Computer Science and IT (IEEE PROJECT TITLES 2012-2013)
   

    CLOUD COMPUTING

  1. Data integrity proofs in cloud storage - .Net

  2. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud - .Net

  3. Optimal service pricing for a cloud cache - .Net

  4. Fuzzy Keyword Search over Encrypted Data - .Net

  5. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing - .Net

  6. An economic approach for scalable and highly-available distributed applications - .Net

  7. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing - .Net

  8. Secure and Practical Outsourcing of Linear Programming in Cloud Computing - JAVA

  9. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds - JAVA

  10. Improving Utilization of Infrastructure Clouds - JAVA

  11. Agent-Based Urban Transportation Systems - JAVA

  12. Ensuring Data Storage Security in Cloud Computing - JAVA

  13. Client-side Load Balancer using Cloud - JAVA

    DEPENDABLE AND SECURED COMPUTING

  1. The Geometric Efficient Matching Algorithm for Firewalls - .Net

  2. A Policy Enforcing Mechanism for Trusted Ad Hoc Network - .Net

  3. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks - .Net

  4. Detecting Kernel-Level Root kits Using Data Structure Invariants - .Net

  5. Architecting a Secure Enterprise Data Sharing - .Net

  6. Fingerprint Matching Incorporating Ridge Features With Minutiae - .Net

  7. Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking - .Net

  8. SigFree A Signature-free Buffer - .Net

  9. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks - JAVA

  10. Nymble Blocking Misbehaving Users in Anonymizing Networks - JAVA

  11. Modeling and Detection of Camouflaging Worm. - JAVA

  12. RITAS: Services for Randomized Intrusion Tolerance - JAVA

  13. Online Intrusion Alert Aggregation with Generative Data Stream Modeling - JAVA

  14. Towards Situational Awareness of Large-Scale Botnet Probing Events - JAVA

  15. Analysis on Credit Card Fraud Detection Methods - JAVA

  16. Layered Approach Using Conditional Random Fields for Intrusion Detection IMAGE PROCESSING - JAVA

    IMAGE PROCESSING

  1. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm - .Net

  2. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts - .Net

  3. Embedded Extended Visual Cryptography Schemes - JAVA

  4. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding - JAVA

  5. Computational Perceptual Features for Texture Representation and Retrieval - JAVA

  6. Subspace-Based Striping Noise Reduction in Hyper-spectral Images - JAVA

  7. Multiple exposure fusion for high dynamic range image acquisition - JAVA

  8. Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes - JAVA

    KNOWLEDGE AND DATA ENGINEERING / DATA MINING

  1. IR-Tree: An Efficient Index for Geographic Document Search - .Net

  2. Studies and Evaluation on Meta Search Engines - .Net

  3. Mining Web Graphs for Recommendations - .Net

  4. Monitoring Service Systems from a Language-Action Perspective - .Net

  5. Integration of Sound Signature in Graphical Password Authentication System - .Net

  6. Exploring Application-Level Semantics for Data Compression - .Net

  7. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases - .Net

  8. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators - .Net

  9. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis - .Net

  10. A Personalized Ontology Model for Web Information Gathering - .Net

  11. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems - .Net

  12. Efficient Computation of Range Aggregates against uncertain location based queries - .Net

  13. Scalable Learning of Collective Behavior - .Net

  14. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques - .Net

  15. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases - .Net

  16. Publishing Search Logs – A Comparative Study of Privacy Guarantees - .Net

  17. The World in a Nutshell Concise Range Queries - .Net

  18. Adaptive Join Operators for Result Rate Optimization on Streaming Inputs - .Net

  19. AI AND OPINION MINING - .Net

  20. ANONYMOUS QUERY PROCESSING IN ROAD NETWORKS - .Net

  21. Data Leakage Detection Abstract - .Net

  22. Extended XML Tree Pattern Matching: Theories and Algorithms - JAVA

  23. Load Shedding in Mobile Systems with MobiQual - JAVA

  24. The CoQUOS Approach to Continuous Queries in Unstructured Overlays - JAVA

  25. Ranking Spatial Data by Quality Preferences - JAVA

  26. Effective Navigation of Query Results Based on Concept Hierarchies - JAVA

    NETWORKING

  1. Live Streaming with Receiver-based Peer-division Multiplexing - .Net

  2. Continuous Neighbor Discovery in Asynchronous Sensor Networks - .Net

  3. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection - .Net

  4. Self-Reconfigurable Wireless Mesh Networks - .Net

  5. Conditional Shortest Path Routing in Delay Tolerant Networks - .Net

  6. Slow Adaptive OFDMA Systems Through Chance Constrained Programming - .Net

  7. Pricing under Constraints in Access Networks Revenue Maximization and Congestion Management - .Net

  8. Selfish Overlay Network Creation and Maintenance - JAVA

  9. SPAF: Stateless FSA-based Packet Filters - JAVA

  10. ProgME: Towards Programmable Network Measurement - JAVA

  11. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks - JAVA

  12. Buffer Sizing for 802.11 Based Networks - JAVA

  13. Model-Based Identification of Dominant Congested Links - JAVA

  14. Channel Allocation in Wireless Data Center Networks - JAVA

  15. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems - JAVA

  16. A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems - JAVA

  17. On Modeling, Analysis, and Optimization of Packet Aggregation Systems - Network Communication - JAVA

  18. A Distributed Explicit Rate Schemes in Multi-Input–Multi-Output Network Systems - JAVA

  19. Always Acyclic Distributed Path Computation - JAVA

    SOFTWARE ENGINEERING

  1. The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor? - .Net

  2. Analysis of quality of object oriented systems using object oriented metrics - JAVA

    SERVICE COMPUTING (SOA)

  1. Automated Certification for Compliant Cloud-based Business Processes - .Net

  2. Vulnerability Analysis in SOA-based Business Processes - .Net

  3. Service-Centric Framework for a Digital Government Application - .Net

  4. OWLPath: An OWL Ontology-Guided Query Editor - .Net

  5. Secure Service-Oriented Architecture for Mobile Transactions - .Net

  6. Dynamic Authentication for Cross-Realm SOA-Based Business Processes - .Net

    WIRELESS COMMUNICATION

  1. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems - .Net

  2. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks - .Net

  3. Throughput Optimization in High Speed Downlink Packet Access (HSDPA) - .Net

  4. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks - .Net

  5. Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks - JAVA

  6. Host-to-Host Congestion Control for TCP - JAVA

  7. Mesh Based Multicast Routing in MANET Stable Link Based Approach - JAVA

    MOBILE COMPUTING

  1. MABS Multicast Authentication Based on Batch Signature - .Net

  2. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks - JAVA

  3. Throughput Optimization in Mobile Backbone Networks - JAVA

  4. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks - JAVA

  5. Bandwidth recycling in IEEE 802.16 Networks - JAVA

  6. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks - JAVA

  7. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes - JAVA

    NETWORK SECURITY

  1. An AbuseFree Fair Contract Signing Protocol Based on the RSA Signature - .Net

    PARALLEL AND DISTRIBUTED SYSTEM

  1. Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming - JAVA

  2. Correlation-Based Traffic Analysis Attacks on Anonymity Networks - JAVA

  3. Cooperative Caching in Wireless P2PNetworks Design, Implementation, And Evaluation - JAVA

Our Services
Radianz Technologies services include IT Consulting, Application Development, Application Management, Managed Testing, Business Intelligence, Infrastructure Management, Outsourced Product Development and Corporate Training.
 
 
Our Projects
We are developing and maintaing projects for Industries,Personal Users,College Students. Radianz using Latest Technologies for develoing their projects . Commonly using language of radianz is .Net,PHP,Java,Embedded C...etc.
 
 
 
 
 
  Copyrights © Radianz Technologies 2013. All Rights Reserved. Home   |   About Us   |   Projects   |   Services   |   Careers   |   Training   |   Contact Us