|  Home   |  Contact Us   |  Online Exam   |  Tech World   |  Jobs    |  Member Login
 Home | I'EEE-2012 JAVA Projects | I'EEE-2012 Dotenet Projects  |  I'EEE PHP projects
     I'EEE-2011 JAVA Projects | I'EEE-2011 Dotenet Projects | Application Projects | IEEE 2013
               Download           Output

Reference for students projects only - B.Sc,BCA,M.Sc,MCA,B.E,B.Tech,M.E,M.Tech
IMAGE PROCESSING
1. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval.

       View :Abstract Basepaper              
2. AnnoSearch: Image Auto-Annotation by Search - (2006).

       View :Abstract Basepaper              
3. View-invariant action recognition based on Artificial Neural Networks.

       View :Abstract Basepaper               
4. Robust Watermarking of Compressed and Encrypted JPEG2000 Images.

       View :Abstract Basepaper               
5. Altered Fingerprints: Analysis and Detection.

    View :Abstract Basepaper               
6. IntentSearch:Capturing User Intention for One-Click Internet Image Search.

       View :Abstract Basepaper               
7. Improving Color Constancy by Photometric Edge Weighting .

       View :Abstract Basepaper              
8. User-aware Image Tag Refinement via Ternary Semantic Analysis.

       View :Abstract Basepaper               
9. Separable Reversible Data Hiding in Encrypted Image.

       View :Abstract Basepaper               
10. Robust Face-Name Graph Matching for Movie Character Identify.

       View :Abstract Basepaper               
11. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks.

       View :Abstract Basepaper               
12. Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points.

       View :Abstract Basepaper               
13. Exploring The Design Space Of Social Network-Based Sybil Defenses.

       View :Abstract Basepaper               
I'EEE TRANSACTIONS ON MOBILE COMPUTING
14. Cooperative download in vehicular environments.

       View :Abstract Basepaper               
15. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees.

       View :Abstract Basepaper               
16. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions.

       View :Abstract Basepaper               
17. Network Assisted Mobile Computing with Optimal Uplink Query Processing.

       View :Abstract Basepaper               
18. Topology control in mobile ad hoc networks with cooperative communications.

       View :Abstract Basepaper               
19. Fast Release/Capture Sampling in Large-Scale Sensor Networks.

       View :Abstract Basepaper               
20. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper.

       View :Abstract Basepaper               
NETWORKING
21. SPREAD: Improving network security by multipath routing in mobile ad hoc networks.

       View :Abstract Basepaper          
22. A Reliable Multi-Grid Routing Protocol for Tactical MANETs.

       View :Abstract Basepaper          
23. View-invariant action recognition based on Artificial Neural Networks.

       View :Abstract Basepaper               
24. A New Cell Counting Based Attack Against Tor.

       View :Abstract Basepaper               
25. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms.

       View :Abstract Basepaper            
26. Assessing the Veracity of Identity Assertions via OSNs.

       View :Abstract Basepaper           
27. Load Balancing Multipath Switching System with Flow Slice.

       View :Abstract Basepaper               
28. A Keyless Approach to Image Encryption.

       View :Abstract Basepaper          
30. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform.

       View :Abstract Basepaper          
WIRELESS COMMUNICATIONS
31. AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies.

       View :Abstract Basepaper               
32. Cooperative Data Dissemination via Roadside WLANs.

       View :Abstract Basepaper               
33. Cooperative Data Dissemination via Roadside WLANs.

       View :Abstract Basepaper               
34. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications.

       View :Abstract Basepaper          
CLOUD COMPUTING
35. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data.

       View :Abstract Basepaper               
36. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing.

    View :Abstract Basepaper                
37. Efficient Audit Service Outsourcing for Data Integrity in Clouds.

    View :Abstract Basepaper                
38. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing.

    View :Abstract Basepaper               
39. HOMOMORPHIC AUTHENTICATION WITH RANDOM MASKING TECHNIQUE ENSURING PRIVACY & SECURITY IN CLOUD COMPUTING.

    View :Abstract Basepaper           
40. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing.

    View :Abstract Basepaper           
41. Privacy Preserving Delegated Access Control in Public Clouds.

    View :Abstract Basepaper           
42. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing.

    View :Abstract Basepaper           
43. Towards Secure and Dependable Storage Services in Cloud Computing.

       View :Abstract Basepaper               
44. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.

       View :Abstract Basepaper               
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
45. Joint Top-K Spatial Keyword Query Processing.

    View :Abstract Basepaper               
46. Identifying Content for Planned Events Across Social Media Sites.

    View :Abstract Basepaper                
47. A Query Formulation Language for the data web.

    View :Abstract Basepaper                
48. Efficient and Discovery of Patterns in Sequence Data Sets.

    View :Abstract Basepaper                
49. Computing Structural Statistics by Keywords in Databases.

    View :Abstract Basepaper                
50. Combined Mining: Discovering Informative Knowledge in Complex Data.

    View :Abstract Basepaper                
51. Answering General Time-Sensitive Queries.

    View :Abstract Basepaper                
52. Altered Fingerprints: Analysis and Detection.

    View :Abstract Basepaper               
53. Generative Models for Item Adoptions Using Social Correlation.

    View :Abstract Basepaper                
54. Scalable Scheduling of Updates in Streaming Data Warehouses.

    View :Abstract Basepaper                
55. Ranking Model Adaptation for Domain-Specific Search.

    View :Abstract Basepaper               
56. Bridging Social and Data Networks.

    View :Abstract Basepaper                
57. Effective Pattern Discovery for Text Mining

    View :Abstract Basepaper                
58. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators.

    View :Abstract Basepaper               
59. Scalable Learning of Collective Behavior.

    View :Abstract Basepaper               
60. Outsourced Similarity Search on Metric Data Assets.

    View :Abstract Basepaper                
61. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication.

    View :Abstract Basepaper                
62. Efficient Data Mining for XML Queries – Answering Support.

    View :Abstract Basepaper                
63. Decentralized Probabilistic Text Clustering.

    View :Abstract Basepaper                
64. Bridging Social and Data Networks.

    View :Abstract Basepaper                
65. Organizing User Search Histories.

    View :Abstract Basepaper            
66. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering.

    View :Abstract Basepaper            
67. Mining Web Graphs for Recommendations.

    View :Abstract Basepaper                
68. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques.

    View :Abstract Basepaper            
SOFTWARE ENGINEERING
69. Measuring Code Quality to Improve Specification Mining.

    View :Abstract Basepaper                
70. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development.

    View :Abstract Basepaper                
SECURE COMPUTING
71. Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs.

       View :Abstract Basepaper              
72.On Privacy of Encrypted Speech Communications .

       View :Abstract Basepaper               
73.Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique.

       View :Abstract Basepaper               
74. Access control for online social networks third party applications.

       View :Abstract Basepaper               
75. ROAuth: Recommendation Based Open Authorization.

       View :Abstract Basepaper               
76. Packet-Hiding Methods for Preventing Selective Jamming Attacks.

       View :Abstract Basepaper               
77. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching.

       View :Abstract Basepaper               
78. OAuth Web Authorization Protocol.

       View :Abstract Basepaper               
79. Recommendation Models for Open Authorization.

       View :Abstract Basepaper              
80.HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.

       View :Abstract Basepaper               
81. Automatic Reconfiguration for Large-Scale Reliable Storage Systems.

       View :Abstract Basepaper               
82. Fast Matrix Embedding by Matrix Extending.

       View :Abstract Basepaper               
83. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion.

       View :Abstract Basepaper               
84. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks.

       View :Abstract Basepaper               
85. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group.

       View :Abstract Basepaper               
SERVICE COMPUTING (SOA) & ONTOLOGY
86. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection.

       View :Abstract Basepaper               
87. Expert Discovery and Interactions in Mixed Service-Oriented Systems.

       View :Abstract Basepaper               
88. Query Access Assurance in Outsourced Databases.

       View :Abstract Basepaper               
89. Dynamic Authentication for Cross-Realm SOA-Based Business Processes.

       View :Abstract Basepaper               
I'EEE PARALLEL AND DISTRIBUTED SYSTEMS
90. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?.

       View :Abstract Basepaper           
91. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs.

       View :Abstract Basepaper              
92. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks .

       View :Abstract Basepaper              
93. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

       View :Abstract Basepaper              
94. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY

       View :Abstract Basepaper              
95. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.

       View :Abstract Basepaper               
96. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.

       View :Abstract Basepaper               
97. Improving Color Constancy by Photometric Edge Weighting .

       View :Abstract Basepaper              
98. Resource-Aware Application State Monitoring.

       View :Abstract Basepaper               
99. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. .

       View :Abstract Basepaper               
I'EEE 2012 INTERNATIONAL CONFERENCE
100. Association Rule – Extracting Knowledge Using Market Basket Analysis.

       View :Abstract Basepaper           
101. Detecting and Validating Sybil Groups in theWild.

       View :Abstract Basepaper               
102. Hiding Sensitive Association Rule for Privacy Preservation.

       View :Abstract Basepaper            
103. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks.

       View :Abstract Basepaper           
104. Assessing the Veracity of Identity Assertions via OSNs

       View :Abstract Basepaper          
105. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad1.

       View :Abstract Basepaper              
106. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users’ Behaviors.

       View :Abstract Basepaper              
107. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks.

       View :Abstract Basepaper              
108. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines.

       View :Abstract Basepaper           
109. Development of Certificate Authority Services for Web Applications.

       View :Abstract Basepaper              
OTHERS
110. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service.

       View :Abstract Basepaper              
111.Remote Display Solutions for Mobile Cloud Computing.

       View :Abstract Basepaper              
112. Linear and Differential Cryptanalysis.

       View :Abstract Basepaper              
 BRANCH @ BANGALORE
Need a Project, Request Here...
Project Title:      
Name:      
E-Mail:      
Contact No:      
College Name:      
Android Application Demo
PROFESSIONAL REFERANCE
    Enterprise IT Training
    Interview Questions
    Technical Referance
    Placement Papers
    Inplant Training
Slideshow Image 1
Slideshow Image 2
Slideshow Image 3
ieee 2011 Latest Projects
    IEEE 2011 Projects
    IEEE 2010 Projects
    Software Application Projects
All Rights Reserved  :  SKdotcom Technologies