College Projects

img

To offer the students real time exposure and experience in software development platform which reinforces programming concepts, assess programming skills and creative thinking. Students are given a software development kit which contains all the software, Project Synopsis, Illustration and problem at hand.Candidate has to compile and come out with the accurate code to address the problem at hand.

Students Get Customized training in all the technologies from Certified Instructor before the candidate is deployed onto the project. Project Mentoring from MahanidhiTech@Campus is for the Students who are looking to hone and perfect their programming skills. Here you can find several problems with real-life scenarios.Attempting these will definitely give you an edge over others.

IEEE Project Titles

  • Privacy Preserving Policy-Based Content Sharing in Public Clouds.
  • Toward Efficient Filter Privacy-Aware Content-Based Pub/Sub Systems.
  • Improving Security and Efficiency in Attribute-Based Data Sharing.
  • Determining $(k)$-Most Demanding Products with Maximum Expected Number of Total Customers
  • Optimizing Multi-Top-k Queries over Uncertain Data Streams
  • A User-Friendly Patent Search Paradigm
  • Facilitating Document Annotation using Content and
  • Finding Probabilistic Prevalent Colocations in Spatially Uncertain Data Sets
  • Annotating Search Results from Web Databases
  • Identity-Based Secure Distributed Data Storage Schemes
  • m-Privacy for Collaborative Data Publishing
  • PMSE: A Personalized Mobile Search Engine
  • Category-Based Infidelity Bounded Queries over Unstructured Data Streams
  • Efficient and Scalable Processing of String Similarity Join
  • ReFinder: A Context-Based Information Refinding System
  • User Action Interpretation for Online Content Optimization
  • Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
  • Spatial Approximate String Search
  • The Adaptive Clustering Method for the Long Tail Problem of Recommender Systems
  • FoCUS: Learning to Crawl Web Forums
  • A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
  • Large-Scale Personalized Human Activity Recognition Using Online Multitask Learning
  • Preventing Private Information Inference Attacks on Social Networks
  • VChunkJoin: An Efficient Algorithm for Edit Similarity Joins
  • KSQ: Top-$(k)$ Similarity Query on Uncertain Trajectories
  • Active Learning of Constraints for Semi-Supervised Clustering
  • Anomaly Detection via Online Over-Sampling Principal Component Analysis
  • EMR: A Scalable Graph-based Ranking Model for Content- based Image Retrieval
  • Toward the Automatic Extraction of Policy Networks Using Web Links and Documents
  • Mining Interaction Patterns among Brain Regions by Clustering
  • A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
  • Load Rebalancing for Distributed File Systems in Clouds
  • Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
  • Finding Best and Worst k- Coverage Paths in Multihop Wireless Sensor Networks
  • Scaling Up Publish/Subscribe Overlays Using Interest Correlation for Link Sharing
  • A DHT-Aided Chunk-Driven Overlay for Scalable and Efficient Peer-to-Peer Live Streaming
  • Distributed Caching via Rewarding: An Incentive Scheme Design in P2P-VoD Systems
  • Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  • IP-Geolocation Mapping for Involving Moderately- Connected Internet Regions
  • Enabling P2P One-view Multi- party Video Conferencing
  • Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks
  • Efficient Two-Server Password- Only Authenticated Key Exchange
  • Routing Metrics for Minimizing End-to-End Delay in Multiradio Multichannel Wireless Networks
  • Security Analysis of a Privacy- Preserving Decentralized Key- Policy Attribute-Based Encryption Scheme
  • Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
  • Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol
  • A Geographically Aware Poll- Based Distributed File Consistency Maintenance Method for P2P Systems
  • Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique
  • A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks
  • A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
  • On the Feasibility of Gradient- based Data-Centric Routing Using Bloom Filters
  • Scalable and Accurate Graph Clustering and Community Structure Detection
  • Time Synchronization Based On Slow Flooding in Wireless Sensor Networks
  • DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
  • Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
  • Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
  • Dynamic Scheduling and Pricing in Wireless Cloud Computing
  • Distributed Algorithm for Lifetime Maximization in a Delay-Tolerant Wireless Sensor Network with a Mobile Sink
  • Key Management for Multiple Multicast Groups in Wireless Networks
  • Maximizing Transmission Opportunities in Wireless Multihop Networks
  • Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks
  • Probability-Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks
  • Secret Key Extraction from Wireless Signal Strength in Real Environments
  • Adaptive Duty Cycle Control with Queue Management in Wireless Sensor Networks
  • A Highly Scalable Key Pre- distribution Scheme for Wireless Sensor Networks
  • Distributed Algorithms for Energy-efficient Even Self- deployment in Mobile Sensor Networks
  • Optimal Peer-to-Peer Scheduling for Mobile Wireless Networks with Redundantly Distributed Data
  • Multiple Mobile Data Offloading Through Disruption Tolerant Networks
  • An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
  • Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
  • Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
  • Security and Privacy-Enhancing Multicloud Architectures
  • Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data
  • Entrusting Private Computation and Data to Untrusted Networks
  • WarningBird: A Near Real- Time Detection System for Suspicious URLs in Twitter Stream
  • Formal Analysis of Secure Neighbor Discovery in Wireless Networks
  • Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
  • A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
  • Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
  • Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
  • Private Searching on Streaming Data Based on Keyword Frequency
  • Automated digital forensic technique with intrusion detection systems
  • A Novel Electronic English Auction System With A Secure On-Shelf Mechanism
  • Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage
  • DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
  • SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference
  • Enhancing Secrecy With Multi- Antenna Transmission in Wireless Ad Hoc Networks
  • Random Projections of Residuals for Digital Image Steganalysis
  • Proximity-Based Security Techniques for Mobile Users in Wireless Networks
  • Signature-Based Detection of Notable Transitions in Numeric Data Streams
  • Enforcing Secure and Privacy- Preserving Information Brokering in Distributed Information Sharing
  • Privacy Preserving Data Sharing With Anonymous ID Assignment
  • Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy
  • Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
  • Strong Secrecy in Bidirectional Broadcast Channels With Confidential Messages
  • LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
  • CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
  • Attribute-Based Encryption With Verifiable Outsourced Decryption
  • Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
  • Back-Pressure-Based Packet-by- Packet Adaptive Routing in Communication Networks
  • Employing the One-Sender– Multiple-Receiver Technique in Wireless LANs
  • Exact and Heuristic Algorithms for Data-Gathering Cluster- Based Wireless Sensor Network Design Problem
  • Distortion-Aware Scalable Video Streaming to Multinetwork Clients
  • Optimal Forwarding in Delay- Tolerant Networks With Multiple Destinations
  • Scheduling Mobile Nodes for Cooperative Data Transport in Sensor Networks
  • Control of Wireless Networks With Secrecy
  • A Distributed Control Law for Load Balancing in Content Delivery Networks
  • Centralized and Distributed Protocols for Tracker-Based Dynamic Swarm Management
  • Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
  • Price Differentiation for Communication Networks
  • Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
  • FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs
  • Dynamic Multilevel Priority Packet Scheduling Scheme for Wireless Sensor Network
  • Cloud-Based Multicasting with Feedback in Mobile Social Networks
  • Decentralized User-Centric Scheduling with Low Rate Feedback for Mobile Small Cells
  • Optimal Resource Allocation for Reliable and Energy Efficient Cooperative Communications
  • Agnostic Diagnosis: Discovering Silent Failures in Wireless Sensor Networks
  • Splitting Tree Algorithm for Decentralized Detection in Sensor Networks
  • Distributed Clock Parameters Tracking in Wireless Sensor Network
  • A Web Service Framework Supporting Multimedia Streaming
  • Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Network
  • Personalized QoS-Aware Web Service Recommendation and Visualization
  • Privacy-Enhanced Web Service Composition
  • Timed Compatibility Analysis of Web Service Composition: A Modular Approach Based on Petri Nets
  • Toward Trustworthy Coordination of Web Services Business Activities
  • QoS-Driven Service Composition with Reconfigurable Services
  • QoS Analysis for Web Service Compositions with Complex Structures
  • Cost-Based Optimization of Service Compositions
  • A New Time Series Mining Approach Applied to Multitemporal Remote Sensing Imagery
  • Very Short-Term Load Forecasting: Wavelet Neural Networks With Data Pre- Filtering
  • A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
  • Face Recognition Using Ensemble String Matching
  • Video Watermarking With Empirical PCA-Based Decoding
  • On Establishing Edge Adaptive Grid for Bilevel Image Data Hiding
  • Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
  • Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage
  • Pose-Robust Recognition of Low-Resolution Face Images
  • Query-Adaptive Image Search with Hash Codes
  • Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
  • Extracting Dominant Textures in Real Time With Multi-Scale Hue-Saturation-Intensity Histograms.
  • Face Illumination Manipulation Using a Single Reference Image by Adaptive Layer Decomposition.
  • Poisson Image Reconstruction With Hessian Schatten-Norm Regularization
  • Integrated Segmentation and Interpolation of Sparse Data.
  • Seamless View Synthesis Through Texture Optimization
  • Linear Time Distances Between Fuzzy Sets With Applications to Pattern Matching and Classification
  • Shape-Based Normalized Cuts Using Spectral Relaxation for Biomedical Segmentation.
  • Multispectral Image Denoising With Optimized Vector Bilateral Filter
  • Tension in Active Shapes
  • Blind Detection of Median Filtering in Digital Images: A Difference Domain Based Approach.
  • Oriented Image Foresting Transform Segmentation by Seed Competition
  • Hybrid Attribute- and Re- Encryption-Based Key Management for Secure and Scalable Mobile Applications
  • Dynamic Cloud Pricing for Revenue Maximization
  • A Combinatorial Auction-Based Mechanism for Dynamic VM Provisioning and Allocation in Clouds
  • QoS-Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems

Project Evaluation

img

Code Accuracy:

Does your solution give the expected result? How close is it to the accurate solution? Evaluation of code happens on how accurate the code is.

Compliance with Standards:

Your code is expected to follow commonly accepted coding conventions and standards. The less the number of deviations the more compliant your code.

Code Efficiency:

Is your solution the most optimal solution possible? Coding Efficiency is currently loosely approximated to the number of lines of code.

Contact Us

We had love to hear from you! If you want study any courses , Please fill out our form below and we will contact you as soon as possible.


Site map    Privacy Policy    About Us                                                                 Copyright © 2084 Mahanidhitech.com