This document provides contact information for Richbrain Technologies and lists IEEE final year project titles in various domains such as cloud computing, data mining, parallel distribution, mobile computing, networking, and network security. It contains over 100 potential project titles that students can choose from for their B.E., B.Tech, M.E or M.Tech degrees. Contact is provided via mobile number and email for students to learn more.
2010 presentation for college educators about what journalism students need to know before they graduate and enter the workforce. Discusses multimedia storytelling, social media, business skills, freelancing, digital technology and evolving media landscapes.
2008 workshop session for print journalists just getting started with multimedia storytelling. Covers tips and suggestions for working with audio, digital photography, video and slideshows.
2010 presentation for college educators about what journalism students need to know before they graduate and enter the workforce. Discusses multimedia storytelling, social media, business skills, freelancing, digital technology and evolving media landscapes.
2008 workshop session for print journalists just getting started with multimedia storytelling. Covers tips and suggestions for working with audio, digital photography, video and slideshows.
Beginner's Guide to Chartered Accountancy Coursecastuffblogger
Specially Designed Presentation for 12th Passout Students, to understand the whole Frame work of CA Course, Procedures and additional required programs. This is an comprehensive presentation which will make you understand how to become Chartered Accoutant.
In 2008, I founded the City of Greer Event Center's pricing for their annual fee schedule that I presented to city coucil. While I met with City Administrator, Ed Driggers, and through these meetings shaped what the city started with and remains in place today. Other than the nepotismish approach that the City of Greer has and Ed Drigger's peculiar question to me about not having children a week before I was let go due to the 2008 economic downturn, I had a good experience in the town over from my hometown after being away for 15 years. By the way Eddie, I have a daughter now, so I guess if that were the case in 2008, I wouldn't have lost my job?!?!
Country Analysis- The Republic of South Africa by Daniel Stone, MBADaniel J. Stone, MBA
However, the readiness or competitiveness of South Africa is strong and a good fit for foreign direct investments. This is due to South Africans having the right to the various levels of public education. As a result, there is a large pool of young and educated workers found in this country that will take to on-the-job training and retain the newly acquired knowledge.
Beginner's Guide to Chartered Accountancy Coursecastuffblogger
Specially Designed Presentation for 12th Passout Students, to understand the whole Frame work of CA Course, Procedures and additional required programs. This is an comprehensive presentation which will make you understand how to become Chartered Accoutant.
In 2008, I founded the City of Greer Event Center's pricing for their annual fee schedule that I presented to city coucil. While I met with City Administrator, Ed Driggers, and through these meetings shaped what the city started with and remains in place today. Other than the nepotismish approach that the City of Greer has and Ed Drigger's peculiar question to me about not having children a week before I was let go due to the 2008 economic downturn, I had a good experience in the town over from my hometown after being away for 15 years. By the way Eddie, I have a daughter now, so I guess if that were the case in 2008, I wouldn't have lost my job?!?!
Country Analysis- The Republic of South Africa by Daniel Stone, MBADaniel J. Stone, MBA
However, the readiness or competitiveness of South Africa is strong and a good fit for foreign direct investments. This is due to South Africans having the right to the various levels of public education. As a result, there is a large pool of young and educated workers found in this country that will take to on-the-job training and retain the newly acquired knowledge.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
2012 2013 ieee be btech java projects richbraintechnologies
1. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
CLOUD COMPUTING
1. A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
2. Cloud Computing Security: From Single to Multi-Clouds
3. Cooperative Provable Data Possession for Integrity Verification in Multi-
Cloud Storage
4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing
5. Outsourced Similarity Search on Metric Data Assets
6. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
7. Toward Secure and Dependable Storage Services in Cloud Computing
8. Ensuring Distributed Accountability for Data Sharing in the Cloud
9. Portable Cloud Services Using TOSCA
10.Enabling Secure and Efficient Ranked Keyword Search over Outsourced
Cloud Data
11.Efficient Audit Service Outsourcing for Data Integrity in Clouds
12.Cloud Data Production for Masses
13.A Gossip Protocol for Dynamic Resource Management in Large Cloud
Environments
14. EduCloud: PaaS versus IaaS Cloud Usage for an Advanced Computer
Science Course
2. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
CLOUD COMPUTING
15.MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the
Cloud.
16.Monitoring and Detecting Abnormal Behavior in Mobile Cloud
Infrastructure
17.Impact of Storage Acquisition Intervals on the Cost-Efficiency of the
Private vs. Public Storage.
18.Managing A Cloud for Multi-agent Systems on Ad-hoc Networks.
19.Reliable Re-encryption in Unreliable Clouds
20.Costing of Cloud Computing Services A Total Cost of Ownership Approach.
21.Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
22.Gossip-based Resource Management for Cloud Environments
23.pCloud: A Distributed System for Practical PIR.
3. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
1. Clustering with Multi-viewpoint-Based Similarity Measure
2. Efficient Extended Boolean Retrieval
3. Ranking Model Adaptation for Domain-Specific Search
4. Slicing: A New Approach for Privacy Preserving Data Publishing
5. Efficient Fuzzy Type-Ahead Search in XML Data
6. Effective Pattern Discovery for Text Mining
7. Ranking Model Adaptation For Domain-Specific Search
8. Organizing User Search Histories
9. Query Planning For continuous Aggragation Queries over a Network of
Data Aggregators
10.ROAD: A New Spatial Object Search Framework for Road Networks
11.D-Cache: Universa l Distance Cache for Metric Access Methods
12.Creating Evolving User Behavior Profiles Automatically
13.Discovering Characterizations of the Behavior of Anomalous Sub-
populations
14.Clustering with Multi viewpoint-Based Similarity Measure
15.Optimizing Bloom Filter Settings in Peer-to-Peer Multi-keyword Searching
16.The Adaptive Clustering Methods for Long Time Problem of
Recommended
17.System
18.Adding Temporal Constraints to XML Schema
4. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
19.Geometric Data Perturbation for Privacy Preserving Outsourced Data
Mining.
20..A Temporal Pattern Search Algorithm for Personal History Event
Visualization.
21.Coupled Behavior Analysis for Capturing Coupling Relationships in Group-
based Market Manipulations.
22.Direct and Indirect Discrimination Prevention Methods.
23.Coupled Behavior Analysis for Capturing Coupling Relationships in Group-
based Market Manipulations.
24.Direct and Indirect Discrimination Prevention Methods.
25.Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
26.Efficient Multi-dimensional Fuzzy Search for Personal Information
Management Systems.
27.Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias
Detection.
28.Enabling cross-site interactions in social networks.
29.Credibility Ranking of Tweets during High Impact Events.
30.How do Facebookers use Friendlists
31.Enabling Multilevel Trust in Privacy Preserving Data Mining.
32.Anomaly Detection for Discrete Sequences: A Survey.
33.Advance Mining of Temporal High Utility Itemset.
34.An Exploration of Improving Collaborative Recommender Systems via
User-Item Subgroups.
35.Multiparty Access Control for Online Social Networks Model and
Mechanisms
5. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
36.Automatic Discovery of Association Orders between Name and Aliases
from the Web using Anchor Texts-based Co-occurrences
37.Efficient Similarity Search over Encrypted Data
38.Statistical Entity Extraction from Web.
39.Efficient Computation of Range Aggregates against Uncertain Location
Based Queries.
40.A Framework for Personal Mobile Commerce Pattern Mining and
Prediction.
41.On the Spectral Characterization and Scalable Mining of Network
Communities.
42.Confucius: A Tool Supporting Collaborative Scientific Workflow
Composition.
43.Efficient Anonymous Message Submission.
44.Fast and accurate annotation of short texts with Wikipedia pages.
45. Investigation and Analysis of New Approach of Intelligent Semantic Web
Search Engines.
6. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
PARLLEL DISTRIBUTION
1. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P
Networks
2. Payments for Outsourced Computations
3. Cut Detection in Wireless Sensor Networks
4. A Framework for Routing Performance Analysis in Delay Tolerant
Networks with Application to Non-cooperative Networks
5. CCD: A Distributed Publish/Subscribe Framework for Rich Content
Formats
6. Catching Packets Droppers and Modifiers in Wireless Sensor Network
7. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks
8. Design and Implementation of TARF: A Trust-Aware Routing FrameWork
for WSNs
9. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
10.SPOC: A Secure and Privacy Preserving Oppertunistic Computing
FrameWork For Mobile Healthcare Emergency
11.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile
Sinks
12.Catching Packet Droppers and Modifiers in Wireless Sensor Networks
13.Bounding the Impact of Unbounded Attacks in Stabilization
14.Balancing the Trade-Offs between Query Delay and Data A vailability in
MANETs
7. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
1. Fast Data Collection in Tree-Based Wireless Sensor Networks
2. Protecting Location Privacy in Sensor Networks against a Global
Eavesdropper
3. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth
Guarantees
4. A Trigger Identification Service for Defending Reactive Jammers in
WSN
5. Network Assisted Mobile computing with Optimal uplink Query
Processing
6. Secure and Efficient Handover Authentication Based on Bilinear Pairing
Functions
7. Cooperative Download in Vehicular Environments
8. Network Assisted Mobile Computing with Optimal Uplink Query
Processing
9. On Quality of Monitoring for Multi-channel Wireless Infrastructure
Networks
10.Distributed Throughput Maximization in Wireless Networks via Ran
dom Power Allocation
11.Toward Reliable Data Delivery for Highly Dynamic Mobil Ad Hoc
Networks
12.Learn to Personalized Image Search from the Photo Sharing Websites
8. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
13.Energy-Efficient Strategies for Cooperative Multichannel MAC
Protocols
14.FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism
for Multihop Cellular Networks
15.Topology Control in Mobile Ad Hoc Networks with Cooperative
Communications
16.Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
17.Handling Selfishness in Replica Allocation over a Mobile Ad Hoc
Network
18.Improving QoS in High-Speed Mobility Using Bandwidth Maps
19.CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile
Ad Hoc Networks
20.DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks
with Directional Antennas
21.Moderated Group Authoring System for Campus-Wide Workgroups
9. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
1. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
2. Design, Implementation, and Performance of a Load Balancer for SIP
Server Clusters
3. Independent Directed Acyclic Graphs for Resilient Multipath Routing
4. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
5. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
6. RIHT: A Novel Hybrid IP Traceback Scheme
7. Router Support for Fine-Grained Latency Measurements
8. Packet Loss Control Using Tokens at the Network Edge
9. Latency Equalization as a New Network Service Primitive
10.Balancing the Trade offs between Query Delay and Data Availability in
MANETs
11.Fair Torrent: A Deficit-based Distributed Algorithm to Ensure Fairness in
Peer-to-Peer Systems
12.Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia
Sensor Networks
13.Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks:
Theory and Algorithms
14.A New Cell Counting Based Attack Against Tor
15.A Network Coding Equivalent Content Distribution Scheme for Efficient
Peer-to-Peer Interactive VoD Streaming
16.BGP Churn Evolution: A Perspective From the Core
17.Distributed Packet Buffers for High-Bandwidth Switches and Routers
18. Policy-by-Example for Online Social Networks.
10. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
19.Efficient Error Estimating Coding: Feasibility and Applications
20.Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
21.Insights on Media Streaming Progress Using Bit Torrent-Like Protocols for
On-Demand Streaming
22.On Optimizing Overlay Topologies for Search in Unstructured Peer-to-
Peer Networks
23.Self Adaptive Contention Aware Routing Protocol for Intermittently
Connected Mobile Networks
24.Optimal Source-Based Filtering of Malicious Traffic
25.Packet-Hiding Methods for Preventing Selective Jamming Attacks
26.FireCol: A Collaborative Protection Network for the Detection of Flooding
DDoS Attacks
27.Handling Multiple Failures in IP Networks through Localized On-Demand
Link State Routing.
28.TrickleDNS: Bootstrapping DNS Security using Social Trust.
29.Auditing for Network Coding Storage.
30.Optimizing Cloud Resources for Delivering IPTV Services through
Virtualization.
31.An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P
System.
32.Game-Theoretic Pricing for Video Streaming in Mobile Networks.
33.Security Architecture for Cloud Networking.
11. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKSECURITY
1. A Trapdoor Hash-Based Mechanism for Stream Authentication
2. Double Guard: Detecting Intrusions in Multitier Web Applications
3. Ensuring Distributed Accountability for Data Sharing in the Cloud
4. Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
Cyborg?
5. Packet-Hiding Methods for Preventing Selective Jamming Attacks
6. Enforcing Mandatory Access Control in Commodity OS to Disable
Malware
7. Enhancing Data Trustworthiness via Assured Digital Signing
8. Secure Overlay Cloud Storage with Access Control and Assured
Deletion
9. AES Keys And Round Functions For Data Security
10.Implementation Of RSA Algorithm Using Elliptic Curve Algorithm For
Security
11.Fast Matrix Embedding by Matrix Extending
12.Distributed Private Key Generation for Identity Based Cryptosystems in
Ad Hoc Networks
13.Risk-Aware Mitigation for MANET Routing Attacks
14.Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
15.A Secure Single Sign-On Mechanism for Distributed Computer
Networks
12. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
IMAGE PROCESSING
1. Scalable Coding of Encrypted Images
2. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
3. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for
Binary Covers
4. Adaptive Membership Functions for Hand-Written Character Recognition
by Voronoi-based Image Zoning
5. Game-Theoretic Pricing for Video Streaming in Mobile Networks
6. A Blur-Robust Descriptor with Applications to Face Recognition
7. Handwritten Chinese Text Recognition by Integrating Multiple Contexts
8. A Secret-Sharing-Based Method for Authentication of Grayscale
Document Images via the Use of the PNG Image With a Data Repair
Capability
9. An Online Learning Approach to Occlusion Boundary Detection
10.Combining Head Pose and Eye Location Information for Gaze Estimation
11.Edge Strength Filter Based Color Filter Array Interpolation
12.Probabilistic Exposure Fusion
13.Change Detection in Synthetic Aperture Radar Images based on Image
Fusion and Fuzzy Clustering
14.Active Curve Recovery of Region Boundary Patterns
15.Human Identification Using Temporal Information Preserving Gait
Template
16.Minimum-Distortion Isometric Shape Correspondence Using EM Algorithm
13. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SERVICE COMPUTING
1. Bootstrapping Ontologies for Web Services
2. Expert Discovery and Interactions in Mixed Service-Oriented Systems
3. Towards Secure and Dependable Storage Services in Cloud Computing.
4. Detecting Spam Zombies by Monitoring Outgoing Messages
5. Expert Discovery and Interactions in Mixed Service-Oriented Systems
6. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
14. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SECURE COMPUTING
1. A Stochastic Model of Multi-virus Dynamics
2. Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
3. Detecting and Resolving Firewall Policy Anomalies
4. Detecting Spam Zombies by Monitoring Outgoing Messages
5. On the Security of a Ticket-Based Anonymity System with Traceability
Property in Wireless Mesh Networks
6. Online Modeling of Proactive Moderation System for Auction Fraud
Detection
7. Packet-Hiding Methods for Preventing Selective Jamming Attacks
8. Risk-Aware Mitigation for MANET Routing Attacks
9. DoubleGuard: Detecting Intrusions in Multitier Web Applications
10.The Devils Behind Web Application Vulnerabilities.
11.Secure Overlay Cloud Storage with Access Control and Assured
Deletion.
12.Detecting Anomalous Insiders in Collaborative Information Systems.
13.Data-Provenance Verification For Secure Hosts.
14.pCloud: A Distributed System for Practical PIR.
15.Privacy-preserving Enforcement of Spatially Aware RBAC.
16.SecuredTrust: A Dynamic Trust Computation Model for Secured
Communication in Multi-Agent Systems.
15. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SECURE COMPUTING
17.Remote Attestation with Domain-Based Integrity Model and Policy
Analysis.
18.Persuasive Cued Click-Points: Design, implementation, and evaluation
of a knowledge-based authentication mechanism.
19.A Learning-Based Approach to Reactive Security.
20.Detecting Spam Zombies by Monitoring Outgoing Messages.
16. Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 FINAL YEAR PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 JAVA PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
WIRELESS COMMUNICATIONS
1. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc
Networks.
2. Cut Detection in Wireless Sensor Networks.
SOFTWARE ENGINEERING
1. PerLa: a Language and Middleware Architecture for Data Management and
Integration in Pervasive Information Systems.
2. Invariant-Based Automatic Testing of Modern Web Applications
MULTIMEDIA
1. Learn to Personalized Image Search from the Photo Sharing Websites.
2. Trust modeling in social tagging of multimedia content.