SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
PARLLEL DISTRIBUTION
1. CCD: A Distributed Publish/Subscribe Framework for Rich Content
Formats
2. Catching Packets Droppers and Modifiers in Wireless Sensor
Network
3. Cut Detection in Wireless Sensor Networks
4. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks
5. Design and Implementation of TARF: A Trust-Aware Routing
FrameWork for WSNs
6. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
7. SPOC: A Secure and Privacy Preserving Oppertunistic Computing
FrameWork For Mobile Healthcare Emergency
8. The Three-Tier Security Scheme in Wireless Sensor Networks with
Mobile Sinks
9. Catching Packet Droppers and Modifiers in Wireless Sensor
Networks
10.Bounding the Impact of Unbounded Attacks in Stabilization
11.Balancing the Trade-Offs between Query Delay and Data A
vailability in MANETs
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
CLOUD COMPUITNG
1. A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding.
2. Cloud Computing Security From Single to Multi-Clouds.
3. Enhanced Data Security Model for Cloud Computing
4. Ensuring Distributed Accountability for Data Sharing in the Cloud.
5. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing.
6. Outsourced Similarity Search on Metric Data Assets
7. Privacy-Preserving Public Auditing for Secure Cloud Storage
8. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption.
9. Toward Secure and Dependable Storage Services in Cloud Computing.
10.Enabling Secure and Efficient Ranked Keyword Search over Outsourced
Cloud Data
11.Efficient Audit Service Outsourcing for Data Integrity in Clouds
12.A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
13.Cloud Data Production for Masses
14.Cashing in on the Cache in the Cloud
15.pCloud: A Distributed System for Practical PIR
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
1. A Query Formulation Language for the data web
2. Creating Evolving User Behavior Profiles Automatically
3. D-Cache: Universal Distance Cache for Metric Access Methods
4. DDD: A New Ensemble Approach for Dealing with Concept Drift
5. Efficient Computation of Range Aggregates against Uncertain Location-
Based Queries
6. Efficient Fuzzy Type-Ahead Search in XML Data
7. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining
Analysis
8. Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques
9. Measuring the Sky: On Computing Data Cubes via Skylining the Measures
10.Mining Web Graphs for Recommendations
11.Organizing User Search Histories
12.Publishing Search Logs—A Comparative Study of Privacy Guarantees
13.Query Planning for Continuous Aggregation Queries over a Network of
Data Aggregators
14.ROAD: A New Spatial Object Search Framework for Road Networks
15.Scalable Learning of Collective Behavior
16.Slicing: A New Approach for Privacy Preserving Data Publishing
17.Tree-Based Mining for Discovering Patterns of Human Interaction in
Meetings
18.Ranking Model Adaptation For Domain-Specific Search
19.Adding Temporal Constraints to XML Schema
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
20.Combining Tag and Value Similarity for Data Extraction and Alignment
21.Coupled Behavior Analysis with Applications
22.Data Mining for XML Query‐ Answering Support
23.Document Clustering in Correlation Similarity Measure Space
24.Efficient and Effective Duplicate Detection in Hierarchical Data
25.Efficient Extended Boolean Retrieval
26.Clustering with Multiviewpoint Based Similarity Measure
27.Optimizing Bloom Filter Settings in Peer‐ to‐ Peer Multi‐ keyword
Searching
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
1. Cooperative Download in Vehicular Environments
2. Distributed Throughput Maximization in Wireless Networks via
Random Power Allocation
3. Network Assisted Mobile Computing with Optimal Uplink Query
Processing
4. Protecting Location Privacy in Sensor Networks against a Global
Eavesdropper
5. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc
Networks
6. Leveraging Smartphone Cameras for Collaborative Road Advisories
7. Compressed-Sensing-Enabled Video Streaming for Wireless
8. Secure and Efficient Handover Authentication Based on Bilinear Pairing
Functions
9. On Quality of Monitoring for Multi-channel Wireless Infrastructure
Networks
10.Learn to Personalized Image Search from the Photo Sharing Websites
11.Fast Data Collection in Tree-Based Wireless Sensor Networks
12.An Iterative Algorithm for Trust Management and Adversary Detection
for Delay Tolerant Networks
13.Message Drop and Scheduling in DTNs: Theory and Practice
14.Thwarting Control‐ Channel Jamming Attacks from Inside Jammers
15.Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation
16.Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and
Cross Layer Optimization for Scalable Video Streaming
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
17.A Trigger Identification Service for Defending Reactive Jammers in
WSN
18.Resource Aware Video Multicasting via Access Gateways in Wireless
Mesh Networks
19.Low Power Consumption Solutions for Mobile Instant Messaging
20.Converge Cast: On the Capacity and Delay Tradeoffs
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
1. Finding Cheap Routes in Profit Driven Opportunistic Spectrum Access
2. Networks: A Truthful Mechanism Design Approach
3. Online Adaptive Compression in Delay Sensitive Wireless Sensor Networks
4. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing
5. Topologies
6. Design and Implementation of TARF: A Trust‐ Aware Routing Framework
for WSNs
7. Framework for Mobile Healthcare Emergency
8. A New Cell-Counting-Based Attack Against Tor
9. Optimal Source-Based Filtering of Malicious Traffic
10.Uncoordinated Cooperative Communications in Highly Dynamic Wireless
Networks
11.Load-Balancing Multipath Switching System with Flow Slice
12.Latency Equalization as a New Network Service Primitive
13.Balancing the Trade offs between Query Delay and Data Availability in
MANETs
14.Fair Torrent: A Deficit-based Distributed Algorithm to Ensure Fairness in
Peer-to-Peer Systems
15.Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia
Sensor Networks
16.Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks:
Theory and Algorithms
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
17.SPOC:A Secure and Privacy preserving Opportunistic Computing
18.Framework for Mobile Healthcare Emergency
19.Topology control in mobile adhoc Networks with cooperative
communications
20.Distributed Throughput Maximization in Wireless Networks via Random
Power Allocation
21.Automatic Reconfiguration for Large-Scale Reliable Storage Systems
22.Throughput and Energy Efficiency in Wireless Ad Hoc Networks With
Gaussian Channels Throughput Maximization in Wireless Networks via Random
Power Allocation
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKSECURITY
1. A Hybrid Approach to Private Record Matching
2. Enabling Secure and Efficient Ranked Keyword Search over
Outsourced Cloud Data
3. On Privacy of Encrypted Speech Communications
4. Persuasive Cued Click‐ Points: Design, Implementation, and Evaluation
of a Knowledge Based Authentication Mechanism
5. Privacy Preserving Enforcement of Spatially Aware RBAC
6. Revisiting Defenses against Large‐ Scale Online Password Guessing
Attacks
7. Scalable and Secure Sharing of Personal Health Records in
Cloud Computing using Attribute based Encryption
8. Security of Bertino-Shang-Wagstaff Time Bound Hierarchical Key
Management Scheme for Secure Broadcasting
9. Enhancing Data Trustworthiness via Assured Digital Signing
10.A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
11.A Probabilistic Model of Visual Cryptography Scheme With Dynamic
Group
12.Characterizing the Efficacy of the NRL Network Pump in Mitigating
Covert Timing Channels
13.Design and Implementation of TARF A Trust-Aware Routing Framework
for WSNs
14.Fast Matrix Embedding by Matrix Extending
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SERVICE COMPUTING
1. Expert Discovery and Interactions in Mixed Service-Oriented Systems
2. Towards Secure and Dependable Storage Services in Cloud Computing.
3. Detecting Spam Zombies by Monitoring Outgoing Messages
4. Expert Discovery and Interactions in Mixed Service-Oriented Systems
5. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
IMAGE PROCESSING
1. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
2. A Probabilistic Model of Visual Cryptography Scheme With Dynamic
Group
3. Active Visual Segmentation
4. Image Segmentation Based on the Poincaré Map Method
5. K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR
IMAGE USING RANDOM NUMBER
6. Multiple Exposure Fusion for High Dynamic Range Image Acquisition
7. Semi-supervised Biased Maximum Margin Analysis for Interactive
Image Retrieval
8. Smile Detection by Boosting Pixel Differences
9. View-invariant action recognition based on Artificial Neural Networks
10.A Novel Anti phishing framework based on visual cryptography
11.Low-Complexity Compression Method for Hyperspectral Images Based
on Distributed Source Coding
12.A Discriminative Model of Motion and Cross Ratio for View-Invariant
Action Recognition
13.Multibiometric Cryptosystems Based on Feature-Level Fusion
14.Automatic Image Equalization and Contrast Enhancement Using
Gaussian Mixture Modeling
15.Image Authentication Using Distributed Source Coding
16.Analyzing Image Deblurring Through Three Paradigms
17.Fast Vanishing point Detection in Unstructured Environments
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
IMAGE PROCESSING
18.An Online Learning Approach to Occlusion Boundary Detection
19.Robust Face‐ Name Graph Matching for Movie Character Identification
20.Shadow Removal Using Bilateral Filtering
21.Combining Head Pose and Eye Location Information for Gaze
Estimation
22.A Secret‐ Sharing‐ Based Method for Authentication of Grayscale
Document
23.Images via the Use of the PNG Image With a Data Repair Capability
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SECURE COMPUTING
1. Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
2. ES-MPICH2: A Message Passing Interface with Enhanced Security
3. On the Security and Efficiency of Content Distribution via Network
Coding
4. SPOC: A Secure and Privacy-preserving Opportunistic Computing
Framework forMobile-Healthcare Emergency
5. A Secure Intrusion detection system against DDOS attack in Wireless
Mobile Ad-hoc Network
6. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
7. Persuasive Cued Click-Points: Design, Implementation, and Evaluation
of a Knowledge-Based Authentication Mechanism
8. Automatic Reconfiguration for Large-Scale Reliable Storage Systems

Más contenido relacionado

Destacado

Flying Solo: Lessons Learned From Independent Practitioners
Flying Solo: Lessons Learned From Independent PractitionersFlying Solo: Lessons Learned From Independent Practitioners
Flying Solo: Lessons Learned From Independent PractitionersMargaret Ritsch
 
Dossier informatiu 13 14
Dossier informatiu 13 14Dossier informatiu 13 14
Dossier informatiu 13 14cipauvila
 
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas KashalikarHolisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikarabhishekka
 
Indicators For Monitoring Children In Conflict With The Law
Indicators For Monitoring Children In Conflict With The LawIndicators For Monitoring Children In Conflict With The Law
Indicators For Monitoring Children In Conflict With The LawThomas Müller
 
El artesano atribulado
El artesano atribuladoEl artesano atribulado
El artesano atribuladopaulaonofrio
 
Volunteer Recruitment for College Access
Volunteer Recruitment for College AccessVolunteer Recruitment for College Access
Volunteer Recruitment for College AccessRyan Fewins-Bliss
 
Menace Of Cholera Marathi Bestseller Dr. Shriniwas Kashalikar
Menace Of Cholera Marathi Bestseller Dr. Shriniwas KashalikarMenace Of Cholera Marathi Bestseller Dr. Shriniwas Kashalikar
Menace Of Cholera Marathi Bestseller Dr. Shriniwas Kashalikardocpalep
 
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas KashalikarHolisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikaramolsawarkar
 
Best Practices
Best PracticesBest Practices
Best Practicesmegmonti
 
Aaha Emi Ruchi, Thinaraa Maimarachi
Aaha Emi Ruchi, Thinaraa Maimarachi Aaha Emi Ruchi, Thinaraa Maimarachi
Aaha Emi Ruchi, Thinaraa Maimarachi Ashok Doppalapudi
 
Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)
Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)
Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)student
 

Destacado (17)

Flying Solo: Lessons Learned From Independent Practitioners
Flying Solo: Lessons Learned From Independent PractitionersFlying Solo: Lessons Learned From Independent Practitioners
Flying Solo: Lessons Learned From Independent Practitioners
 
El cumpleaños de toñito
El cumpleaños de toñitoEl cumpleaños de toñito
El cumpleaños de toñito
 
Dossier informatiu 13 14
Dossier informatiu 13 14Dossier informatiu 13 14
Dossier informatiu 13 14
 
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas KashalikarHolisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
 
Bases lenguaje 2012
Bases lenguaje 2012Bases lenguaje 2012
Bases lenguaje 2012
 
Who is who
Who is whoWho is who
Who is who
 
P.a.t 11 3
P.a.t      11 3P.a.t      11 3
P.a.t 11 3
 
Indicators For Monitoring Children In Conflict With The Law
Indicators For Monitoring Children In Conflict With The LawIndicators For Monitoring Children In Conflict With The Law
Indicators For Monitoring Children In Conflict With The Law
 
El artesano atribulado
El artesano atribuladoEl artesano atribulado
El artesano atribulado
 
Volunteer Recruitment for College Access
Volunteer Recruitment for College AccessVolunteer Recruitment for College Access
Volunteer Recruitment for College Access
 
Menace Of Cholera Marathi Bestseller Dr. Shriniwas Kashalikar
Menace Of Cholera Marathi Bestseller Dr. Shriniwas KashalikarMenace Of Cholera Marathi Bestseller Dr. Shriniwas Kashalikar
Menace Of Cholera Marathi Bestseller Dr. Shriniwas Kashalikar
 
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas KashalikarHolisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
Holisticmanagement Of Global Recession Dr. Shriniwas Kashalikar
 
Best Practices
Best PracticesBest Practices
Best Practices
 
Aaha Emi Ruchi, Thinaraa Maimarachi
Aaha Emi Ruchi, Thinaraa Maimarachi Aaha Emi Ruchi, Thinaraa Maimarachi
Aaha Emi Ruchi, Thinaraa Maimarachi
 
Software requirement
Software requirementSoftware requirement
Software requirement
 
Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)
Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)
Anesthesia.routine preoperative investigations+ fasting guidlines.(dr.amer)
 
Conics 2
Conics 2Conics 2
Conics 2
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 

Ieee 2012 2013 mca dotnet projects richbraintech

  • 1. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH. Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com PARLLEL DISTRIBUTION 1. CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats 2. Catching Packets Droppers and Modifiers in Wireless Sensor Network 3. Cut Detection in Wireless Sensor Networks 4. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks 5. Design and Implementation of TARF: A Trust-Aware Routing FrameWork for WSNs 6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 7. SPOC: A Secure and Privacy Preserving Oppertunistic Computing FrameWork For Mobile Healthcare Emergency 8. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 9. Catching Packet Droppers and Modifiers in Wireless Sensor Networks 10.Bounding the Impact of Unbounded Attacks in Stabilization 11.Balancing the Trade-Offs between Query Delay and Data A vailability in MANETs
  • 2. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com CLOUD COMPUITNG 1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. 2. Cloud Computing Security From Single to Multi-Clouds. 3. Enhanced Data Security Model for Cloud Computing 4. Ensuring Distributed Accountability for Data Sharing in the Cloud. 5. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. 6. Outsourced Similarity Search on Metric Data Assets 7. Privacy-Preserving Public Auditing for Secure Cloud Storage 8. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. 9. Toward Secure and Dependable Storage Services in Cloud Computing. 10.Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 11.Efficient Audit Service Outsourcing for Data Integrity in Clouds 12.A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding 13.Cloud Data Production for Masses 14.Cashing in on the Cache in the Cloud 15.pCloud: A Distributed System for Practical PIR
  • 3. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com DATA MINING 1. A Query Formulation Language for the data web 2. Creating Evolving User Behavior Profiles Automatically 3. D-Cache: Universal Distance Cache for Metric Access Methods 4. DDD: A New Ensemble Approach for Dealing with Concept Drift 5. Efficient Computation of Range Aggregates against Uncertain Location- Based Queries 6. Efficient Fuzzy Type-Ahead Search in XML Data 7. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis 8. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques 9. Measuring the Sky: On Computing Data Cubes via Skylining the Measures 10.Mining Web Graphs for Recommendations 11.Organizing User Search Histories 12.Publishing Search Logs—A Comparative Study of Privacy Guarantees 13.Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 14.ROAD: A New Spatial Object Search Framework for Road Networks 15.Scalable Learning of Collective Behavior 16.Slicing: A New Approach for Privacy Preserving Data Publishing 17.Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings 18.Ranking Model Adaptation For Domain-Specific Search 19.Adding Temporal Constraints to XML Schema
  • 4. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com DATA MINING 20.Combining Tag and Value Similarity for Data Extraction and Alignment 21.Coupled Behavior Analysis with Applications 22.Data Mining for XML Query‐ Answering Support 23.Document Clustering in Correlation Similarity Measure Space 24.Efficient and Effective Duplicate Detection in Hierarchical Data 25.Efficient Extended Boolean Retrieval 26.Clustering with Multiviewpoint Based Similarity Measure 27.Optimizing Bloom Filter Settings in Peer‐ to‐ Peer Multi‐ keyword Searching
  • 5. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com MOBILE COMPUTING 1. Cooperative Download in Vehicular Environments 2. Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 3. Network Assisted Mobile Computing with Optimal Uplink Query Processing 4. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 5. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks 6. Leveraging Smartphone Cameras for Collaborative Road Advisories 7. Compressed-Sensing-Enabled Video Streaming for Wireless 8. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions 9. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 10.Learn to Personalized Image Search from the Photo Sharing Websites 11.Fast Data Collection in Tree-Based Wireless Sensor Networks 12.An Iterative Algorithm for Trust Management and Adversary Detection for Delay Tolerant Networks 13.Message Drop and Scheduling in DTNs: Theory and Practice 14.Thwarting Control‐ Channel Jamming Attacks from Inside Jammers 15.Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation 16.Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross Layer Optimization for Scalable Video Streaming
  • 6. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com MOBILE COMPUTING 17.A Trigger Identification Service for Defending Reactive Jammers in WSN 18.Resource Aware Video Multicasting via Access Gateways in Wireless Mesh Networks 19.Low Power Consumption Solutions for Mobile Instant Messaging 20.Converge Cast: On the Capacity and Delay Tradeoffs
  • 7. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKING 1. Finding Cheap Routes in Profit Driven Opportunistic Spectrum Access 2. Networks: A Truthful Mechanism Design Approach 3. Online Adaptive Compression in Delay Sensitive Wireless Sensor Networks 4. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing 5. Topologies 6. Design and Implementation of TARF: A Trust‐ Aware Routing Framework for WSNs 7. Framework for Mobile Healthcare Emergency 8. A New Cell-Counting-Based Attack Against Tor 9. Optimal Source-Based Filtering of Malicious Traffic 10.Uncoordinated Cooperative Communications in Highly Dynamic Wireless Networks 11.Load-Balancing Multipath Switching System with Flow Slice 12.Latency Equalization as a New Network Service Primitive 13.Balancing the Trade offs between Query Delay and Data Availability in MANETs 14.Fair Torrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems 15.Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 16.Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
  • 8. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKING 17.SPOC:A Secure and Privacy preserving Opportunistic Computing 18.Framework for Mobile Healthcare Emergency 19.Topology control in mobile adhoc Networks with cooperative communications 20.Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 21.Automatic Reconfiguration for Large-Scale Reliable Storage Systems 22.Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels Throughput Maximization in Wireless Networks via Random Power Allocation
  • 9. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKSECURITY 1. A Hybrid Approach to Private Record Matching 2. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 3. On Privacy of Encrypted Speech Communications 4. Persuasive Cued Click‐ Points: Design, Implementation, and Evaluation of a Knowledge Based Authentication Mechanism 5. Privacy Preserving Enforcement of Spatially Aware RBAC 6. Revisiting Defenses against Large‐ Scale Online Password Guessing Attacks 7. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute based Encryption 8. Security of Bertino-Shang-Wagstaff Time Bound Hierarchical Key Management Scheme for Secure Broadcasting 9. Enhancing Data Trustworthiness via Assured Digital Signing 10.A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 11.A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 12.Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels 13.Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs 14.Fast Matrix Embedding by Matrix Extending
  • 10. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com SERVICE COMPUTING 1. Expert Discovery and Interactions in Mixed Service-Oriented Systems 2. Towards Secure and Dependable Storage Services in Cloud Computing. 3. Detecting Spam Zombies by Monitoring Outgoing Messages 4. Expert Discovery and Interactions in Mixed Service-Oriented Systems 5. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
  • 11. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com IMAGE PROCESSING 1. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2. A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 3. Active Visual Segmentation 4. Image Segmentation Based on the Poincaré Map Method 5. K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER 6. Multiple Exposure Fusion for High Dynamic Range Image Acquisition 7. Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 8. Smile Detection by Boosting Pixel Differences 9. View-invariant action recognition based on Artificial Neural Networks 10.A Novel Anti phishing framework based on visual cryptography 11.Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding 12.A Discriminative Model of Motion and Cross Ratio for View-Invariant Action Recognition 13.Multibiometric Cryptosystems Based on Feature-Level Fusion 14.Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Modeling 15.Image Authentication Using Distributed Source Coding 16.Analyzing Image Deblurring Through Three Paradigms 17.Fast Vanishing point Detection in Unstructured Environments
  • 12. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com IMAGE PROCESSING 18.An Online Learning Approach to Occlusion Boundary Detection 19.Robust Face‐ Name Graph Matching for Movie Character Identification 20.Shadow Removal Using Bilateral Filtering 21.Combining Head Pose and Eye Location Information for Gaze Estimation 22.A Secret‐ Sharing‐ Based Method for Authentication of Grayscale Document 23.Images via the Use of the PNG Image With a Data Repair Capability
  • 13. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com SECURE COMPUTING 1. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 2. ES-MPICH2: A Message Passing Interface with Enhanced Security 3. On the Security and Efficiency of Content Distribution via Network Coding 4. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency 5. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network 6. Revisiting Defenses against Large-Scale Online Password Guessing Attacks 7. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism 8. Automatic Reconfiguration for Large-Scale Reliable Storage Systems