|  Home   |  Contact Us   |  Online Exam   |  Tech World   |  Jobs    |  Member Login
 IEEE-2014 Java Projects  |  IEEE-2014 Dotnet Projects |  IEEE-2013 Java Projects 
 IEEE-2013 Dotenet Projects  | I'EEE-2012 JAVA Projects | IEEE-2011 JAVA Projects | 
                                                      Application Projects | Mini projects 
IMAGE PROCESSING
1. View-invariant action recognition based on Artificial Neural Networks.

       View :Abstract Basepaper               
2. Altered Fingerprints: Analysis and Detection.

    View :Abstract Basepaper               
3. Improving Color Constancy by Photometric Edge Weighting .

       View :Abstract Basepaper              
4. IntentSearch:Capturing User Intention for One-Click Internet Image Search.

       View :Abstract Basepaper               
5. User-aware Image Tag Refinement via Ternary Semantic Analysis.

       View :Abstract Basepaper               
3. Separable Reversible Data Hiding in Encrypted Image.

       View :Abstract Basepaper               
7. Robust Watermarking of Compressed and Encrypted JPEG2000 Images.

       View :Abstract Basepaper               
8. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks.

       View :Abstract Basepaper               
9. Robust Face-Name Graph Matching for Movie Character Identify.

       View :Abstract Basepaper               
10. Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points.

       View :Abstract Basepaper               
11. Exploring The Design Space Of Social Network-Based Sybil Defenses.

       View :Abstract Basepaper               
12. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval.

       View :Abstract Basepaper              
13. AnnoSearch: Image Auto-Annotation by Search.

       View :Abstract Basepaper              
CLOUD COMPUTING
14. HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING TECHNIQUE ENSURING PRIVACY & SECURITY IN CLOUD COMPUTING.

    View :Abstract Basepaper           
15. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing.

    View :Abstract Basepaper           
16. Privacy Preserving Delegated Access Control in Public Clouds.

    View :Abstract Basepaper           
17. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing.

    View :Abstract Basepaper           
18. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing.

    View :Abstract Basepaper                
19. Efficient Audit Service Outsourcing for Data Integrity in Clouds.

    View :Abstract Basepaper                
20. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing.

    View :Abstract Basepaper               
21. Towards Secure and Dependable Storage Services in Cloud Computing.

       View :Abstract Basepaper               
22. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.

       View :Abstract Basepaper               
23. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.

       View :Abstract Basepaper               
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
21. Computing Structural Statistics by Keywords in Databases.

    View :Abstract Basepaper                
22. Combined Mining: Discovering Informative Knowledge in Complex Data.

    View :Abstract Basepaper                
23. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication.

    View :Abstract Basepaper                
24. Efficient Data Mining for XML Queries – Answering Support.

    View :Abstract Basepaper                
25. Decentralized Probabilistic Text Clustering.

    View :Abstract Basepaper                
26. Answering General Time-Sensitive Queries.

    View :Abstract Basepaper                
27. Altered Fingerprints: Analysis and Detection.

    View :Abstract Basepaper               
28. Generative Models for Item Adoptions Using Social Correlation.

    View :Abstract Basepaper                
29. Scalable Scheduling of Updates in Streaming Data Warehouses.

    View :Abstract Basepaper                
30. Ranking Model Adaptation for Domain-Specific Search.

    View :Abstract Basepaper               
31. Bridging Social and Data Networks.

    View :Abstract Basepaper                
32. Effective Pattern Discovery for Text Mining

    View :Abstract Basepaper                
33. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators.

    View :Abstract Basepaper               
34. Scalable Learning of Collective Behavior.

    View :Abstract Basepaper               
35. Outsourced Similarity Search on Metric Data Assets.

    View :Abstract Basepaper                
36. Bridging Social and Data Networks.

    View :Abstract Basepaper                
37. Identifying Content for Planned Events Across Social Media Sites.

    View :Abstract Basepaper                
38. A Query Formulation Language for the data web.

    View :Abstract Basepaper                
39. Efficient and Discovery of Patterns in Sequence Data Sets.

    View :Abstract Basepaper                
40. Organizing User Search Histories.

    View :Abstract Basepaper            
41. Mining Web Graphs for Recommendations.

    View :Abstract Basepaper                
42. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering.

    View :Abstract Basepaper            
43. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.

    View :Abstract Basepaper            
44. Joint Top-K Spatial Keyword Query Processing.

    View :Abstract Basepaper               
SOFTWARE ENGINEERING
45. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development.

    View :Abstract Basepaper                
46. Measuring Code Quality to Improve Specification Mining.

    View :Abstract Basepaper                
WIRELESS COMMUNICATIONS
47. Cooperative Data Dissemination via Roadside WLANs.

       View :Abstract Basepaper               
48. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications.

       View :Abstract Basepaper          
49. AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies.

       View :Abstract Basepaper               
50. Cooperative Data Dissemination via Roadside WLANs.

       View :Abstract Basepaper               
I'EEE TRANSACTIONS ON MOBILE COMPUTING
51. Fast Release/Capture Sampling in Large-Scale Sensor Networks.

       View :Abstract Basepaper               
52. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees.

       View :Abstract Basepaper               
53. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions.

       View :Abstract Basepaper               
54. Cooperative download in vehicular environments.

       View :Abstract Basepaper               
55. Network Assisted Mobile Computing with Optimal Uplink Query Processing.

       View :Abstract Basepaper               
56. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper.

       View :Abstract Basepaper               
57. Topology control in mobile ad hoc networks with cooperative communications.

       View :Abstract Basepaper               
SECURE COMPUTING
59.On Privacy of Encrypted Speech Communications .

       View :Abstract Basepaper               
60.Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique.

       View :Abstract Basepaper               
61. Access control for online social networks third party applications.

       View :Abstract Basepaper               
61. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion.

       View :Abstract Basepaper               
62. ROAuth: Recommendation Based Open Authorization.

       View :Abstract Basepaper               
63. Packet-Hiding Methods for Preventing Selective Jamming Attacks.

       View :Abstract Basepaper               
64. OAuth Web Authorization Protocol.

       View :Abstract Basepaper               
65. Recommendation Models for Open Authorization.

       View :Abstract Basepaper              
66. Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs.

       View :Abstract Basepaper              
67. Automatic Reconfiguration for Large-Scale Reliable Storage Systems.

       View :Abstract Basepaper               
68. Fast Matrix Embedding by Matrix Extending.

       View :Abstract Basepaper               
69. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks.

       View :Abstract Basepaper               
70. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.

       View :Abstract Basepaper               
71. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group.

       View :Abstract Basepaper               
SERVICE COMPUTING (SOA) & ONTOLOGY
72. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection.

       View :Abstract Basepaper               
72. Expert Discovery and Interactions in Mixed Service-Oriented Systems.

       View :Abstract Basepaper               
73. Query Access Assurance in Outsourced Databases.

       View :Abstract Basepaper               
74. Dynamic Authentication for Cross-Realm SOA-Based Business Processes.

       View :Abstract Basepaper               
NETWORKING
75. SPREAD: Improving network security by multipath routing in mobile ad hoc networks.

       View :Abstract Basepaper          
75. A Keyless Approach to Image Encryption.

       View :Abstract Basepaper          
76. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform.

       View :Abstract Basepaper          
77. A Reliable Multi-Grid Routing Protocol for Tactical MANETs.

       View :Abstract Basepaper          
78. View-invariant action recognition based on Artificial Neural Networks.

       View :Abstract Basepaper               
79. A New Cell Counting Based Attack Against Tor.

       View :Abstract Basepaper               
80. Load Balancing Multipath Switching System with Flow Slice.

       View :Abstract Basepaper               
81. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms.

       View :Abstract Basepaper            
82. Assessing the Veracity of Identity Assertions via OSNs.

       View :Abstract Basepaper           
I'EEE PARALLEL AND DISTRIBUTED SYSTEMS
83. Improving Color Constancy by Photometric Edge Weighting .

       View :Abstract Basepaper              
84. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks .

       View :Abstract Basepaper              
85. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

       View :Abstract Basepaper              
86. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

       View :Abstract Basepaper              
87. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.

       View :Abstract Basepaper               
88. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs.

       View :Abstract Basepaper              
89. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.

       View :Abstract Basepaper               
90. Resource-Aware Application State Monitoring.

       View :Abstract Basepaper               
91. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. .

       View :Abstract Basepaper               
92. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?.

       View :Abstract Basepaper           
I'EEE 2012 INTERNATIONAL CONFERENCE
93. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users’ Behaviors.

       View :Abstract Basepaper              
94. Detecting and Validating Sybil Groups in theWild.

       View :Abstract Basepaper               
95. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines.

       View :Abstract Basepaper           
96. Hiding Sensitive Association Rule for Privacy Preservation.

       View :Abstract Basepaper            
97. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks.

       View :Abstract Basepaper           
98. Assessing the Veracity of Identity Assertions via OSNs

       View :Abstract Basepaper          
99. Association Rule – Extracting Knowledge Using Market Basket Analysis.

       View :Abstract Basepaper           
100. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad1.

       View :Abstract Basepaper              
101. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks.

       View :Abstract Basepaper              
102. Development of Certificate Authority Services for Web Applications.

       View :Abstract Basepaper              
OTHERS
103.Remote Display Solutions for Mobile Cloud Computing.

       View :Abstract Basepaper              
104. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service.

       View :Abstract Basepaper              
105. Linear and Differential Cryptanalysis.

       View :Abstract Basepaper              
 BRANCH @ BANGALORE
Need a Project, Request Here...
Project Title:      
Name:      
E-Mail:      
Contact No:      
College Name:      
Android Application Demo
PROFESSIONAL REFERANCE
    Enterprise IT Training
    Interview Questions
    Technical Referance
    Placement Papers
    Inplant Training
Slideshow Image 1
Slideshow Image 2
Slideshow Image 3
ieee 2011 Latest Projects
    IEEE 2011 Projects
    IEEE 2010 Projects
    Software Application Projects
All Rights Reserved  :  SKdotcom Technologies