Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cse,it ieee 2012 projects


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

Cse,it ieee 2012 projects

  1. 1. IEEE 2012 PROJECTS Call:+919966062808S.NO. Project Title DOMINE TECH Parallel & A Network Coding Equivalent Content Distribution Scheme Distributed JAVA1 For Efficient Peer To Peer Interactive Vod Streaming Systems Parallel & An Optimizing Overlay Topologies For Search In Distributed JAVA2 Unstructed Peer To Peer Networks Systems Automatic Discovery of Association Orders between Name Knowledge & and Aliases from the Web using Anchor Texts-based Co- JAVA3 occurrences Data Engineering Cloud Data Production for Masses Cloud Computing JAVA4 Clustering With Multi View Point – Based Similarity Knowledge & JAVA5 Measure Data Engineering Parallel & Cooperative Provable Data Possession for Integrity Distributed JAVA6 Verification in Multi-Cloud Storage Systems Parallel & Distributed Packet Buffers For High Band Width Switches Distributed JAVA7 & Routers Systems Knowledge & Efficient Fuzzy Type – A Head Search In Xml Data JAVA8 Data Engineering Fast Data Collection in Tree-Based Wireless Sensor Mobile JAVA9 Networks. Computing Parallel & Foot Print Detecting Sybil Attacks In Urban Vehicular Distributed JAVA10 Networks Systems Game-Theoretic Pricing for Video Streaming in Mobile Mobile JAVA11 Networks Computing Hand Written Chinese Text Recognition By Integrating Pattern Analysis JAVA12
  2. 2. Multiple Contexts & Machine Intelligence In Tags We Trust: Trust modeling in social tagging of Signal Processing JAVA13 multimedia content Learn to Personalized Image Search from the Photo Multimedia JAVA14 Sharing Websites MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL Knowledge & JAVA15 AND MECHANISMS Data Engineering Online Modeling of Proactive Moderation System for Secure JAVA16 Auction Fraud Detection Computing Knowledge & Organizing User Search Histories JAVA17 Data Engineering Packet Loss Control Using Tokens at the Network Edge Networking JAVA18 Packet-Hiding Methods for Preventing Selective Jamming Secure JAVA19 Attacks Computing Knowledge & Ranking Model Adaptation for Domain-Specific Search JAVA20 Data Engineering Secure Risk-Aware Mitigation for MANET Routing Attacks JAVA21 Computing Self Adaptive Contention Aware Routing Protocol For Mobile JAVA22 Intermittently Connected Mobile Networks Computing Slicing: A New Approach to Privacy Preserving Data Knowledge & JAVA23 Publishing Data Engineering Ensuring Distributed Accountability For Data Sharing In Secure JAVA24 The Cloud. Computing Adaptive Opportunistic Routing for Wireless Ad Hoc Networking JAVA25 Networks Vehicle Detection in Aerial Surveillance Using Dynamic Networking JAVA26 Bayesian Networks Catching Packet Droppers and Modifiers in Wireless Parallel & JAVA27 Sensor Networks Distributed
  3. 3. Systems Energy-Efficient Cooperative Distribution with Statistical Networking JAVA28 QoS Provisions Video Over Wireless Networks Parallel & CCD A Distributed Publish Subscribe Framework for Rich Distributed JAVA29 Content Format Systems Knowledge & Clustering with Multi viewpoint-Based Similarity Measure JAVA30 Data Engineering Parallel & A Network Coding Equivalent Content Distribution Scheme Distributed JAVA31 for Efficient Systems Parallel & An Efficient Caching Scheme and Consistency Distributed JAVA32 Maintenance in Hybrid P2P System Systems Parallel & Distributed JAVA33 Cut detection in wireless sensor networks Systems Service Confucius: A Tool Supporting Collaborative Scientific JAVA34 Workflow Composition Computing
  4. 4. DOTNET2012S.No. Project Title DOMINE TECH 1 A New Cell Counting Based Attack Against Tor. Networking .NET 2 AMPLE: An Adaptive Traffic Engineering System Based on Wireless .NET Virtual Routing Topologies. Communications 3 Compressed-Sensing-Enabled Video Streaming for Image Processing .NET Wireless Multimedia Sensor Networks. 4 Defenses Against Large Scale Online Password Guessing Image processing .NET Attacks by using Persuasive click Points. 5 Design and Implementation of TARF: A Trust-Aware Secure Computing .NET Routing Framework for WSNs. 6 Query Planning for Continuous Aggregation Queries Data Mining .NET 7 Optimal Power Allocation in Multi-Relay MIMO Networking .NET Cooperative Networks: Theory and Algorithms. 8 Robust Face-Name Graph Matching for Movie Character Image Processing .NET Identify. 9 Scalable and Secure Sharing of Personal Health Records Cloud computing .NET in Cloud Computing using Attribute-based Encryption 10 Securing Node Capture Attacks for Hierarchical Data International .NET Aggregation in Wireless Sensor Networks Conference 11 Semi supervised Biased Maximum Margin Analysis for Image processing .NET Interactive Image Retrieval 12 SPOC: A Secure and Privacy-preserving Opportunistic Parallel & Computing Framework for Mobile-Healthcare Emergency Distributed .NET Systems 13 Topology control in mobile ad hoc networks with Mobile .NET
  5. 5. cooperative communications Computing14 Secure And Efficient Handover Authentication Based On Secure Computing .NET Bilinear Pairing Functions15 Grouping-Enhanced Resilient Probabilistic En-Route Filtering Parallel & of Injected False Data in WSNs Distributed .NET Systems16 Latency Equalization as a New Network Service Primitive Networking .NET17 Efficient audit service outsourcing for data integrity in Systems & .NET clouds Software18 Fair Torrent A Deficit – Based Distributed Algorithm to Networking .NET Ensure Fairness in peer to peer Systems Network Assisted Mobile Computing with Mobile19 .NET Optimal Uplink Query Processing Computing BECAN: A Bandwidth-Efficient Cooperative Parallel &20 Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks Distributed .NET Systems Towards Secure and Dependable Storage Services in Cloud21 Cloud Computing Computing Joint Relay and Jammer Selection for Secure Two-Way Relay Information22 Networks Forensics& Security Automatic Reconfiguration for Large-Scale Reliable Storage23 Secure Computing Systems Expert Discovery and Interactions in Mixed Service-Oriented Service24 Systems Computing