Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ieee 2012 titles for java & .net


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

Ieee 2012 titles for java & .net

  1. 1. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email : temasolution@gmail.comS.NO PROJECT TITLE CODE YEAR CLOUD COMPUTING 1. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable JD001 2012 Access Control in Cloud Computing 2. A Secure Erasure Code-Based Cloud Storage System with Secure Data JD002 2012 Forwarding 3. Enabling Secure and Efficient Ranked Keyword Search over Outsourced JD003 2012 Cloud Data 4. A service oriented livestock management system using occasionally JD004 2012 connected mobile-cloud architecture 5. Privacy Preserving Access Control with Authentication for Securing Data in JD005 2012 Clouds 6. Data Outsourcing Simplified: Generating Data Connectors from JD006 2012 Confidentiality and Access Policies 7. Towards bringing real-time online applications on Clouds JD007 2012 8. An analysis of requirements to supporting mobility in Body Area Networks JD008 2012 KNOWLEDGE AND DATA ENGINEERING 9. Answering General Time-Sensitive Queries JD009 2012 10. Creating Evolving User Behaviour Profiles Automatically JD010 2012 11. Effective Pattern Discovery for Text Mining JD011 2012 12. Extending Attribute Information for Small Data Set Classification JD012 2012 13. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining JD013 2012 Analysis 14. Organizing User Search Histories JD014 2012 15. Outsourced Similarity Search on Metric Data Assets JD015 2012 16. Practical Efficient String Mining JD016 2012 17. Ranking Model Adaptation for Domain-Specific Search JD017 2012 18. Tree-Based Mining for Discovering Patterns of Human Interaction in JD018 2012 Meetings 19. Slicing: A New Approach for Privacy Preserving Data Publishing JD019 2012 20. SPIRE: Efficient Data Inference and Compression over RFID Streams JD020 2012 21. ROAD: A New Spatial Object Search Framework for Road Networks JD021 2012 Further more details visit : send your request to :
  2. 2. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email : temasolution@gmail.com22. Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data JD022 2012 Systems23. Segmentation and Sampling of Moving Object Trajectories Based on JD023 2012 Representativeness MOBILE COMPUTING24. Approximation Algorithms for Data Broadcast in Wireless Networks JD024 201225. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring JD025 2012 via Virtual Trip Lines26. Energy-Efficient Cooperative Video Distribution with Statistical QoS JD026 2012 Provisions over Wireless Networks27. Mobile Data Offloading through Opportunistic Communications and Social JD027 2012 Participation28. A New Mobile Spatial Information Service Grid Computing Model Based on JD028 2012 Mobile Agent29. Mobile Computing Systems Programming: A Graduate Distributed JD029 2012 Computing Course30. Mobile cloud computing service based on heterogeneous wireless and JD030 2012 mobile P2P networks31. Mobile computing scheduling mechanism based on self ranking algorithm JD031 201232. Reducing location management costs in hierarchical-based model of mobile JD032 2012 and wireless computing systems33. A proposal of a memory management architecture for mobile computing JD033 2012 environments34. Real-time transaction management in mobile computing systems JD034 201235. A Distributed Cache Management Architecture for Mobile Computing JD035 2012 Environments36. Trusted Management for Mobile Computing Entities Enabled by Fuzzy JD036 2012 Logic Approach37. Monitoring and detecting abnormal behaviour in mobile cloud infrastructure JD037 2012 NETWORK SECURITY38. Scalable Video Multicast with Adaptive Modulation and Coding in JD038 2012 Broadband Wireless Data Systems39. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks JD039 201240. Exploiting Data Fusion to Improve the Coverage of Wireless Sensor JD040 2012 Networks41. Distributed Resource Allocation Based on Queue Balancing in Multihop JD041 2012 Cognitive Radio Networks42. Insights on Media Streaming Progress Using BitTorrent-Like Protocols for JD042 2012 On-Demand Streaming43. Bit Rate Reduction Video Transcoding with Distributed Computing JD043 201244. Distributed S-Net: Cluster and Grid Computing without the Hassle JD044 2012 Further more details visit : send your request to :
  3. 3. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email : NETWORK ROUTING45. Multi-rate combination of opportunistic routing and network coding: An JD045 2012 optimization perspective46. LRNC: Lifetime-aware routing using network coding in wireless sensor JD046 2012 network47. A Multipath Layered Cluster Based Routing for Ad Hoc Networks JD047 201248. Comparison of routing and network coding in undirected network group JD048 2012 communications49. Measurement-Aware Monitor Placement and Routing: A Joint Optimization JD049 2012 Approach for Network-Wide Measurements50. On dynamics of field based anycast routing in wireless mesh networks JD050 201251. Multipath routing backbones for load balancing in Mobile Ad hoc Networks JD051 2012 NETWORK ATTACK AND INDRUTION DETECION52. Knowledge-independent traffic monitoring: Unsupervised detection of JD052 2012 network attacks53. An efficient sequential watermark detection model for tracing network attack JD053 2012 flows54. FireCol: A Collaborative Protection Network for the Detection of Flooding JD054 2012 DDoS Attacks55. Detection and prevention of SIP flooding attacks in voice over IP networks JD055 201256. The Model — Dynamic and Flexible Intrusion Detection Protocol for high JD056 2012 error rate Wireless Sensor Networks based on data flow57. Alert over the attacks of data packet and detect the intruders JD057 201258. Privacy-preserving anomaly detection across multi-domain networks JD058 201259. Classification and Experimental Analysis for Clone Detection Approaches in JD059 2012 Wireless Sensor Networks60. Port-based traffic verification as a paradigm for anomaly detection JD060 201261. On detecting malicious behaviors in interactive networks: Algorithms and JD061 2012 analysis62. Genetic algorithm and artificial immune systems: A combinational approach JD062 2012 for network intrusion detection NETWORK TRAFFIC63. Network traffic anomaly detection using machine learning approaches JD063 201264. Analysis and provisioning of network traffic in cloud environment using JD064 2012 Markov model65. Traffic clustering and online traffic prediction in vehicle networks: A social JD065 2012 influence perspective Further more details visit : send your request to :
  4. 4. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email : temasolution@gmail.com66. Detecting anomalies in network traffic using Entropy and Mahalanobis JD066 2012 distance67. Traffic Engineering for Multicast Connections in Multiservice Cellular JD067 2012 Networks DATA MINING LATTICE BASED68. Data Mining method based on Lattice JD068 201269. Application of data mining in educational databases for predicting academic JD069 2012 trends and patterns70. Data mining based network intrusion detection system: A database centric JD070 2012 approach71. Fuzzy Modeling Built Through a Data Mining Process JD071 201272. Visual data mining over a video wall JD072 201273. Relevance Matters: Capitalizing on Less (Top-k Matching in JD073 2012 Publish/Subscribe)74. Multidimensional Analysis of Atypical Events in Cyber-Physical Data JD074 201275. The eICU Research Institute - A Collaboration Between Industry, Health- JD075 2012 Care Providers, and Academia76. Deciphering human language [information extraction] JD076 201277. Architecture for the management and presentation of communication JD077 2012 network performance data78. Smart shopper: an agent-based web-mining approach to Internet shopping JD078 2012 MULTIMEDIA79. Interactive Video Indexing With Statistical Active Learning JD079 201280. Sparse Ensemble Learning for Concept Detection JD080 201281. A Matrix-Based Approach to Unsupervised Human Action Categorization JD081 201282. Robust Image Coding Based Upon Compressive Sensing JD082 201283. Web Video Geolocation by Geotagged Social Resources JD083 2012 BIOMEDICAL84. Video Distribution Techniques over WiMAX Networks for m-Health JD084 2012 Applications85. Secure Management of Biomedical Data With Cryptographic Hardware JD085 201286. Mobile Medical Visual Information Retrieval JD086 2012 IMAGE PROCESSING Further more details visit : send your request to :
  5. 5. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email : temasolution@gmail.com87. Scene-Oriented Hierarchical Classification of Blurry and Noisy Images JD087 201288. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for JD088 2012 Binary Covers89. Game-Theoretic Pricing for Video Streaming in Mobile Networks JD089 2012 IMAGE SEGMENTATION90. Multiple kernel fuzzy C-means algorithm with ALS method for satellite and JD090 2012 medical image segmentation91. Leap segmentation for recovering image surface layout JD091 201292. A Scale-Synthesis Method for High Spatial Resolution Remote Sensing JD093 2012 Image Segmentation93. Multistage Image Clustering and Segmentation with Normalised Cuts JD093 2012 PARALLEL AND DISTRIBUTED SYSTEMS94. Autonomic Placement of Mixed Batch and Transactional Workloads JD094 201295. An Online Data Access Prediction and Optimization Approach for JD095 2012 Distributed Systems96. Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths JD096 2012 SOFTWARE ENGINEERING97. QoS Assurance for Dynamic Reconfiguration of Component-Based Software JD097 2012 Systems98. StakeRare: Using Social Networks and Collaborative Filtering for Large- JD098 2012 Scale Requirements Elicitation99. Comparing Semi-Automated Clustering Methods for Personal Development JD099 2012100. Invariant-Based Automatic Testing of Modern Web Applications JD100 2012101. Automatically Generating Test Cases for Specification Mining JD101 2012102. Aspectizing Java Access Control JD102 2012 DEPENDABLE AND SECURE COMPUTING103. Automatic Reconfiguration for Large-Scale Reliable Storage Systems JD103 2012104. Detecting and Resolving Firewall Policy Anomalies JD104 2012105. DoubleGuard: Detecting Intrusions in Multitier Web Applications JD105 2012106. JS-Reduce: Defending Your Data from Sequential Background Knowledge JD106 2012 Attacks107. Incentive Compatible Privacy-Preserving Distributed Classification JD107 2012 Further more details visit : send your request to :
  6. 6. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : email : WEB MINING108. Web 2.0 content extraction JD108 2012109. Automated Security Test Generation with Formal Threat Models JD109 2012110. Improving the Automation of Security Information Management: A JD110 2012 Collaborative Approach111. Optimal Aviation Security Screening Strategies With Dynamic Passenger JD111 2012 Risk Updates TOPOLOGY112. Routing characterization in volatile connectivity environments JD112 2012113. A Distributed Reliable and Energy-Efficient Topology Control Algorithm in JD113 2012 Wireless Sensor Network114. A method of tree network topology inference based on hierarchical host table JD114 2012115. Topology management for mission critical networks: Applying supply and JD115 2012 demand to manage public safety networks116. SNMP-based network topology discovery algorithm and implementation JD116 2012117. Overlaid Mesh Topology Design and Deadlock Free Routing in Wireless JD117 2012 Network-on-Chip118. Topology Enhancements in Wireless Multihop Networks: A Top-Down JD118 2012 Approach119. A dynamic detective method against ROP attack on ARM platform JD119 2012120. Countering entropy measure attacks on packed software detection JD120 2012121. Performance Modeling and Analysis of Network Firewalls JD121 2012122. Research on Malicious Code Detection Based on Least-squares Estimation JD122 2012123. Stochastic analysis of horizontal IP scanning JD123 2012 Further more details visit : send your request to :