SlideShare a Scribd company logo
1 of 11
Download to read offline
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
CLOUD COMPUTING
1. A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
2. Cloud Computing Security: From Single to Multi-Clouds
3. Cooperative Provable Data Possession for Integrity Verification in Multi-
Cloud Storage
4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing
5. Outsourced Similarity Search on Metric Data Assets
6. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
7. Toward Secure and Dependable Storage Services in Cloud Computing
8. Ensuring Distributed Accountability for Data Sharing in the Cloud
9. Portable Cloud Services Using TOSCA
10.Enabling Secure and Efficient Ranked Keyword Search over Outsourced
Cloud Data
11.Efficient Audit Service Outsourcing for Data Integrity in Clouds
12.Cloud Data Production for Masses
13.A Gossip Protocol for Dynamic Resource Management in Large Cloud
Environments
14. EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer
Science Course
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
1. Clustering with Multi-viewpoint-Based Similarity Measure
2. Efficient Extended Boolean Retrieval
3. Ranking Model Adaptation for Domain-Specific Search
4. Slicing: A New Approach for Privacy Preserving Data Publishing
5. Efficient Fuzzy Type-Ahead Search in XML Data
6. Effective Pattern Discovery for Text Mining
7. Ranking Model Adaptation For Domain-Specific Search
8. Organizing User Search Histories
9. Query Planning For continuous Aggragation Queries over a Network of
Data Aggregators
10.ROAD: A New Spatial Object Search Framework for Road Networks
11.D-Cache: Universa l Distance Cache for Metric Access Methods
12.Creating Evolving User Behavior Profiles Automatically
13.Discovering Characterizations of the Behavior of Anomalous Sub-
populations
14.Clustering with Multi viewpoint-Based Similarity Measure
15.Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching
16.The Adaptive Clustering Methods for Long Time Problem of
Recommended
17.System
18.Adding Temporal Constraints to XML Schema
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
PARLLEL DISTRIBUTION
1. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P
Networks
2. Payments for Outsourced Computations
3. Cut Detection in Wireless Sensor Networks
4. A Framework for Routing Performance Analysis in Delay Tolerant
Networks with Application to Non-cooperative Networks
5. CCD: A Distributed Publish/Subscribe Framework for Rich Content
Formats
6. Catching Packets Droppers and Modifiers in Wireless Sensor Network
7. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks
8. Design and Implementation of TARF: A Trust-Aware Routing FrameWork
for WSNs
9. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
10.SPOC: A Secure and Privacy Preserving Oppertunistic Computing
FrameWork For Mobile Healthcare Emergency
11.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile
Sinks
12.Catching Packet Droppers and Modifiers in Wireless Sensor Networks
13.Bounding the Impact of Unbounded Attacks in Stabilization
14.Balancing the Trade-Offs between Query Delay and Data A vailability in
MANETs
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
1. Fast Data Collection in Tree-Based Wireless Sensor Networks
2. Protecting Location Privacy in Sensor Networks against a Global
Eavesdropper
3. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth
Guarantees
4. A Trigger Identification Service for Defending Reactive Jammers in
WSN
5. Network Assisted Mobile computing with Optimal uplink Query
Processing
6. Secure and Efficient Handover Authentication Based on Bilinear Pairing
Functions
7. Cooperative Download in Vehicular Environments
8. Network Assisted Mobile Computing with Optimal Uplink Query
Processing
9. On Quality of Monitoring for Multi-channel Wireless Infrastructure
Networks
10.Distributed Throughput Maximization in Wireless Networks via Ran
dom Power Allocation
11.Toward Reliable Data Delivery for Highly Dynamic Mobil Ad Hoc
Networks
12.Learn to Personalized Image Search from the Photo Sharing Websites
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
13.Energy-Efficient Strategies for Cooperative Multichannel MAC
Protocols
14.FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism
for Multihop Cellular Networks
15.Topology Control in Mobile Ad Hoc Networks with Cooperative
Communications
16.Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
17.Handling Selfishness in Replica Allocation over a Mobile Ad Hoc
Network
18.Improving QoS in High-Speed Mobility Using Bandwidth Maps
19.CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile
Ad Hoc Networks
20.DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks
with Directional Antennas
21.Moderated Group Authoring System for Campus-Wide Workgroups
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
1. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
2. Design, Implementation, and Performance of a Load Balancer for SIP
Server Clusters
3. Independent Directed Acyclic Graphs for Resilient Multipath Routing
4. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
5. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
6. RIHT: A Novel Hybrid IP Traceback Scheme
7. Router Support for Fine-Grained Latency Measurements
8. Packet Loss Control Using Tokens at the Network Edge
9. Latency Equalization as a New Network Service Primitive
10.Balancing the Trade offs between Query Delay and Data Availability in
MANETs
11.Fair Torrent: A Deficit-based Distributed Algorithm to Ensure Fairness in
Peer-to-Peer Systems
12.Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia
Sensor Networks
13.Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks:
Theory and Algorithms
14.A New Cell Counting Based Attack Against Tor
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
15.A Network Coding Equivalent Content Distribution Scheme for Efficient
Peer-to-
16.Peer Interactive VoD Streaming
17.BGP Churn Evolution: A Perspective From the Core
18.Distributed Packet Buffers for High-Bandwidth Switches and Routers
19.Efficient Error Estimating Coding: Feasibility and Applications
20.Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
21.Insights on Media Streaming Progress Using Bit Torrent-Like Protocols for
On-
22.Demand Streaming
23.On Optimizing Overlay Topologies for Search in Unstructured Peer-to-
Peer
24.Networks
25.Self Adaptive Contention Aware Routing Protocol for Intermittently
Connected
26.Mobile Networks
27.Optimal Source-Based Filtering of Malicious Traffic
28.Packet-Hiding Methods for Preventing Selective Jamming Attacks
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKSECURITY
1. A Trapdoor Hash-Based Mechanism for Stream Authentication
2. Double Guard: Detecting Intrusions in Multitier Web Applications
3. Ensuring Distributed Accountability for Data Sharing in the Cloud
4. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
Cyborg?
5. Packet-Hiding Methods for Preventing Selective Jamming Attacks
6. Enforcing Mandatory Access Control in Commodity OS to Disable
Malware
7. Enhancing Data Trustworthiness via Assured Digital Signing
8. Secure Overlay Cloud Storage with Access Control and Assured
Deletion
9. AES Keys And Round Functions For Data Security
10.Implementation Of RSA Algorithm Using Elliptic Curve Algorithm For
Security
11.Fast Matrix Embedding by Matrix Extending
12.Distributed Private Key Generation for Identity Based Cryptosystems in
Ad Hoc Networks
13.Risk-Aware Mitigation for MANET Routing Attacks
14.Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
15.A Secure Single Sign-On Mechanism for Distributed Computer
Networks
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
IMAGE PROCESSING
1. Scalable Coding of Encrypted Images
2. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
3. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for
Binary Covers
4. Adaptive Membership Functions for Hand-Written Character Recognition
by Voronoi-based Image Zoning
5. Game-Theoretic Pricing for Video Streaming in Mobile Networks
6. A Blur-Robust Descriptor with Applications to Face Recognition
7. Handwritten Chinese Text Recognition by Integrating Multiple Contexts
8. A Secret-Sharing-Based Method for Authentication of Grayscale
Document Images via the Use of the PNG Image With a Data Repair
Capability
9. An Online Learning Approach to Occlusion Boundary Detection
10.Combining Head Pose and Eye Location Information for Gaze Estimation
11.Edge Strength Filter Based Color Filter Array Interpolation
12.Probabilistic Exposure Fusion
13.Change Detection in Synthetic Aperture Radar Images based on Image
Fusion and Fuzzy Clustering
14.Active Curve Recovery of Region Boundary Patterns
15.Human Identification Using Temporal Information Preserving Gait
Template
16.Minimum-Distortion Isometric Shape Correspondence Using EM Algorithm
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SERVICE COMPUTING
1. Bootstrapping Ontologies for Web Services
2. Expert Discovery and Interactions in Mixed Service-Oriented Systems
3. Towards Secure and Dependable Storage Services in Cloud Computing.
4. Detecting Spam Zombies by Monitoring Outgoing Messages
5. Expert Discovery and Interactions in Mixed Service-Oriented Systems
6. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SECURE COMPUTING
1. A Stochastic Model of Multi-virus Dynamics
2. Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
3. Detecting and Resolving Firewall Policy Anomalies
4. Detecting Spam Zombies by Monitoring Outgoing Messages
5. On the Security of a Ticket-Based Anonymity System with Traceability
Property in Wireless Mesh Networks
6. Online Modeling of Proactive Moderation System for Auction Fraud
Detection
7. Packet-Hiding Methods for Preventing Selective Jamming Attacks
8. Risk-Aware Mitigation for MANET Routing Attacks
9. DoubleGuard: Detecting Intrusions in Multitier Web Applications

More Related Content

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 

Featured

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Featured (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Ieee 2012 2013 be student java projects richbraintech

  • 1. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH. Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com CLOUD COMPUTING 1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding 2. Cloud Computing Security: From Single to Multi-Clouds 3. Cooperative Provable Data Possession for Integrity Verification in Multi- Cloud Storage 4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing 5. Outsourced Similarity Search on Metric Data Assets 6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 7. Toward Secure and Dependable Storage Services in Cloud Computing 8. Ensuring Distributed Accountability for Data Sharing in the Cloud 9. Portable Cloud Services Using TOSCA 10.Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 11.Efficient Audit Service Outsourcing for Data Integrity in Clouds 12.Cloud Data Production for Masses 13.A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments 14. EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer Science Course
  • 2. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com DATA MINING 1. Clustering with Multi-viewpoint-Based Similarity Measure 2. Efficient Extended Boolean Retrieval 3. Ranking Model Adaptation for Domain-Specific Search 4. Slicing: A New Approach for Privacy Preserving Data Publishing 5. Efficient Fuzzy Type-Ahead Search in XML Data 6. Effective Pattern Discovery for Text Mining 7. Ranking Model Adaptation For Domain-Specific Search 8. Organizing User Search Histories 9. Query Planning For continuous Aggragation Queries over a Network of Data Aggregators 10.ROAD: A New Spatial Object Search Framework for Road Networks 11.D-Cache: Universa l Distance Cache for Metric Access Methods 12.Creating Evolving User Behavior Profiles Automatically 13.Discovering Characterizations of the Behavior of Anomalous Sub- populations 14.Clustering with Multi viewpoint-Based Similarity Measure 15.Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching 16.The Adaptive Clustering Methods for Long Time Problem of Recommended 17.System 18.Adding Temporal Constraints to XML Schema
  • 3. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com PARLLEL DISTRIBUTION 1. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks 2. Payments for Outsourced Computations 3. Cut Detection in Wireless Sensor Networks 4. A Framework for Routing Performance Analysis in Delay Tolerant Networks with Application to Non-cooperative Networks 5. CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats 6. Catching Packets Droppers and Modifiers in Wireless Sensor Network 7. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks 8. Design and Implementation of TARF: A Trust-Aware Routing FrameWork for WSNs 9. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 10.SPOC: A Secure and Privacy Preserving Oppertunistic Computing FrameWork For Mobile Healthcare Emergency 11.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 12.Catching Packet Droppers and Modifiers in Wireless Sensor Networks 13.Bounding the Impact of Unbounded Attacks in Stabilization 14.Balancing the Trade-Offs between Query Delay and Data A vailability in MANETs
  • 4. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com MOBILE COMPUTING 1. Fast Data Collection in Tree-Based Wireless Sensor Networks 2. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 3. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees 4. A Trigger Identification Service for Defending Reactive Jammers in WSN 5. Network Assisted Mobile computing with Optimal uplink Query Processing 6. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions 7. Cooperative Download in Vehicular Environments 8. Network Assisted Mobile Computing with Optimal Uplink Query Processing 9. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 10.Distributed Throughput Maximization in Wireless Networks via Ran dom Power Allocation 11.Toward Reliable Data Delivery for Highly Dynamic Mobil Ad Hoc Networks 12.Learn to Personalized Image Search from the Photo Sharing Websites
  • 5. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com MOBILE COMPUTING 13.Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols 14.FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks 15.Topology Control in Mobile Ad Hoc Networks with Cooperative Communications 16.Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols 17.Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network 18.Improving QoS in High-Speed Mobility Using Bandwidth Maps 19.CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks 20.DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas 21.Moderated Group Authoring System for Campus-Wide Workgroups
  • 6. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKING 1. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks 2. Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters 3. Independent Directed Acyclic Graphs for Resilient Multipath Routing 4. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring 5. Privacy- and Integrity-Preserving Range Queries in Sensor Networks 6. RIHT: A Novel Hybrid IP Traceback Scheme 7. Router Support for Fine-Grained Latency Measurements 8. Packet Loss Control Using Tokens at the Network Edge 9. Latency Equalization as a New Network Service Primitive 10.Balancing the Trade offs between Query Delay and Data Availability in MANETs 11.Fair Torrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems 12.Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 13.Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms 14.A New Cell Counting Based Attack Against Tor
  • 7. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKING 15.A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to- 16.Peer Interactive VoD Streaming 17.BGP Churn Evolution: A Perspective From the Core 18.Distributed Packet Buffers for High-Bandwidth Switches and Routers 19.Efficient Error Estimating Coding: Feasibility and Applications 20.Footprint: Detecting Sybil Attacks in Urban Vehicular Networks 21.Insights on Media Streaming Progress Using Bit Torrent-Like Protocols for On- 22.Demand Streaming 23.On Optimizing Overlay Topologies for Search in Unstructured Peer-to- Peer 24.Networks 25.Self Adaptive Contention Aware Routing Protocol for Intermittently Connected 26.Mobile Networks 27.Optimal Source-Based Filtering of Malicious Traffic 28.Packet-Hiding Methods for Preventing Selective Jamming Attacks
  • 8. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKSECURITY 1. A Trapdoor Hash-Based Mechanism for Stream Authentication 2. Double Guard: Detecting Intrusions in Multitier Web Applications 3. Ensuring Distributed Accountability for Data Sharing in the Cloud 4. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? 5. Packet-Hiding Methods for Preventing Selective Jamming Attacks 6. Enforcing Mandatory Access Control in Commodity OS to Disable Malware 7. Enhancing Data Trustworthiness via Assured Digital Signing 8. Secure Overlay Cloud Storage with Access Control and Assured Deletion 9. AES Keys And Round Functions For Data Security 10.Implementation Of RSA Algorithm Using Elliptic Curve Algorithm For Security 11.Fast Matrix Embedding by Matrix Extending 12.Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks 13.Risk-Aware Mitigation for MANET Routing Attacks 14.Joint Relay and Jammer Selection for Secure Two-Way Relay Networks 15.A Secure Single Sign-On Mechanism for Distributed Computer Networks
  • 9. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com IMAGE PROCESSING 1. Scalable Coding of Encrypted Images 2. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 3. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers 4. Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning 5. Game-Theoretic Pricing for Video Streaming in Mobile Networks 6. A Blur-Robust Descriptor with Applications to Face Recognition 7. Handwritten Chinese Text Recognition by Integrating Multiple Contexts 8. A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability 9. An Online Learning Approach to Occlusion Boundary Detection 10.Combining Head Pose and Eye Location Information for Gaze Estimation 11.Edge Strength Filter Based Color Filter Array Interpolation 12.Probabilistic Exposure Fusion 13.Change Detection in Synthetic Aperture Radar Images based on Image Fusion and Fuzzy Clustering 14.Active Curve Recovery of Region Boundary Patterns 15.Human Identification Using Temporal Information Preserving Gait Template 16.Minimum-Distortion Isometric Shape Correspondence Using EM Algorithm
  • 10. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com SERVICE COMPUTING 1. Bootstrapping Ontologies for Web Services 2. Expert Discovery and Interactions in Mixed Service-Oriented Systems 3. Towards Secure and Dependable Storage Services in Cloud Computing. 4. Detecting Spam Zombies by Monitoring Outgoing Messages 5. Expert Discovery and Interactions in Mixed Service-Oriented Systems 6. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
  • 11. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 JAVA PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com SECURE COMPUTING 1. A Stochastic Model of Multi-virus Dynamics 2. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 3. Detecting and Resolving Firewall Policy Anomalies 4. Detecting Spam Zombies by Monitoring Outgoing Messages 5. On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks 6. Online Modeling of Proactive Moderation System for Auction Fraud Detection 7. Packet-Hiding Methods for Preventing Selective Jamming Attacks 8. Risk-Aware Mitigation for MANET Routing Attacks 9. DoubleGuard: Detecting Intrusions in Multitier Web Applications