do satisfy liveness
                                                  and that do perform well absent Byzantine
                                                  faults. We propose a new performance
                                                  oriented Correctness criterion that requires a
                                                  consistent level of performance, even with
                                                  Byzantine faults.
7    ISDNS07 Nymble: Blocking Misbehaving         Anonymizing networks such as Tor allow           2011
             Users in Anonymzing Networks         users to access Internet services privately by
                                                  using a series of routers to hide the client's
                                                  IP address from the server. Nymble, a
                                                  system in which servers can ―blacklist‖
                                                  misbehaving users, there by blocking users
                                                  without compromising their anonymity.
8    ISDNS08 Dynamics of Malware Spread in        We formulate an analytical model to        2011
             Decentralized Peer-to-Peer           characterize the spread of malware in
             Networks                             decentralized, Gnutella type peer-to-peer
                                                  (P2P) networks and study the dynamics
                                                  associated with the spread of malware.
                                                  Using a compartmental model, we derive the
                                                  system parameters or network conditions
                                                  under which the P2P network may reach a
                                                  malware free equilibrium.
9    ISDNS09 Improving Security and                We propose a novel Cipher text policy           2011
             Efficiency in Attribute-Based        attribute-based encryption (CP-ABE)
             Data Sharing                         scheme for a data sharing system by
                                                  exploiting the characteristic of the system
                                                  architecture. The proposed scheme
                                                  achievements:1) The key escrow problem
                                                  could be solved by escrow-free key issuing
                                                  protocol.2) Fine-grained user revocation per
                                                  each attribute could be done by proxy
                                                  encryption which takes advantage of the
                                                  selective attribute group key distribution on
                                                  top of the ABE.
10   ISDNS10 Using Web-Referral                   We systematically design a security-driven       2010
             Architectures to Mitigate Denial-    scheduling architecture that can dynamically
             of-Service Threats                   measure the trust level of each node in the
                                                  system by using differential equations
11   ISDNS11 Against Flooding Attacks Using       In recent years, a number of puzzle-based        2010
                                                                                                          22


             Game Theory based Puzzle             defense mechanisms have been proposed
             Approach                             against flooding denial-of-service (DoS)
                                                                                                          Page




                                                  attacks in networks. This paper utilizes
     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
                                                   game theory to propose a series of optimal
                                                   puzzle-based strategies for handling
                                                   increasingly sophisticated flooding attack
                                                   scenarios



TECHNOLOGY: DOTNET
DOMAIN    : IEEE TRANSACTIONS ON DATAMINING

SNO    P. CODE          PROJECT TITLES                           DESCRIPTION                      YEAR
 1    ISDDM01 Mining Group Movement                Encryption and multiplexing technique not   2011
              Patterns for Tracking Moving         only enhances the security of confidential
              Objects Efficiently                  fingerprint information by making the
                                                   information inaccessible to any intruder
                                                   having a random code, but also improves the
                                                   system resource utilization by reducing the
                                                   storage and/or transmission bandwidth
                                                   requirement
 2    ISDDM02 Mining Iterative Generators and  We introduce a novel concept of                    2011
              Representative Rules for         representative rules expressing forward,
              Software Specification Discovery backward, and in-between temporal
                                               constraints. These rules characterize many
                                               real-world constraints including those found
                                               in software specifications and can be
                                               constructed by pairing iterative generators
                                               with closed iterative patterns.
 3    ISDDM03 On Computing Farthest                The concept of Data mining such as NN and      2011
              Dominated Locations                  closest Pair is used. Based on the client‘s
                                                   query, the database will be giving the
                                                   nearest datasets and by the using Closest-
                                                   Pair concept, we can point the object (data)
                                                   location and neglect spatial location.
 4    ISDDM04 Efficient Relevance Feedback for     We propose a novel method NPRF to             2011
              Content-Based Image Retrieval        achieve the high efficiency and effectiveness
              by Mining User Navigation            of CBIR in coping with the large-scale
              Patterns                             image data. In terms of efficiency, the
                                                   iterations of feedback are reduced
                                                   substantially by using the navigation
                                                   patterns discovered from the user query log.
                                                   Our proposed search use three kinds of
                                                   query refinement strategies QPM, QR and
                                                                                                         23


                                                   QEX to converge the search space toward
                                                                                                         Page




                                                   the user‘s intention effectively.

      #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                       Mail: irisprojects@yahoo.com website: www.irisprojects.com,
         Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                  Chennai, Nellai, Salem, Erode, Madurai
Iris Solutions
5    ISDDM05 Authenticated Multistep NN           We are using NN concept to provide              2011
             Nearest Neighbor Search              similarity search results with trustiness to
                                                  proof the result correctness. A client gives
                                                  NN queries to a server that maintains a
                                                  database signed by a trusted authority.
6    ISDDM06 Missing Value Estimation for         Missing data imputation aims at providing   2011
             Mixed-Attribute Data Sets            estimations for missing values by reasoning
                                                  from observed data. Missing data imputation
                                                  is a key issue in learning from incomplete
                                                  data. Various techniques have been
                                                  developed with great successes on dealing
                                                  with missing values in data sets with
                                                  homogeneous attributes.
7    ISDDM07 Extended XML Tree Pattern            We research a large set of XML tree pattern,    2011
             Matching: Theories and               called extended XML tree pattern, which
             Algorithms                           may include P-C, A-D relationships,
                                                  negation functions, wildcards, and order
                                                  restriction. We establish a theoretical
                                                  framework about ―matching cross‖ which
                                                  demonstrates the intrinsic reason in the
                                                  proof of optimality on holistic algorithms.
8    ISDDM08 Bridging Domains Using World         A novel transfer learning approach, called      2010
             Wide Knowledge for Transfer          BIG (Bridging information Gap), to
             Learning                             effectively extract useful knowledge in a
                                                  worldwide knowledge base.
9    ISDDM09 Closing the Loop in Webpage          This project focuses on the concept of          2010
             Understanding                        information extraction is processing from a
                                                  web page and its content.
10   ISDDM10 Knowledge-Based Interactive          This paper proposes a new interactive           2010
             Post mining of Association Rules     approach to prune and filter discovered
             Using Ontologies                     rules.1) Integration of user knowledge in the
                                                  post processing task. 2) The Rule Schema
                                                  formalism extending the specification
                                                  language for user expectations
11   ISDDM11 Filtering Data flow for              Query tolerance is expressed as a numerical     2010
             Continuous Queries                   value, which may be difficult to specify. We
                                                  observe that in many situations, users may
                                                  not be concerned with the actual value of an
                                                  answer, but rather which object satisfies a
                                                  query. In this paper We develop fraction-
                                                  based tolerance for two major classes of
                                                                                                         24


                                                  entity-based queries
                                                                                                         Page




     #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816
                      Mail: irisprojects@yahoo.com website: www.irisprojects.com,
        Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357
                                 Chennai, Nellai, Salem, Erode, Madurai
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf
IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Kürzlich hochgeladen (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Empfohlen

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Empfohlen (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

IEEE 2011 Projects, Final Year IEEE 2011 12 software titles, JAVA J2EE, DOTNET Best Project Titles @ Iris Solutions, Coimbatore, Trichy, Thanjavur .pdf

  • 1. Iris Solutions Titles For ME / M.Tech, BE / B.Tech, M.Sc, MCA TABLE OF CONTENTS ABOUT IRIS 2 JAVA IEEE TRANSACTIONS ON NETWORKING 3 IEEE TRANSACTIONS ON NETWORK SECURITY 6 IEEE TRANSACTIONS ON DATA MINING 9 IEEE TRANSACTIONS ON MOBILE COMPUTING 11 IEEE TRANSACTIONS ON IMAGE PROCESSING 13 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 14 IEEE TRANSACTIONS ON GRID & CLOUD COMPUTING 15 IEEE TRANSACTIONS ON J2EE 16 DOTNET IEEE TRANSACTIONS ON NETWORKING 18 IEEE TRANSACTIONS ON NETWORK SECURITY 21 IEEE TRANSACTIONS ON DATA MINING 23 IEEE TRANSACTIONS ON MOBILE COMPUTING 25 IEEE TRANSACTIONS ON IMAGE PROCESSING 28 IEEE TRANSACTIONS ON GRID & CLOUD COMPUTING 29 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 31 1 Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 2. Iris Solutions About Iris "Iris Solutions - A Boon for Young Technocrats" Global presence of technocrats is no more a dream in this world. We make it possible by ensuring all the quality standards within an individual which has to be the identity of a successful technocrat. Irrespective of the technologies and the domain in which a particular project gets shaped, we support all kind of student needs in terms of monetary values as well as the time factor. Students apart from doing a particular project should know how the project is getting shaped. We are aware in making this thing to happen. Research and Development plays a vital role in enhancing one‘s self development in terms of up gradation and moving forward. When you are searching for a good channel to inhibit yourself with such a platform, IRIS comes handy. Apart from providing simulation based training, we also provide industrial experts in sharing their valuable suggestions and even Industry oriented training at required cases. In short we strive hard to fulfill the student requirements in terms of each and every department of the developing their skills. 2 Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 3. Iris Solutions JAVA TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON NETWORKING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJNW01 Self-Reconfigurable Wireless In this project, ARS outperforms existing 2011 Mesh Networks failure-recovery schemes in improving channel-efficiency by more than 90% and in the ability of meeting the application bandwidth demands. Multihop wireless mesh networks experience frequent link failures caused by channel interference. 2 ISJNW02 Delay-Optimal Opportunistic In this project, the design of multiuser 2011 Scheduling and Approximations opportunistic packet schedulers for users sharing a time-varying wireless channel from performance and robustness points of view. Markov decision process framework used to compute and characterize mean- delay-optimal scheduling policies. 3 ISJNW03 Adaptive Fault-Tolerant QoS Use of fault tolerance mechanisms through 2011 Control Algorithms for redundancy improves query reliability in the Maximizing System Lifetime of presence of unreliable wireless Query-Based Wireless Sensor communication and sensor faults; it cause Networks the energy of the system to be quickly depleted. 4 ISJNW04 Optimizing Resource Conflicts in The two factors are formulated in a matrix 2011 Workflow Management Systems form and the optimal solution is found by applying concepts of the generalized eigenvalue analysis. A rough outline of an agent-based architecture is proposed to achieve runtime integration of our algorithm into a functional WfMS. 5 ISJNW05 Predictable high performance In this project we present a design and 2011 Computing using Feedback and implementation of a predictable HPC admission control system using feedback control and admission control. By creating a virtualized 3 application layer and opportunistically Page multiplexing is the concurrent application. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 4. Iris Solutions 6 ISJNW06 Attribute-Based Access Control A cryptographic approach to enforce a fine- 2011 with Efficient Revocation in Data grained access control on the outsourced Outsourcing Systems data that is dual encryption protocol exploiting the combined features of the cipher text policy attribute-based encryption and group key management algorithm. 7 ISJNW07 Load Balance with Imperfect A novel load balancing algorithm that is 2011 Information in Structured Peer-to- unique in that each participating peer is Peer Systems based on the partial knowledge of the system to estimate the probability distributions of the capacities of peers and the loads of virtual servers, resulting in imperfect knowledge of the system state. 8 ISJNW08 A Distributed Algorithm for A distributed algorithm used for computing 2011 Finding All Best Swap Edges of a all best swap edges for a minimum-diameter Minimum-Diameter Spanning spanning tree. The best possible way of Tree reconnecting the network is to replace the failed link by a single other link called a swap link. A swap that minimizes the diameter of the resulting swap tree. 9 ISJNW09 Decomposing Workload Bursts We present a new framework for runtime 2011 for Efficient Storage Resource scheduling of a client‘s workload based on Management decomposition and recombination of the request stream. Finally, we show how the framework can be used to improve estimates of the aggregate resource requirements of multiple concurrent clients. 10 ISJNW10 Monitoring The Impact Of P2P We present an classification for broadband 2011 Users On A Broadband users into a P2P and non-P2P group based Operator‘s Network Over time on the amount of communication partners (―peers‖) they in a dedicated timeframe. We derive their impact on network characteristics like the number of active users and their aggregate bandwidth. 11 ISJNW11 Metadata Distribution and This paper makes two contributions. First, 2011 Consistency Techniques for we present a dynamic metadata distribution Large-Scale Cluster File Systems policy (DDG) to improve the metadata throughput by using a triple-defined distribution. Second, S2PC-MP reduces the overhead of failure-free execution and ensures quick recovery in the presence of metadata server failures or client failures. 4 12 ISJNW12 Flexible Robust Group Key A novel 2-round GKA protocol that offers a 2011 Page Agreement natural trade-off between message size and #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 5. Iris Solutions the desired level of fault tolerance. The new protocol is also the disruption attack by the malicious insider. 13 ISJNW13 Site-Based Partitioning And The pagerank algorithm is an important 2011 Repartitioning Techniques For component. The pagerank computation Parallel Page Rank Computation which is frequently repeated must be performed in parallel with high-efficiency and low-preprocessing overhead while considering the initial distributed nature of the web matrices. 14 ISJNW14 Stabilization of Flood Sequencing In this project we discuss a family of four 2010 Protocols in Sensor Networks flood sequencing protocols that use sequence numbers to distinguish between fresh and redundant flood messages. 15 ISJNW15 A Near-Optimal Algorithm In this project, we propose a novel topology 2010 Attacking the Topology Mismatch matching algorithm based on the Problem in Unstructured Peer-to- Metropolis-Hastings method. Our proposal Peer Networks. is guided by our insight analytical model and is close to the optimal design. 16 ISJNW16 A Dynamic Performance-Based A protocol, Performance Adaptive UDP 2010 Flow Control Method for High- which aims to dynamically and Speed Data Transfer autonomously maximize performance under different systems. A mathematical model and related algorithms are proposed to describe the theoretical basis behind effective buffer and CPU management. 17 ISJNW17 Priority of packet inference with We present an end-to-end approach for PFP 2010 back up path inference and its associated tool, POPI which enables users to discover such network policies through measurements of packet losses of different packet types. 18 ISJNW18 On the Benefits of Cooperative Cooperative Cache can improve the system 2010 Proxy Caching for Peer-to-Peer performance in wireless P2P networks. We Traffic propose a novel asymmetric cooperative cache approach, where the data requests are transmitted to the cache layer on every node. 5 Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 6. Iris Solutions TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJNS01 SAT: A Security Architecture In this project, we propose SAT, a security 2011 Achieving Anonymity and architecture mainly consisting resolves the Traceability in Wireless Mesh conflicting security requirements of Networks unconditional anonymity for honest users and traceability of misbehaving users. 2 ISJNS02 Peering Equilibrium Multipath Our scheme relies on a game theory 2011 Routing: A Game Theory modeling, with a non-cooperative potential Framework for Internet Peering game considering both routing and Settlements congestions costs. We compare different PEMP policies to BGP Multipath schemes by emulating a realistic peering scenario. Our results show that the routing cost can be decreased by roughly 10% with PEMP. The stability of routes can be significantly improved and that congestion can be practically avoided on the peering links. 3 ISJNS03 An Obfuscation-Based Approach We address this problem and present a 2011 for Protecting Location Privacy solution based on different obfuscation operators introduce an adversary model and provide an analysis of the proposed obfuscation operators to evaluate their robustness against adversaries aiming to reverse the obfuscation effects to retrieve a location that better approximates the location of the users 4 ISJNS04 Providing Transaction Guarantees Aims to demonstrate that randomization can 2011 in Asynchronous Systems with be a very competitive approach even in No Assumptions on the Accuracy hostile environments where arbitrary faults of Failure Detection can occur. A stack of randomized intrusion- tolerant protocols is described and its performance evaluated under several settings in both local-area-network and wide-area- network environments. The stack provides a set of relevant services ranging from basic. 5 ISJNS05 Modeling and Detection of Our scheme uses the Power Spectral 2011 Camouflaging Worm Density (PSD) distribution of the scan traffic volume and its corresponding 6 Spectral Flatness Measure (SFM) to Page distinguish the C-Worm traffic from #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 7. Iris Solutions background traffic. The performance data clearly demonstrates that our scheme can effectively detect the C-Worm propagation. 6 ISJNS06 Analysis of a Botnet Takeover We present the design of an advanced 2011 hybrid peer-to-peer botnet. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides individualized encryption and control traffic dispersion. 7 ISJNS07 Efficient Network Modification to As real-time traffic such as video or voice 2011 Improve QoS Stability at Failures increases on the Internet, ISPs are required to provide stable quality as well as connectivity at failures. For ISPs, how to effectively improve the stability of these qualities at failures with the minimum investment cost is an important issue, and they need to effectively select a limited number of locations to add link facilities. 8 ISJNS08 Comparative Evaluation of 1) Formalizing the problem of spoofed 2011 Spoofing Defenses traffic filtering and defining novel effectiveness measures, 2) observing each defense as selfish or altruistic and differentiating their performance goals, 3) defining optimal core deployment points for defenses that need core support, and 4) evaluating all defenses in a common and realistic setting. 9 ISJNS09 Traceback of DDoS Attacks We categorize packets that are passing 2011 Using Entropy Variations through a router into flows, which are defined by the upstream router where a packet came from, and the destination address of the packet. In this project, we use flow entropy variation or entropy variation interchangeably. 10 ISJNS10 Weak State Routing for Large- Weak State Routing (WSR) is a novel 2010 Scale Dynamic Networks routing protocol that uses weak state along with random directional walks for forwarding packets. When a packet reaches a node that contains a weak state about the destination with higher confidence than that held by the packet, the walk direction is biased. The packet reaches the destination 7 via a sequence of directional walks, Page punctuated by biasing decisions. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 8. Iris Solutions 11 ISJNS11 On the Quality of Service of Estimating the parameters of the failure 2010 Crash-Recovery Failure Detectors detector to achieve a required QoS to configuring the crash-recovery failure detector. We investigate the impact of the dependability of the monitored process on the QoS of our failure detector 12 ISJNS12 An Advanced Hybrid Peer-to- Compared with current botnets, the 2010 Peer Botnet proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. 13 ISJNS13 Authenticated Group Key Key transfer protocols rely on a mutually 2010 Transfer Protocol Based on Secret trusted key generation center (KGC) to Sharing select session keys and transport session keys to all communication entities secretly. In this paper, we propose an authenticated key transfer protocol based on secret sharing scheme that KC can broadcast group key information to all group members at once and only authorized group members can recover the group key. 14 ISJNS14 Secure Data Replication in Data Secret sharing with cryptography 2010 Grid approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical information. specifically, we investigate the problem of optimal allocation of sensitive data objects that are partitioned by using secret sharing scheme or erasure coding scheme and/or replicated. We develop two heuristic algorithms for the two sub problems. 15 ISJNS15 Providing Witness Anonymity We introduce the concept of witness 2010 Under Peer-to-Peer Settings anonymity for peer-to-peer systems, as well as other systems with the peer-to-peer nature. We propose the Secure Deep Throat (SDT) protocol to provide anonymity for the witnesses of malicious or selfish behavior to enable such peers to report on this behavior without fear of retaliation. 8 Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 9. Iris Solutions TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON DATA MINING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJDM01 Effective Navigation of Query Ranking and categorization, which can also 2011 Results Based on Concept be combined, have been proposed to Hierarchies alleviate this information overload problem. Results categorization for biomedical databases is the focus of this work. A natural way to organize biomedical citations is according to their MeSH annotations. 2 ISJDM02 Automatic Discovery of Personal We propose a novel, automatically extracted 2011 Name Aliases from the Web lexical pattern-based approach to efficiently extract a large set of candidate aliases from snippets retrieved from a web search engine. We define numerous ranking scores to evaluate candidate aliases using three approaches: lexical pattern frequency, word co-occurrences in an anchor text graph, and page counts on the web. 3 ISJDM03 An Efficient Index for Geographic Given a geographic query that is composed 2011 of query keywords and a location, a geographic search engine retrieves documents that are the most textually and spatially relevant to the query keywords and the location, respectively, and ranks the retrieved documents according to their joint textual and spatial relevances to the query. 4 ISJDM04 Anonymous Publication of The problem of anonymizing sparse, high 2011 Sensitive Transactional Data dimensional transactional data is solved through methods based on 1) local NN- search and 2) global data reorganization. 5 ISJDM05 Efficient Periodicity Mining in A time series is a collection of data values 2011 Time Series Databases Using gathered generally at uniform interval of Suffix Trees time to reflect certain behavior of an entity. Real life has several examples of time series such as stock growth, transactions in a superstore. A time series is mostly characterized by being composed of repeating cycles. 9 6 ISJDM06 Mining Iterative Generators and The iterative pattern mining which outputs 2011 Page Representative Rules for Software patterns that are repeated frequently within a #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 10. Iris Solutions Specification Discovery program trace, or across multiple traces, or both. Frequent iterative patterns reflect frequent program behaviors that likely correspond to software specifications. 7 ISJDM07 Mining Web Graphs for The recommender systems are based on 2011 Recommendations Collaborative Filtering which is a technique that automatically predicts the interest of an active user by collecting rating information from other similar users or items 8 ISJDM08 Managing Multidimensional A P2P-based framework supporting the 2010 Historical Aggregate Data in extraction of aggregates from historical Unstructured P2P Networks multidimensional data is proposed, which provides efficient and robust query evaluation 9 ISJDM09 Multimodal Fusion for Video In this project, we present a flexible and 2010 Search Reranking effective reranking method, called CR- Reranking, to improve the retrieval effectiveness. Specifically, multimodal features are first utilized separately to rerank the initial returned results at the cluster level, and then all the ranked clusters from different modalities are cooperatively used to infer the shots with high relevance. 10 ISJDM10 Prospective Infectious Disease We considered the problem of identifying 2010 Outbreak Detection Using outbreak patterns in a syndrome count time Markov Switching Models series using Markov switching models. The disease outbreak states are modeled as hidden state variables which control the observed time series. 11 ISJDM11 LIGHT: A Query-Efficient yet LIGHT weight Hash Tree (LIGHT)—a 2010 Low-Maintenance Indexing query-efficient yet low-maintenance Scheme over DHTs indexing scheme. LIGHT employs a novel naming mechanism and a tree summarization strategy for graceful distribution of its index structure. We show through analysis that it can support various complex queries with near-optimal performance. 12 ISJDM12 Deriving Concept-Based User User profiling is a fundamental component 2010 Profiles from Search Engine Logs of any personalization applications. We evaluate the proposed methods against our previously proposed personalized query clustering method. Experimental results 10 show that profiles which capture and utilize both of the user‘s positive and negative Page preferences perform the best. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 11. Iris Solutions TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON MOBILE COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJMC01 Design and Performance Analysis Here we develop two per-user-based 2011 of Mobility Management mobility management schemes for WMNs, Schemes Based on Pointer namely, the static anchor scheme and Forwarding for Wireless Mesh dynamic anchor scheme. Both schemes are Networks based on pointer forwarding. The optimal threshold of the forwarding chain length is determined for each individual mesh client dynamically based on the mesh client‘s specific mobility and service patterns. 2 ISJMC02 Dynamic Conflict-Free DCQS, a novel transmission scheduling 2011 Transmission Scheduling for technique specifically designed for query Sensor Network Queries services in wireless sensor networks. DCQS features a planner and a scheduler. The planner reduces query latency by constructing transmission plans based on the precedence constraints in in-network aggregation. The scheduler improves throughput by overlapping the transmissions of multiple query instances concurrently while enforcing a conflict-free schedule. 3 ISJMC03 Multipath Routing and Max-Min Ensure QoS, an interference-aware max-min 2011 Fair QoS Provisioning under fair bandwidth allocation algorithm, Interference Constraints in proposed where multiple paths (determined Wireless Multihop Networks by using the routing metric) coexist for each user to the base station succeed in improving network performance in terms of delay, packet loss ratio, and bandwidth usage. 4 ISJMC04 Detection of Selfish Manipulation CCA tuning can be exploited by selfish 2011 of Carrier Sensing in 802.11 nodes to obtain an unfair share of the Networks available bandwidth. Specifically, a selfish entity can manipulate the CCA threshold to ignore ongoing transmissions; this increases the probability of accessing the medium and provides the entity a higher, unfair share of the bandwidth. 5 ISJMC05 Message-Efficient Location A better prediction model can significantly 2011 11 Prediction for Mobile Objects in reduce power consumption in a wireless Wireless Sensor Networks Using a sensor network because fewer redundant Page Maximum Likelihood Technique sensors will be activated to keep monitoring #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 12. Iris Solutions the object. The Gauss-Markov mobility model is best mobility models to describe object trajectory because it can capture the correlation of object velocity in time. 6 ISJMC06 Throughput-Lifetime Trade-Offs Operating a multi hop wireless network 2011 in Multi hop Wireless Networks while achieving both high throughput and under an SINR-Based high lifetime is a highly desirable design Interference Model goal. 7 ISJMC07 Efficient Load-AwareRouting A cluster head estimates traffic load in its 2010 Scheme For Wireless Mesh cluster. As the estimated load gets higher, networks the cluster head increases the routing metrics of the routes passing through the cluster. Based on the routing metrics, user traffic takes a detour to avoid overloaded areas and, as a result, the WMN achieves global load balancing 8 ISJMC08 Secure Data Collection in We generate randomized multipath routes, 2010 Wireless Sensor Networks Using the routes taken by the ―shares‖ of different Randomized Dispersive Routes packets change over time. The routing algorithm becomes known to the adversary, the adversary still cannot pinpoint the routes traversed by each packet. Besides randomness, the generated routes are also highly dispersive and energy efficient, making them quite capable of circumventing black holes. 9 ISJMC09 VEBEK: Virtual Energy-Based We introduce an energy-efficient VEBEK 2010 Encryption and Keying for scheme for WSNs that significantly reduces Wireless Sensor Networks the number of transmissions needed for rekeying to avoid stale keys. In addition to the goal of saving energy, minimal transmission is imperative for some military applications of WSNs where an adversary could be monitoring the wireless spectrum 10 ISDMC10 MABS: Multicast Authentication MABS, includes two schemes. The basic 2010 Based on Batch Signature scheme (MABS-B) eliminates the correlation among packets and thus provides the perfect resilience to packet loss, and it is also efficient in terms of latency, computation, and communication overhead due to an efficient cryptographic 12 primitive called batch signature, which supports the authentication of any number Page of packets simultaneously. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 13. Iris Solutions TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON IMAGE PROCESSING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJIP01 Efficient Relevance Feedback Content-based image retrieval (CBIR) is the 2011 mainstay of image retrieval systems. Relevance feedback techniques were incorporated into CBIR such that more precise results can be obtained by taking user‘s Feedbacks into account. 2 ISJIP02 High-quality Reflection Deal with a problem of separating the effect 2011 Separation using Polarized Images of reflection from images captured behind glass. The input consists of multiple polarized images captured from the same view point but with different polarizer angles. The output is the high quality separation of the reflection layer and the background layer from the images. 3 ISJIP03 Active Learning for Solving the The result on the face recognition database 2011 Incomplete Data Problem in and palm print palm vein database showed Facial Age Classification by the that our approach can handle problems with Furthest Nearest-Neighbor large number of classes. Our contributions Criterion are twofold. 1. We proposed the FNN being our novel idea, as a generic on-line or active learning paradigm. 2. We showed that it can be another viable tool for active learning of facial age range classification. 4 ISJIP04 Practical Bounds on Image The bound was computed directly from the 2011 Denoising: From Estimation to noise-free image that was assumed to be Information available. We analyze the bounds formulation to show that these two parameters are interdependent and they, along with the bounds formulation as a whole, have a nice information-theoretic interpretation as well. 5 ISJIP05 An Affine Symmetric Image The affine symmetry is exploited between 2010 Model and Its Applications structural textures at a local level, the objective being to find the minimum residual error by estimating the affine transform relating two patches of texture. 13 Having developed a local model, the methodology is extended to the whole Page image to estimate the global affine relation. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 14. Iris Solutions TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON SOFTWARE ENGINEERING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJSE01 An Attack Surface Metric Formalize the notion of a system‘s attack 2011 surface and introduce an attack surface metric to measure the attack surface in a systematic manner. Our measurement method is agnostic to a software system‘s implementation language and is applicable to systems of all sizes. 2 ISJSE02 Genetic Algorithms for A system which uses a genetic algorithm to 2011 Randomized Unit Testing find parameters for randomized unit testing that optimize test coverage. Designing GAs is somewhat of a black art. We therefore use a feature subset selection tool to assess the size and content of the representations within the GA. 3 ISJSE03 Efficient Consistency We use behavioral profiles for the definition 2011 Measurement Based on of a formal notion of consistency which is Behavioral Profiles of Process less sensitive to model projections than Models common criteria of behavioral equivalence and allows for quantifying deviation in a metric way. The derivation of behavioral profiles and the calculation of a degree of consistency have been implemented. 4 ISJSE04 Web development Navigational We presents a general vision of NDT, 2010 Development Techniques which is an approach to deal with requirements in Web systems. It is based on conclusions obtained in several comparative studies and it tries to fill some gaps detected by the research community. 14 Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 15. Iris Solutions TECHNOLOGY: JAVA DOMAIN : IEEE TRANSACTIONS ON GRID & CLOUD COMPUTING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJGC01 Adaptive grid risk-sensitive filter Based on point-mass approximation, is 2011 for non-linear problems called the adaptive grid risk-sensitive filter. Although risk-sensitive estimators have been known to be robust compared to their risk-neutral counterparts, the implementation of risk-sensitive filters (RSFs) is almost impossible except for very trivial systems like linear Gaussian systems. 2 ISJGC02 Multicloud Deployment of We deploy a computing cluster on the top of 2011 Computing Clusters for Loosely a multicloud infrastructure, for solving Coupled MTC Applications loosely coupled Many-Task Computing applications. In this way, the cluster nodes can be provisioned with resources from different clouds to improve the cost effectiveness of the deployment, or to implement high-availability strategies. 3 ISJCC03 Enabling Public Auditability and To achieve efficient data dynamics, we 2011 Data Dynamics for Storage improve the existing proof of storage Security in Cloud Computing models by manipulating the classic Merkle Hash Tree construction for block tag authentication. To support efficient handling of multiple auditing tasks, the technique of bilinear aggregate signature to extend our main result into a multiuser setting, where TPA can perform multiple auditing tasks simultaneously. 4 ISJGC04 SOAP Processing Performance SOAP communications produce considerable 2011 and Enhancement network traffic, making them unfit for distributed, loosely coupled and heterogeneous computing environments such as the open Internet. Also, they introduce higher latency and processing delays than other technologies, like Java RMI and CORBA. WS research has recently focused on SOAP performance enhancement. 5 ISJGC05 An Improved Ant Algorithm for Finding optimal schedules for such an 2011 Grid Scheduling Problem Using environment is an NP-hard problem, and so 15 Biased Initial Ants heuristic approaches must be used. The goal of grid task scheduling is to achieve high Page system throughput and to allocate various #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 16. Iris Solutions computing resources to applications. Many different methods have been proposed to solve this problem 6 ISJGC06 Weather data sharing system: an Intelligent agents can play an important role 2011 agent-based distributed data in helping achieve the ‗data grid‘ vision. In management this study, the authors present a multi-agent- based framework to implement manage, share and query weather data in a geographical distributed environment, named weather data sharing system 7 ISJGC07 Bi-Criteria Scheduling Of Bi-criteria scheduling approaches for 2010 Scientific Grid Workflows scientific work flows are usually restricted to certain criterion pairs and require the user to define his preferences either as weights assigned each criterion or as fixed constraints defined for one criterion. The first approach has the drawback that combining multiple criteria into a single objective function is not always intuitive to the end-user, while the second requires a priori knowledge about the result of the first criteria scheduling result 8 ISJGC08 A Distributed Protocol to Serve We propose a distributed overlay 2010 Dynamic Groups For Peer-to-Peer framework for dynamic groups where users Streaming may frequently hop from one group to another while the total pool of users remain stable. SMesh first builds a relatively stable mesh consisting of all hosts for control messaging. The mesh supports dynamic host joining and leaving, and will guide the construction of delivery trees J2EE TECHNOLOGY: J2EE DOMAIN : IEEE TRANSACTIONS ON J2EE SNO P.CODE TITLES DESCRIPTION YEAR 1 ISJ2EE1 Integrating Visual Saliency and Visual saliency. From visual aspect, it is 2011 Consistency for Re-ranking Image obvious that salient images would be easier 16 Search Results to catch users eyes and it is observed that Page these visually salient images in the front pages are often relevant to the users query. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 17. Iris Solutions 2 ISJ2EE2 Information Security: End User Information security is to protect valuable 2011 Behavior and Corporate Culture assets. The majority of information security (Employee Information specialists believe that promoting good end Management System) user behavior and constraining bad end user behavior is an important component of an effective ISMS. Implementing effective information security involves understanding security-related risk, then developing and implementing appropriate controls. 3 ISJ2EE3 Matching Estimates of the Effect We compare the use of OLS regression and 2011 of College Attendance on propensity score matching methods, and Individual Income incorporate the role of ldquo common support .rdquo Using data from the CHFLS Survey, we estimate career outcomes. 4 ISJ2EE4 Attention modeling for video Overall quality of a distorted video is a 2011 quality assessment: balancing weighted average between the global quality global quality and local quality and the local quality. The proposed video quality modeling algorithm can improve the performance of image quality metrics on video quality assessment compared to the normal averaged spatiotemporal pooling. 5 ISJ2EE5 Movie summarization based on Visual saliency is measured by means of a 2011 audiovisual saliency detection spatiotemporal attention model driven by various feature cues (intensity, color, motion). Audio and video curves are integrated in a single attention curve, where events may be enhanced. The presence of salient events is signified on this audiovisual curve by geometrical features such as local extreme, sharp transition points & level sets. 6 ISJ2EE6 Research on B2B E-Business The model to B2B E-Business System of 2010 System of Bookshop Based on Bookshop, which includes the management Web Service subsystem of order, book information, bookshop information, bill information, and customer relations. 17 Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 18. Iris Solutions DOTNET TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON NETWORKING SNO P.CODE TITLES DESCRIPTION YEAR 1 ISDNW01 Towards Realizable, Low-Cost In this project, popular broadcast scheduling 2011 Broadcast Systems for Dynamic approaches are tested from an Environments implementation cost aspect, and the results render them only conditionally realizable. 2 ISDNW02 Research on cloud computing A traditional method of using load balancing 2011 application in the peer-to-peer and multiple buffer servers we found that based video–on-demand systems the performance of Hadoop framework was improved significantly in feasibility and efficiency when dealing with large data. 3 ISDNW03 A Secure Communication Game A four terminal network with a source, a 2011 with a Relay Helping the destination, an eavesdropper and a jammer Eavesdropper relay is investigated. The source and the jammer relay have conflicting interests. This problem is formulated as a non-cooperative two-player zero sum continuous game. Two cases are studied: 1) the jammer relay does not hear the source, and 2) the jammer relay is given the source signal causally. 4 ISDNW04 Optical Layer Security in Fiber- Our goal is the security threats in an optical 2011 Optic Networks network as well as present several existing optical techniques to improve the security. In the first part of this paper, we discuss various types of security threats that could appear in the optical layer of an optical network, including jamming, physical infrastructure attacks, eavesdropping and interception. 5 ISDNW05 Model-Based Identification of A novel model-based approach for dominant 2011 Dominant Congested Links congested link identification that is based on interpreting probe loss as an unobserved (virtual) delay. We develop parameter inference algorithms for hidden Markov model (HMM) and Markov model with a 18 hidden dimension (MMHD) to infer this virtual delay. Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 19. Iris Solutions 6 ISDNW06 Live Streaming With Receiver- Packet traces are collected from a single or a 2011 Based Peer-Division limited number of measurement points, to Multiplexing infer various properties of traffic on the control and data planes. Although such studies are useful to compare different systems from the end-user's perspective, it is difficult to intuitively understand the observed properties without fully reverse- engineering the underlying systems. 7 ISDNW07 Adjacent Link Failure Being reported as the most general 2011 Localization With Monitoring monitoring structure for out-of-band failure Trails in All-Optical Mesh localization approach, the monitoring trail Networks (m-trail) framework has been witnessed with great efficiency and promises to serve in the future Internet backbone with all-optical mesh wavelength division multiplex (WDM) networks. 8 ISDNW08 Predictive Resource Management The monitoring system preserves a high 2011 of Multiple Monitoring degree of flexibility, increasing the range of Applications applications and network scenarios where it can be used. We implemented our load- shedding-based resource management scheme in an existing network monitoring system and deployed it in a large research and educational network. 9 ISDNW09 Active Monitoring and Alarm It focuses the error locations (Localization) 2010 Management for Fault which is occurring on the Optical Networks Localization in Transparent All- and when we monitoring the fault Optical Networks localization, we arrange the alarm to make active the users. 10 ISDNW10 Logoot-Undo: Distributed This project presents the Logoot-Undo 2010 Collaborative Editing System on Commutative Replicated Data Type P2P Networks algorithm, which integrates the ―undo anywhere, anytime‖ feature on the replicated data‘s in peer to peer network for reducing the cost of undo feature. 11 ISDNW11 Multiuser Diversity Gain in An large cognitive networks granted 2010 Cognitive Networks concurrent spectrum access with license- holding users and Dynamic allocation of resources to the best link in multiuser n/w. 12 ISDNW12 Correlation-Based Traffic This paper proposes attacks that exploit the 2010 19 Analysis Attacks on Anonymity timing behavior and applications in low- Networks latency Anonymity networks. Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 20. Iris Solutions 13 ISDNW13 Optimal Resource Placement in This Paper proposes an optimal resource 2010 Structured Peer-to-Peer Networks (replica or link) placement strategy, which can optimally trade off the performance gain and paid cost in Peer-to-Peer Networks 14 ISDNW14 SocioNet: A Social-Based This paper proposes SocioNet, based on the 2010 Multimedia Access System for relationship form social network and share Unstructured P2P Networks contents by preference. Sharing takes place in 3 ways such as regular, small world, random. 15 ISDNW15 Load Balancing for Parallel A communication-aware load- balancing 2010 Applications on Group Of technique that is capable of improving the Systems performance of communication-intensive applications by increasing the effective utilization of networks in cluster environments. We introduce a behavior model for parallel applications with large requirements of network, CPU, memory, and disk I/O resources. 16 ISDNW16 Cache Maintenance over Wireless The efficiency of data access in caching 2010 Ad Hoc Networks systems largely depends on the cost for maintaining cache consistency, which can be high in wireless ad hoc networks due to network dynamism. In this paper, we propose a general consistency model called Probabilistic Delta Consistency (PDC), which integrates the flexibility granted by existing consistency models, covering them as special cases. 17 ISDNW17 Any Cast Based Packet We are interested in minimizing the delay 2010 Forwarding Scheme For MDML and maximizing the lifetime of event-driven wireless sensor networks for which events occur infrequently. Sleep–wake scheduling could result in substantial delays because a transmitting node needs to wait for its next- hop relay node to wake up. To reduce delays we use ―any cast‖-based packet forwarding schemes. 18 ISDNW18 Sharing Memory between This system protecting shared memory from 2009 Byzantine Processes Using the unauthorized node in Network by fine- Policy-Enforced Tulle Spaces grained access policies and it will Transfer the data‘s in a network using byzantine process. 20 Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 21. Iris Solutions TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON NETWORK SECURITY SNO P.CODE TITLES DESCRIPTION YEAR 1 ISDNS01 A Generic Framework for Three- A well designed three-factor authentication 2011 Factor Authentication: Preserving protocol can greatly improve the Security and Privacy in information assurance in distributed Distributed Systems systems. Three-factor authentication is introduced to incorporate the advantages of the authentication based on password, smart-card and biometrics. 2 ISDNS02 Deadlock-Free Adaptive Routing A new deadlock-free adaptive routing 2011 in Meshes with Fault-Tolerance algorithm for meshes was proposed for 3D Ability Based on Channel meshes based on a new virtual network Overlapping partitioning scheme called channel overlapping. The proposed deadlock-free adaptive routing algorithm was extended to a deadlock-free adaptive fault tolerant routing algorithm in 3D meshes with the same deadlock avoidance technique which can outperform other previous methods. 3 ISDNS03 RITAS: Services for Randomized A stack of randomized intrusion-tolerant 2011 Intrusion Tolerance protocols is described and its performance evaluated under several settings in both LAN and wide-area-network environments. The stack provides a set of relevant services ranging from basic communication primitives up to atomic broadcast. 4 ISDNS04 Online Intrusion Alert Alert aggregation is an important subtask of 2011 Aggregation with Generative intrusion detection. The goal is to identify Data Stream Modeling and to cluster different alerts—produced by low-level intrusion detection systems, firewalls, etc.—belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. 5 ISDNS05 Replica Placement for Route Distributed hash tables share storage and 2011 Diversity in Tree-Based Routing routing responsibility among all nodes in a Distributed Hash Tables peer-to-peer network. These networks have bounded path length unlike unstructured networks. The impact of Max Disjoint on 21 routing robustness compared to other Page placements when nodes are compromised at random or in a contiguous run. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 22. Iris Solutions 6 ISDNS06 Prime: Byzantine Replication This project demonstrates the extent of 2011 under Attack performance degradation possible in some existing protocols that do satisfy liveness and that do perform well absent Byzantine faults. We propose a new performance oriented Correctness criterion that requires a consistent level of performance, even with Byzantine faults. 7 ISDNS07 Nymble: Blocking Misbehaving Anonymizing networks such as Tor allow 2011 Users in Anonymzing Networks users to access Internet services privately by using a series of routers to hide the client's IP address from the server. Nymble, a system in which servers can ―blacklist‖ misbehaving users, there by blocking users without compromising their anonymity. 8 ISDNS08 Dynamics of Malware Spread in We formulate an analytical model to 2011 Decentralized Peer-to-Peer characterize the spread of malware in Networks decentralized, Gnutella type peer-to-peer (P2P) networks and study the dynamics associated with the spread of malware. Using a compartmental model, we derive the system parameters or network conditions under which the P2P network may reach a malware free equilibrium. 9 ISDNS09 Improving Security and We propose a novel Cipher text policy 2011 Efficiency in Attribute-Based attribute-based encryption (CP-ABE) Data Sharing scheme for a data sharing system by exploiting the characteristic of the system architecture. The proposed scheme achievements:1) The key escrow problem could be solved by escrow-free key issuing protocol.2) Fine-grained user revocation per each attribute could be done by proxy encryption which takes advantage of the selective attribute group key distribution on top of the ABE. 10 ISDNS10 Using Web-Referral We systematically design a security-driven 2010 Architectures to Mitigate Denial- scheduling architecture that can dynamically of-Service Threats measure the trust level of each node in the system by using differential equations 11 ISDNS11 Against Flooding Attacks Using In recent years, a number of puzzle-based 2010 22 Game Theory based Puzzle defense mechanisms have been proposed Approach against flooding denial-of-service (DoS) Page attacks in networks. This paper utilizes #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 23. Iris Solutions game theory to propose a series of optimal puzzle-based strategies for handling increasingly sophisticated flooding attack scenarios TECHNOLOGY: DOTNET DOMAIN : IEEE TRANSACTIONS ON DATAMINING SNO P. CODE PROJECT TITLES DESCRIPTION YEAR 1 ISDDM01 Mining Group Movement Encryption and multiplexing technique not 2011 Patterns for Tracking Moving only enhances the security of confidential Objects Efficiently fingerprint information by making the information inaccessible to any intruder having a random code, but also improves the system resource utilization by reducing the storage and/or transmission bandwidth requirement 2 ISDDM02 Mining Iterative Generators and We introduce a novel concept of 2011 Representative Rules for representative rules expressing forward, Software Specification Discovery backward, and in-between temporal constraints. These rules characterize many real-world constraints including those found in software specifications and can be constructed by pairing iterative generators with closed iterative patterns. 3 ISDDM03 On Computing Farthest The concept of Data mining such as NN and 2011 Dominated Locations closest Pair is used. Based on the client‘s query, the database will be giving the nearest datasets and by the using Closest- Pair concept, we can point the object (data) location and neglect spatial location. 4 ISDDM04 Efficient Relevance Feedback for We propose a novel method NPRF to 2011 Content-Based Image Retrieval achieve the high efficiency and effectiveness by Mining User Navigation of CBIR in coping with the large-scale Patterns image data. In terms of efficiency, the iterations of feedback are reduced substantially by using the navigation patterns discovered from the user query log. Our proposed search use three kinds of query refinement strategies QPM, QR and 23 QEX to converge the search space toward Page the user‘s intention effectively. #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai
  • 24. Iris Solutions 5 ISDDM05 Authenticated Multistep NN We are using NN concept to provide 2011 Nearest Neighbor Search similarity search results with trustiness to proof the result correctness. A client gives NN queries to a server that maintains a database signed by a trusted authority. 6 ISDDM06 Missing Value Estimation for Missing data imputation aims at providing 2011 Mixed-Attribute Data Sets estimations for missing values by reasoning from observed data. Missing data imputation is a key issue in learning from incomplete data. Various techniques have been developed with great successes on dealing with missing values in data sets with homogeneous attributes. 7 ISDDM07 Extended XML Tree Pattern We research a large set of XML tree pattern, 2011 Matching: Theories and called extended XML tree pattern, which Algorithms may include P-C, A-D relationships, negation functions, wildcards, and order restriction. We establish a theoretical framework about ―matching cross‖ which demonstrates the intrinsic reason in the proof of optimality on holistic algorithms. 8 ISDDM08 Bridging Domains Using World A novel transfer learning approach, called 2010 Wide Knowledge for Transfer BIG (Bridging information Gap), to Learning effectively extract useful knowledge in a worldwide knowledge base. 9 ISDDM09 Closing the Loop in Webpage This project focuses on the concept of 2010 Understanding information extraction is processing from a web page and its content. 10 ISDDM10 Knowledge-Based Interactive This paper proposes a new interactive 2010 Post mining of Association Rules approach to prune and filter discovered Using Ontologies rules.1) Integration of user knowledge in the post processing task. 2) The Rule Schema formalism extending the specification language for user expectations 11 ISDDM11 Filtering Data flow for Query tolerance is expressed as a numerical 2010 Continuous Queries value, which may be difficult to specify. We observe that in many situations, users may not be concerned with the actual value of an answer, but rather which object satisfies a query. In this paper We develop fraction- based tolerance for two major classes of 24 entity-based queries Page #165, 1st Floor, 5th Street, Crosscut Road, Gandhipuram, Coimbatore-12 Ph: 0422-4372816 Mail: irisprojects@yahoo.com website: www.irisprojects.com, Our branches: Tanjore: 9943 317 317, Trichy: 9943 314 314, Kovai: 9943 357 357 Chennai, Nellai, Salem, Erode, Madurai