SlideShare uma empresa Scribd logo
1 de 6
IEEE 2012 PROJECTS Call:+919966062808
S.NO.                         Project Title                          DOMINE          TECH

                                                                     Parallel &
        A Network Coding Equivalent Content Distribution Scheme
                                                                    Distributed      JAVA
1       For Efficient Peer To Peer Interactive Vod Streaming
                                                                      Systems
                                                                     Parallel &
        An Optimizing Overlay Topologies For Search In
                                                                    Distributed      JAVA
2       Unstructed Peer To Peer Networks
                                                                      Systems
        Automatic Discovery of Association Orders between Name
                                                                   Knowledge &
        and Aliases from the Web using Anchor Texts-based Co-                        JAVA
3
        occurrences                                               Data Engineering

        Cloud Data Production for Masses                          Cloud Computing    JAVA
4
        Clustering With Multi View Point – Based Similarity        Knowledge &
                                                                                     JAVA
5       Measure                                                   Data Engineering
                                                                     Parallel &
        Cooperative Provable Data Possession for Integrity
                                                                    Distributed      JAVA
6       Verification in Multi-Cloud Storage
                                                                      Systems
                                                                     Parallel &
        Distributed Packet Buffers For High Band Width Switches
                                                                    Distributed      JAVA
7       & Routers
                                                                      Systems
                                                                   Knowledge &
        Efficient Fuzzy Type – A Head Search In Xml Data                             JAVA
8
                                                                  Data Engineering
        Fast Data Collection in Tree-Based Wireless Sensor            Mobile
                                                                                     JAVA
9       Networks.                                                   Computing
                                                                     Parallel &
        Foot Print Detecting Sybil Attacks In Urban Vehicular
                                                                    Distributed      JAVA
10      Networks
                                                                      Systems
        Game-Theoretic Pricing for Video Streaming in Mobile          Mobile
                                                                                     JAVA
11      Networks
                                                                    Computing

        Hand Written Chinese Text Recognition By Integrating      Pattern Analysis   JAVA
12
Multiple Contexts                                                & Machine
                                                                     Intelligence
     In Tags We Trust: Trust modeling in social tagging of
                                                                   Signal Processing   JAVA
13   multimedia content

     Learn to Personalized Image Search from the Photo
                                                                     Multimedia        JAVA
14   Sharing Websites

     MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL    Knowledge &
                                                                                       JAVA
15   AND MECHANISMS
                                                                   Data Engineering
     Online Modeling of Proactive Moderation System for                 Secure
                                                                                       JAVA
16   Auction Fraud Detection                                          Computing
                                                                    Knowledge &
     Organizing User Search Histories                                                  JAVA
17
                                                                   Data Engineering
     Packet Loss Control Using Tokens at the Network Edge            Networking        JAVA
18
     Packet-Hiding Methods for Preventing Selective Jamming             Secure
                                                                                       JAVA
19   Attacks                                                          Computing
                                                                    Knowledge &
     Ranking Model Adaptation for Domain-Specific Search                               JAVA
20
                                                                   Data Engineering
                                                                        Secure
     Risk-Aware Mitigation for MANET Routing Attacks                                   JAVA
21
                                                                      Computing
     Self Adaptive Contention Aware Routing Protocol For                Mobile
                                                                                       JAVA
22   Intermittently Connected Mobile Networks                         Computing
     Slicing: A New Approach to Privacy Preserving Data             Knowledge &
                                                                                       JAVA
23   Publishing                                                    Data Engineering
     Ensuring Distributed Accountability For Data Sharing In            Secure
                                                                                       JAVA
24   The Cloud.                                                       Computing
     Adaptive Opportunistic Routing for Wireless Ad Hoc
                                                                     Networking        JAVA
25   Networks

     Vehicle Detection in Aerial Surveillance Using Dynamic
                                                                     Networking        JAVA
26   Bayesian Networks

     Catching Packet Droppers and Modifiers in Wireless               Parallel &
                                                                                       JAVA
27   Sensor Networks
                                                                      Distributed
Systems
     Energy-Efficient Cooperative Distribution with Statistical
                                                                    Networking       JAVA
28   QoS Provisions Video Over Wireless Networks

                                                                     Parallel &
     CCD A Distributed Publish Subscribe Framework for Rich
                                                                    Distributed      JAVA
29   Content Format
                                                                      Systems
                                                                   Knowledge &
     Clustering with Multi viewpoint-Based Similarity Measure                        JAVA
30
                                                                  Data Engineering
                                                                     Parallel &
     A Network Coding Equivalent Content Distribution Scheme
                                                                    Distributed      JAVA
31   for Efficient
                                                                      Systems
                                                                     Parallel &
     An Efficient Caching Scheme and Consistency
                                                                    Distributed      JAVA
32   Maintenance in Hybrid P2P System
                                                                      Systems
                                                                     Parallel &
                                                                    Distributed      JAVA
33   Cut detection in wireless sensor networks
                                                                      Systems
                                                                      Service
     Confucius: A Tool Supporting Collaborative Scientific                           JAVA
34   Workflow Composition                                           Computing
DOTNET2012

S.No.                        Project Title                           DOMINE         TECH

 1      A New Cell Counting Based Attack Against Tor.              Networking       .NET

 2      AMPLE: An Adaptive Traffic Engineering System Based on       Wireless
                                                                                    .NET
        Virtual Routing Topologies.                              Communications

 3      Compressed-Sensing-Enabled Video Streaming for
                                                                 Image Processing   .NET
        Wireless Multimedia Sensor Networks.

 4      Defenses Against Large Scale Online Password Guessing
                                                                 Image processing   .NET
        Attacks by using Persuasive click Points.

 5      Design and Implementation of TARF: A Trust-Aware
                                                                 Secure Computing   .NET
        Routing Framework for WSNs.

 6      Query Planning for Continuous Aggregation Queries          Data Mining      .NET

 7      Optimal Power Allocation in Multi-Relay MIMO
                                                                   Networking       .NET
        Cooperative Networks: Theory and Algorithms.

 8      Robust Face-Name Graph Matching for Movie Character
                                                                 Image Processing   .NET
        Identify.

 9      Scalable and Secure Sharing of Personal Health Records
                                                                 Cloud computing    .NET
        in Cloud Computing using Attribute-based Encryption

 10     Securing Node Capture Attacks for Hierarchical Data        International
                                                                                    .NET
        Aggregation in Wireless Sensor Networks                     Conference

 11     Semi supervised Biased Maximum Margin Analysis for
                                                                 Image processing   .NET
        Interactive Image Retrieval

 12     SPOC: A Secure and Privacy-preserving Opportunistic
                                                                    Parallel &
        Computing Framework for Mobile-Healthcare Emergency         Distributed     .NET
                                                                     Systems

 13     Topology control in mobile ad hoc networks with              Mobile         .NET
cooperative communications                                        Computing

14   Secure And Efficient Handover Authentication Based On
                                                                    Secure Computing   .NET
     Bilinear Pairing Functions

15   Grouping-Enhanced Resilient Probabilistic En-Route Filtering       Parallel &
     of Injected False Data in WSNs                                    Distributed     .NET
                                                                         Systems

16   Latency Equalization as a New Network Service Primitive           Networking      .NET

17   Efficient audit service outsourcing for data integrity in         Systems &
                                                                                       .NET
     clouds                                                             Software

18   Fair Torrent A Deficit – Based Distributed Algorithm to
                                                                       Networking      .NET
     Ensure Fairness in peer to peer Systems

     Network Assisted Mobile Computing with                              Mobile
19
                                                                                       .NET
     Optimal Uplink Query Processing                                   Computing
     BECAN: A Bandwidth-Efficient Cooperative                           Parallel &
20
     Authentication Scheme for Filtering Injected False Data in
     Wireless Sensor Networks                                       Distributed        .NET
                                                                    Systems
     Towards Secure and Dependable Storage Services in Cloud
21                                                                  Cloud Computing
     Computing
     Joint Relay and Jammer Selection for Secure Two-Way Relay      Information
22
     Networks
                                                                    Forensics&
                                                                    Security
     Automatic Reconfiguration for Large-Scale Reliable Storage
23                                                                  Secure Computing
     Systems
     Expert Discovery and Interactions in Mixed Service-Oriented    Service
24
     Systems
                                                                    Computing
Ieee 2012 projects

Mais conteúdo relacionado

Destaque

Otkriveno teslino tajno oružje
Otkriveno teslino tajno oružjeOtkriveno teslino tajno oružje
Otkriveno teslino tajno oružje
nemauser
 
Andrew research, planning & construction
Andrew  research, planning & constructionAndrew  research, planning & construction
Andrew research, planning & construction
andzzo
 
Andrew evaluation
Andrew  evaluationAndrew  evaluation
Andrew evaluation
andzzo
 

Destaque (9)

Molecules of Knowledge: Self-Organisation in Knowledge-Intensive Environments
Molecules of Knowledge: Self-Organisation in Knowledge-Intensive EnvironmentsMolecules of Knowledge: Self-Organisation in Knowledge-Intensive Environments
Molecules of Knowledge: Self-Organisation in Knowledge-Intensive Environments
 
Self-Organising News Management: The Molecules of Knowledge Approach
Self-Organising News Management: The Molecules of Knowledge ApproachSelf-Organising News Management: The Molecules of Knowledge Approach
Self-Organising News Management: The Molecules of Knowledge Approach
 
Otkriveno teslino tajno oružje
Otkriveno teslino tajno oružjeOtkriveno teslino tajno oružje
Otkriveno teslino tajno oružje
 
Andrew research, planning & construction
Andrew  research, planning & constructionAndrew  research, planning & construction
Andrew research, planning & construction
 
Andrew evaluation
Andrew  evaluationAndrew  evaluation
Andrew evaluation
 
Labelled Variables in Logic Programming: A First Prototipe in tuProlog
Labelled Variables in Logic Programming: A First Prototipe in tuPrologLabelled Variables in Logic Programming: A First Prototipe in tuProlog
Labelled Variables in Logic Programming: A First Prototipe in tuProlog
 
Coordination Models and Technologies toward Self-Organising Systems
Coordination Models and Technologies toward Self-Organising SystemsCoordination Models and Technologies toward Self-Organising Systems
Coordination Models and Technologies toward Self-Organising Systems
 
The Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
The Autonomy of Automated Systems: Social Systems and the Multi-level AutonomyThe Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
The Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
 
Coordination in Situated Systems: Engineering MAS Environment in TuCSoN
Coordination in Situated Systems: Engineering MAS Environment in TuCSoNCoordination in Situated Systems: Engineering MAS Environment in TuCSoN
Coordination in Situated Systems: Engineering MAS Environment in TuCSoN
 

Semelhante a Ieee 2012 projects

Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
ingenioustech
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titles
Srinivasan Natarajan
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011
IndicThreads
 
Malware Analysis and Prediction System
Malware Analysis and Prediction SystemMalware Analysis and Prediction System
Malware Analysis and Prediction System
Azri Hafiz
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vid
santosomar
 
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
Pantech ProEd Pvt Ltd
 
Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013
Kappa Data
 

Semelhante a Ieee 2012 projects (20)

IEEE Projects 2012
IEEE Projects 2012IEEE Projects 2012
IEEE Projects 2012
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
 
Java ieee 2015 16 projects from do8.in
Java ieee 2015 16 projects from do8.inJava ieee 2015 16 projects from do8.in
Java ieee 2015 16 projects from do8.in
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titles
 
5. _java_2012-13_titles
5.  _java_2012-13_titles5.  _java_2012-13_titles
5. _java_2012-13_titles
 
Java ieee 2015_project_list
Java ieee 2015_project_listJava ieee 2015_project_list
Java ieee 2015_project_list
 
Project list
Project listProject list
Project list
 
OpenStack Quantum Network Service
OpenStack Quantum Network ServiceOpenStack Quantum Network Service
OpenStack Quantum Network Service
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011
 
Project by Koushik
Project by KoushikProject by Koushik
Project by Koushik
 
Cloudfoundry architecture
Cloudfoundry architectureCloudfoundry architecture
Cloudfoundry architecture
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...
 
Windows Phone 7.5 와 Windows 8 메트로 스타일 앱 개발
Windows Phone 7.5  와 Windows 8 메트로 스타일 앱 개발Windows Phone 7.5  와 Windows 8 메트로 스타일 앱 개발
Windows Phone 7.5 와 Windows 8 메트로 스타일 앱 개발
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)
 
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
 
Malware Analysis and Prediction System
Malware Analysis and Prediction SystemMalware Analysis and Prediction System
Malware Analysis and Prediction System
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vid
 
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
 
Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013
 

Ieee 2012 projects

  • 1. IEEE 2012 PROJECTS Call:+919966062808 S.NO. Project Title DOMINE TECH Parallel & A Network Coding Equivalent Content Distribution Scheme Distributed JAVA 1 For Efficient Peer To Peer Interactive Vod Streaming Systems Parallel & An Optimizing Overlay Topologies For Search In Distributed JAVA 2 Unstructed Peer To Peer Networks Systems Automatic Discovery of Association Orders between Name Knowledge & and Aliases from the Web using Anchor Texts-based Co- JAVA 3 occurrences Data Engineering Cloud Data Production for Masses Cloud Computing JAVA 4 Clustering With Multi View Point – Based Similarity Knowledge & JAVA 5 Measure Data Engineering Parallel & Cooperative Provable Data Possession for Integrity Distributed JAVA 6 Verification in Multi-Cloud Storage Systems Parallel & Distributed Packet Buffers For High Band Width Switches Distributed JAVA 7 & Routers Systems Knowledge & Efficient Fuzzy Type – A Head Search In Xml Data JAVA 8 Data Engineering Fast Data Collection in Tree-Based Wireless Sensor Mobile JAVA 9 Networks. Computing Parallel & Foot Print Detecting Sybil Attacks In Urban Vehicular Distributed JAVA 10 Networks Systems Game-Theoretic Pricing for Video Streaming in Mobile Mobile JAVA 11 Networks Computing Hand Written Chinese Text Recognition By Integrating Pattern Analysis JAVA 12
  • 2. Multiple Contexts & Machine Intelligence In Tags We Trust: Trust modeling in social tagging of Signal Processing JAVA 13 multimedia content Learn to Personalized Image Search from the Photo Multimedia JAVA 14 Sharing Websites MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL Knowledge & JAVA 15 AND MECHANISMS Data Engineering Online Modeling of Proactive Moderation System for Secure JAVA 16 Auction Fraud Detection Computing Knowledge & Organizing User Search Histories JAVA 17 Data Engineering Packet Loss Control Using Tokens at the Network Edge Networking JAVA 18 Packet-Hiding Methods for Preventing Selective Jamming Secure JAVA 19 Attacks Computing Knowledge & Ranking Model Adaptation for Domain-Specific Search JAVA 20 Data Engineering Secure Risk-Aware Mitigation for MANET Routing Attacks JAVA 21 Computing Self Adaptive Contention Aware Routing Protocol For Mobile JAVA 22 Intermittently Connected Mobile Networks Computing Slicing: A New Approach to Privacy Preserving Data Knowledge & JAVA 23 Publishing Data Engineering Ensuring Distributed Accountability For Data Sharing In Secure JAVA 24 The Cloud. Computing Adaptive Opportunistic Routing for Wireless Ad Hoc Networking JAVA 25 Networks Vehicle Detection in Aerial Surveillance Using Dynamic Networking JAVA 26 Bayesian Networks Catching Packet Droppers and Modifiers in Wireless Parallel & JAVA 27 Sensor Networks Distributed
  • 3. Systems Energy-Efficient Cooperative Distribution with Statistical Networking JAVA 28 QoS Provisions Video Over Wireless Networks Parallel & CCD A Distributed Publish Subscribe Framework for Rich Distributed JAVA 29 Content Format Systems Knowledge & Clustering with Multi viewpoint-Based Similarity Measure JAVA 30 Data Engineering Parallel & A Network Coding Equivalent Content Distribution Scheme Distributed JAVA 31 for Efficient Systems Parallel & An Efficient Caching Scheme and Consistency Distributed JAVA 32 Maintenance in Hybrid P2P System Systems Parallel & Distributed JAVA 33 Cut detection in wireless sensor networks Systems Service Confucius: A Tool Supporting Collaborative Scientific JAVA 34 Workflow Composition Computing
  • 4. DOTNET2012 S.No. Project Title DOMINE TECH 1 A New Cell Counting Based Attack Against Tor. Networking .NET 2 AMPLE: An Adaptive Traffic Engineering System Based on Wireless .NET Virtual Routing Topologies. Communications 3 Compressed-Sensing-Enabled Video Streaming for Image Processing .NET Wireless Multimedia Sensor Networks. 4 Defenses Against Large Scale Online Password Guessing Image processing .NET Attacks by using Persuasive click Points. 5 Design and Implementation of TARF: A Trust-Aware Secure Computing .NET Routing Framework for WSNs. 6 Query Planning for Continuous Aggregation Queries Data Mining .NET 7 Optimal Power Allocation in Multi-Relay MIMO Networking .NET Cooperative Networks: Theory and Algorithms. 8 Robust Face-Name Graph Matching for Movie Character Image Processing .NET Identify. 9 Scalable and Secure Sharing of Personal Health Records Cloud computing .NET in Cloud Computing using Attribute-based Encryption 10 Securing Node Capture Attacks for Hierarchical Data International .NET Aggregation in Wireless Sensor Networks Conference 11 Semi supervised Biased Maximum Margin Analysis for Image processing .NET Interactive Image Retrieval 12 SPOC: A Secure and Privacy-preserving Opportunistic Parallel & Computing Framework for Mobile-Healthcare Emergency Distributed .NET Systems 13 Topology control in mobile ad hoc networks with Mobile .NET
  • 5. cooperative communications Computing 14 Secure And Efficient Handover Authentication Based On Secure Computing .NET Bilinear Pairing Functions 15 Grouping-Enhanced Resilient Probabilistic En-Route Filtering Parallel & of Injected False Data in WSNs Distributed .NET Systems 16 Latency Equalization as a New Network Service Primitive Networking .NET 17 Efficient audit service outsourcing for data integrity in Systems & .NET clouds Software 18 Fair Torrent A Deficit – Based Distributed Algorithm to Networking .NET Ensure Fairness in peer to peer Systems Network Assisted Mobile Computing with Mobile 19 .NET Optimal Uplink Query Processing Computing BECAN: A Bandwidth-Efficient Cooperative Parallel & 20 Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks Distributed .NET Systems Towards Secure and Dependable Storage Services in Cloud 21 Cloud Computing Computing Joint Relay and Jammer Selection for Secure Two-Way Relay Information 22 Networks Forensics& Security Automatic Reconfiguration for Large-Scale Reliable Storage 23 Secure Computing Systems Expert Discovery and Interactions in Mixed Service-Oriented Service 24 Systems Computing