SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
28,South Usman Road,, TNagar,
                                                                                 Chennai-17. Ph : 044-43855940
                                                                                 Mobile : +91-9042085008
                                                                                 Web : www.temasolution.com
                                                                                 email : temasolution@gmail.com


S.NO                                    PROJECT TITLE                                          CODE        YEAR

                                      CLOUD COMPUTING

 1.       HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable            JD001       2012
          Access Control in Cloud Computing
 2.       A Secure Erasure Code-Based Cloud Storage System with Secure Data                   JD002       2012
          Forwarding
 3.       Enabling Secure and Efficient Ranked Keyword Search over Outsourced                 JD003       2012
          Cloud Data
 4.       A service oriented livestock management system using occasionally                   JD004       2012
          connected mobile-cloud architecture
 5.       Privacy Preserving Access Control with Authentication for Securing Data in          JD005       2012
          Clouds
 6.       Data Outsourcing Simplified: Generating Data Connectors from                        JD006       2012
          Confidentiality and Access Policies
 7.       Towards bringing real-time online applications on Clouds                            JD007       2012

 8.       An analysis of requirements to supporting mobility in Body Area Networks            JD008       2012

                             KNOWLEDGE AND DATA ENGINEERING

 9.       Answering General Time-Sensitive Queries                                            JD009       2012

 10.      Creating Evolving User Behaviour Profiles Automatically                             JD010       2012

 11.      Effective Pattern Discovery for Text Mining                                         JD011       2012

 12.      Extending Attribute Information for Small Data Set Classification                   JD012       2012

 13.      Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining                 JD013       2012
          Analysis
 14.      Organizing User Search Histories                                                    JD014       2012

 15.      Outsourced Similarity Search on Metric Data Assets                                  JD015       2012

 16.      Practical Efficient String Mining                                                   JD016       2012

 17.      Ranking Model Adaptation for Domain-Specific Search                                 JD017       2012

 18.      Tree-Based Mining for Discovering Patterns of Human Interaction in                  JD018       2012
          Meetings
 19.      Slicing: A New Approach for Privacy Preserving Data Publishing                      JD019       2012

 20.      SPIRE: Efficient Data Inference and Compression over RFID Streams                   JD020       2012

 21.      ROAD: A New Spatial Object Search Framework for Road Networks                       JD021       2012



       Further more details visit : http://www.temasolution.com/downloads.html
       send your request to       : info@temasolution.com
28,South Usman Road,, TNagar,
                                                                                Chennai-17. Ph : 044-43855940
                                                                                Mobile : +91-9042085008
                                                                                Web : www.temasolution.com
                                                                                email : temasolution@gmail.com
22.      Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data               JD022       2012
         Systems
23.      Segmentation and Sampling of Moving Object Trajectories Based on                    JD023       2012
         Representativeness
                                         MOBILE COMPUTING

24.      Approximation Algorithms for Data Broadcast in Wireless Networks                    JD024       2012

25.      Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring            JD025       2012
         via Virtual Trip Lines
26.      Energy-Efficient Cooperative Video Distribution with Statistical QoS                JD026       2012
         Provisions over Wireless Networks
27.      Mobile Data Offloading through Opportunistic Communications and Social              JD027       2012
         Participation
28.      A New Mobile Spatial Information Service Grid Computing Model Based on              JD028       2012
         Mobile Agent
29.      Mobile Computing Systems Programming: A Graduate Distributed                        JD029       2012
         Computing Course
30.      Mobile cloud computing service based on heterogeneous wireless and                  JD030       2012
         mobile P2P networks
31.      Mobile computing scheduling mechanism based on self ranking algorithm               JD031       2012

32.      Reducing location management costs in hierarchical-based model of mobile            JD032       2012
         and wireless computing systems
33.      A proposal of a memory management architecture for mobile computing                 JD033       2012
         environments
34.      Real-time transaction management in mobile computing systems                        JD034       2012

35.      A Distributed Cache Management Architecture for Mobile Computing                    JD035       2012
         Environments
36.      Trusted Management for Mobile Computing Entities Enabled by Fuzzy                   JD036       2012
         Logic Approach
37.      Monitoring and detecting abnormal behaviour in mobile cloud infrastructure          JD037       2012

                                         NETWORK SECURITY

38.      Scalable Video Multicast with Adaptive Modulation and Coding in                     JD038       2012
         Broadband Wireless Data Systems
39.      Adaptive Opportunistic Routing for Wireless Ad Hoc Networks                         JD039       2012

40.      Exploiting Data Fusion to Improve the Coverage of Wireless Sensor                   JD040       2012
         Networks
41.      Distributed Resource Allocation Based on Queue Balancing in Multihop                JD041       2012
         Cognitive Radio Networks
42.      Insights on Media Streaming Progress Using BitTorrent-Like Protocols for            JD042       2012
         On-Demand Streaming
43.      Bit Rate Reduction Video Transcoding with Distributed Computing                     JD043       2012

44.      Distributed S-Net: Cluster and Grid Computing without the Hassle                    JD044       2012



      Further more details visit : http://www.temasolution.com/downloads.html
      send your request to       : info@temasolution.com
28,South Usman Road,, TNagar,
                                                                                Chennai-17. Ph : 044-43855940
                                                                                Mobile : +91-9042085008
                                                                                Web : www.temasolution.com
                                                                                email : temasolution@gmail.com



                                         NETWORK ROUTING

45.      Multi-rate combination of opportunistic routing and network coding: An              JD045       2012
         optimization perspective
46.      LRNC: Lifetime-aware routing using network coding in wireless sensor                JD046       2012
         network
47.      A Multipath Layered Cluster Based Routing for Ad Hoc Networks                       JD047       2012

48.      Comparison of routing and network coding in undirected network group                JD048       2012
         communications
49.      Measurement-Aware Monitor Placement and Routing: A Joint Optimization               JD049       2012
         Approach for Network-Wide Measurements
50.      On dynamics of field based anycast routing in wireless mesh networks                JD050       2012

51.      Multipath routing backbones for load balancing in Mobile Ad hoc Networks            JD051       2012

                      NETWORK ATTACK AND INDRUTION DETECION

52.      Knowledge-independent traffic monitoring: Unsupervised detection of                 JD052       2012
         network attacks
53.      An efficient sequential watermark detection model for tracing network attack        JD053       2012
         flows
54.      FireCol: A Collaborative Protection Network for the Detection of Flooding           JD054       2012
         DDoS Attacks
55.      Detection and prevention of SIP flooding attacks in voice over IP networks          JD055       2012

56.      The Model — Dynamic and Flexible Intrusion Detection Protocol for high              JD056       2012
         error rate Wireless Sensor Networks based on data flow
57.      Alert over the attacks of data packet and detect the intruders                      JD057       2012

58.      Privacy-preserving anomaly detection across multi-domain networks                   JD058       2012

59.      Classification and Experimental Analysis for Clone Detection Approaches in          JD059       2012
         Wireless Sensor Networks
60.      Port-based traffic verification as a paradigm for anomaly detection                 JD060       2012

61.      On detecting malicious behaviors in interactive networks: Algorithms and            JD061       2012
         analysis
62.      Genetic algorithm and artificial immune systems: A combinational approach           JD062       2012
         for network intrusion detection
                                          NETWORK TRAFFIC

63.      Network traffic anomaly detection using machine learning approaches                 JD063       2012

64.      Analysis and provisioning of network traffic in cloud environment using             JD064       2012
         Markov model
65.      Traffic clustering and online traffic prediction in vehicle networks: A social      JD065       2012
         influence perspective



      Further more details visit : http://www.temasolution.com/downloads.html
      send your request to       : info@temasolution.com
28,South Usman Road,, TNagar,
                                                                                Chennai-17. Ph : 044-43855940
                                                                                Mobile : +91-9042085008
                                                                                Web : www.temasolution.com
                                                                                email : temasolution@gmail.com
66.      Detecting anomalies in network traffic using Entropy and Mahalanobis                JD066       2012
         distance
67.      Traffic Engineering for Multicast Connections in Multiservice Cellular              JD067       2012
         Networks
                                  DATA MINING LATTICE BASED

68.      Data Mining method based on Lattice                                                 JD068       2012

69.      Application of data mining in educational databases for predicting academic         JD069       2012
         trends and patterns
70.      Data mining based network intrusion detection system: A database centric            JD070       2012
         approach
71.      Fuzzy Modeling Built Through a Data Mining Process                                  JD071       2012

72.      Visual data mining over a video wall                                                JD072       2012

73.      Relevance Matters: Capitalizing on Less (Top-k Matching in                          JD073       2012
         Publish/Subscribe)
74.      Multidimensional Analysis of Atypical Events in Cyber-Physical Data                 JD074       2012

75.      The eICU Research Institute - A Collaboration Between Industry, Health-             JD075       2012
         Care Providers, and Academia
76.      Deciphering human language [information extraction]                                 JD076       2012

77.      Architecture for the management and presentation of communication                   JD077       2012
         network performance data
78.      Smart shopper: an agent-based web-mining approach to Internet shopping              JD078       2012

                                              MULTIMEDIA

79.      Interactive Video Indexing With Statistical Active Learning                         JD079       2012

80.      Sparse Ensemble Learning for Concept Detection                                      JD080       2012

81.      A Matrix-Based Approach to Unsupervised Human Action Categorization                 JD081       2012

82.      Robust Image Coding Based Upon Compressive Sensing                                  JD082       2012

83.      Web Video Geolocation by Geotagged Social Resources                                 JD083       2012

                                              BIOMEDICAL

84.      Video Distribution Techniques over WiMAX Networks for m-Health                      JD084       2012
         Applications
85.      Secure Management of Biomedical Data With Cryptographic Hardware                    JD085       2012

86.      Mobile Medical Visual Information Retrieval                                         JD086       2012

                                         IMAGE PROCESSING



      Further more details visit : http://www.temasolution.com/downloads.html
      send your request to       : info@temasolution.com
28,South Usman Road,, TNagar,
                                                                                Chennai-17. Ph : 044-43855940
                                                                                Mobile : +91-9042085008
                                                                                Web : www.temasolution.com
                                                                                email : temasolution@gmail.com
87.      Scene-Oriented Hierarchical Classification of Blurry and Noisy Images               JD087       2012

88.      Improving Various Reversible Data Hiding Schemes Via Optimal Codes for              JD088       2012
         Binary Covers
89.      Game-Theoretic Pricing for Video Streaming in Mobile Networks                       JD089       2012

                                       IMAGE SEGMENTATION

90.      Multiple kernel fuzzy C-means algorithm with ALS method for satellite and           JD090       2012
         medical image segmentation
91.      Leap segmentation for recovering image surface layout                               JD091       2012

92.      A Scale-Synthesis Method for High Spatial Resolution Remote Sensing                 JD093       2012
         Image Segmentation
93.      Multistage Image Clustering and Segmentation with Normalised Cuts                   JD093       2012

                            PARALLEL AND DISTRIBUTED SYSTEMS

94.      Autonomic Placement of Mixed Batch and Transactional Workloads                      JD094       2012

95.      An Online Data Access Prediction and Optimization Approach for                      JD095       2012
         Distributed Systems
96.      Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths               JD096       2012

                                     SOFTWARE ENGINEERING

97.      QoS Assurance for Dynamic Reconfiguration of Component-Based Software JD097                     2012
         Systems
98.      StakeRare: Using Social Networks and Collaborative Filtering for Large- JD098                   2012
         Scale Requirements Elicitation
99.      Comparing Semi-Automated Clustering Methods for Personal Development JD099                      2012

100. Invariant-Based Automatic Testing of Modern Web Applications                            JD100       2012

101. Automatically Generating Test Cases for Specification Mining                            JD101       2012

102. Aspectizing Java Access Control                                                         JD102       2012


                           DEPENDABLE AND SECURE COMPUTING

103. Automatic Reconfiguration for Large-Scale Reliable Storage Systems                      JD103       2012
104. Detecting and Resolving Firewall Policy Anomalies                                       JD104       2012
105. DoubleGuard: Detecting Intrusions in Multitier Web Applications                         JD105       2012

106. JS-Reduce: Defending Your Data from Sequential Background Knowledge                     JD106       2012
     Attacks
107. Incentive Compatible Privacy-Preserving Distributed Classification                      JD107       2012




      Further more details visit : http://www.temasolution.com/downloads.html
      send your request to       : info@temasolution.com
28,South Usman Road,, TNagar,
                                                                             Chennai-17. Ph : 044-43855940
                                                                             Mobile : +91-9042085008
                                                                             Web : www.temasolution.com
                                                                             email : temasolution@gmail.com

                                                WEB MINING

108. Web 2.0 content extraction                                                           JD108       2012

109. Automated Security Test Generation with Formal Threat Models                         JD109       2012

110. Improving the Automation of Security Information Management: A                       JD110       2012
     Collaborative Approach
111. Optimal Aviation Security Screening Strategies With Dynamic Passenger                JD111       2012
     Risk Updates
                                             TOPOLOGY

112. Routing characterization in volatile connectivity environments                       JD112       2012

113. A Distributed Reliable and Energy-Efficient Topology Control Algorithm in JD113                  2012
     Wireless Sensor Network
114. A method of tree network topology inference based on hierarchical host table JD114               2012

115. Topology management for mission critical networks: Applying supply and               JD115       2012
     demand to manage public safety networks
116. SNMP-based network topology discovery algorithm and implementation                   JD116       2012

117. Overlaid Mesh Topology Design and Deadlock Free Routing in Wireless                  JD117       2012
     Network-on-Chip
118. Topology Enhancements in Wireless Multihop Networks: A Top-Down                      JD118       2012
     Approach
119. A dynamic detective method against ROP attack on ARM platform                        JD119       2012

120. Countering entropy measure attacks on packed software detection                      JD120       2012

121. Performance Modeling and Analysis of Network Firewalls                               JD121       2012

122. Research on Malicious Code Detection Based on Least-squares Estimation               JD122       2012

123. Stochastic analysis of horizontal IP scanning                                        JD123       2012




   Further more details visit : http://www.temasolution.com/downloads.html
   send your request to       : info@temasolution.com

Más contenido relacionado

Más de Soundar Msr

Robotics titles for 2012
Robotics  titles for 2012Robotics  titles for 2012
Robotics titles for 2012Soundar Msr
 
Power electronics tiltle for 2012
Power electronics tiltle for 2012Power electronics tiltle for 2012
Power electronics tiltle for 2012Soundar Msr
 
Mini project tittles
Mini project tittlesMini project tittles
Mini project tittlesSoundar Msr
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titlesSoundar Msr
 
Mca & diplamo .net titles
Mca & diplamo .net titlesMca & diplamo .net titles
Mca & diplamo .net titlesSoundar Msr
 
Mba tiltle for 2012
Mba tiltle for 2012Mba tiltle for 2012
Mba tiltle for 2012Soundar Msr
 
Java titles 2012 c
Java titles 2012 cJava titles 2012 c
Java titles 2012 cSoundar Msr
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsiSoundar Msr
 
Ieee 2012 titles for matlab
Ieee 2012 titles for matlabIeee 2012 titles for matlab
Ieee 2012 titles for matlabSoundar Msr
 
Ieee 2012 titles for java & .net
Ieee 2012 titles for java & .netIeee 2012 titles for java & .net
Ieee 2012 titles for java & .netSoundar Msr
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 cSoundar Msr
 
Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012Soundar Msr
 
Civil tiltle for 2012
Civil tiltle for 2012Civil tiltle for 2012
Civil tiltle for 2012Soundar Msr
 
Automobile and hydraullic and pneumatic titles for 2012
Automobile and hydraullic and pneumatic  titles for 2012Automobile and hydraullic and pneumatic  titles for 2012
Automobile and hydraullic and pneumatic titles for 2012Soundar Msr
 
Android titles 2012 c
Android  titles 2012 cAndroid  titles 2012 c
Android titles 2012 cSoundar Msr
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsiSoundar Msr
 

Más de Soundar Msr (20)

Robotics titles for 2012
Robotics  titles for 2012Robotics  titles for 2012
Robotics titles for 2012
 
Power electronics tiltle for 2012
Power electronics tiltle for 2012Power electronics tiltle for 2012
Power electronics tiltle for 2012
 
Ns2 titles
Ns2 titlesNs2 titles
Ns2 titles
 
Mini project tittles
Mini project tittlesMini project tittles
Mini project tittles
 
Mca titles
Mca titlesMca titles
Mca titles
 
Mca & diplamo java titles
Mca & diplamo java titlesMca & diplamo java titles
Mca & diplamo java titles
 
Mca & diplamo .net titles
Mca & diplamo .net titlesMca & diplamo .net titles
Mca & diplamo .net titles
 
Mba tiltle for 2012
Mba tiltle for 2012Mba tiltle for 2012
Mba tiltle for 2012
 
Matlab titles
Matlab titlesMatlab titles
Matlab titles
 
Java titles 2012 c
Java titles 2012 cJava titles 2012 c
Java titles 2012 c
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsi
 
Ieee 2012 titles for matlab
Ieee 2012 titles for matlabIeee 2012 titles for matlab
Ieee 2012 titles for matlab
 
Ieee 2012 titles for java & .net
Ieee 2012 titles for java & .netIeee 2012 titles for java & .net
Ieee 2012 titles for java & .net
 
Hard wares
Hard waresHard wares
Hard wares
 
Dotnet tiltle for 2012 c
Dotnet tiltle for 2012   cDotnet tiltle for 2012   c
Dotnet tiltle for 2012 c
 
Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012Diplamo civil tiltle for 2012
Diplamo civil tiltle for 2012
 
Civil tiltle for 2012
Civil tiltle for 2012Civil tiltle for 2012
Civil tiltle for 2012
 
Automobile and hydraullic and pneumatic titles for 2012
Automobile and hydraullic and pneumatic  titles for 2012Automobile and hydraullic and pneumatic  titles for 2012
Automobile and hydraullic and pneumatic titles for 2012
 
Android titles 2012 c
Android  titles 2012 cAndroid  titles 2012 c
Android titles 2012 c
 
Ieee 2012 titles for vlsi
Ieee 2012 titles for vlsiIeee 2012 titles for vlsi
Ieee 2012 titles for vlsi
 

Último

DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfTechSoup
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxSaurabhParmar42
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptxmary850239
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 

Último (20)

DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdfMaximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
Maximizing Impact_ Nonprofit Website Planning, Budgeting, and Design.pdf
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Finals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quizFinals of Kant get Marx 2.0 : a general politics quiz
Finals of Kant get Marx 2.0 : a general politics quiz
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 
CAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptxCAULIFLOWER BREEDING 1 Parmar pptx
CAULIFLOWER BREEDING 1 Parmar pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
3.19.24 Urban Uprisings and the Chicago Freedom Movement.pptx
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 

Ieee 2012 titles for java & .net

  • 1. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : temasolution@gmail.com S.NO PROJECT TITLE CODE YEAR CLOUD COMPUTING 1. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable JD001 2012 Access Control in Cloud Computing 2. A Secure Erasure Code-Based Cloud Storage System with Secure Data JD002 2012 Forwarding 3. Enabling Secure and Efficient Ranked Keyword Search over Outsourced JD003 2012 Cloud Data 4. A service oriented livestock management system using occasionally JD004 2012 connected mobile-cloud architecture 5. Privacy Preserving Access Control with Authentication for Securing Data in JD005 2012 Clouds 6. Data Outsourcing Simplified: Generating Data Connectors from JD006 2012 Confidentiality and Access Policies 7. Towards bringing real-time online applications on Clouds JD007 2012 8. An analysis of requirements to supporting mobility in Body Area Networks JD008 2012 KNOWLEDGE AND DATA ENGINEERING 9. Answering General Time-Sensitive Queries JD009 2012 10. Creating Evolving User Behaviour Profiles Automatically JD010 2012 11. Effective Pattern Discovery for Text Mining JD011 2012 12. Extending Attribute Information for Small Data Set Classification JD012 2012 13. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining JD013 2012 Analysis 14. Organizing User Search Histories JD014 2012 15. Outsourced Similarity Search on Metric Data Assets JD015 2012 16. Practical Efficient String Mining JD016 2012 17. Ranking Model Adaptation for Domain-Specific Search JD017 2012 18. Tree-Based Mining for Discovering Patterns of Human Interaction in JD018 2012 Meetings 19. Slicing: A New Approach for Privacy Preserving Data Publishing JD019 2012 20. SPIRE: Efficient Data Inference and Compression over RFID Streams JD020 2012 21. ROAD: A New Spatial Object Search Framework for Road Networks JD021 2012 Further more details visit : http://www.temasolution.com/downloads.html send your request to : info@temasolution.com
  • 2. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : temasolution@gmail.com 22. Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data JD022 2012 Systems 23. Segmentation and Sampling of Moving Object Trajectories Based on JD023 2012 Representativeness MOBILE COMPUTING 24. Approximation Algorithms for Data Broadcast in Wireless Networks JD024 2012 25. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring JD025 2012 via Virtual Trip Lines 26. Energy-Efficient Cooperative Video Distribution with Statistical QoS JD026 2012 Provisions over Wireless Networks 27. Mobile Data Offloading through Opportunistic Communications and Social JD027 2012 Participation 28. A New Mobile Spatial Information Service Grid Computing Model Based on JD028 2012 Mobile Agent 29. Mobile Computing Systems Programming: A Graduate Distributed JD029 2012 Computing Course 30. Mobile cloud computing service based on heterogeneous wireless and JD030 2012 mobile P2P networks 31. Mobile computing scheduling mechanism based on self ranking algorithm JD031 2012 32. Reducing location management costs in hierarchical-based model of mobile JD032 2012 and wireless computing systems 33. A proposal of a memory management architecture for mobile computing JD033 2012 environments 34. Real-time transaction management in mobile computing systems JD034 2012 35. A Distributed Cache Management Architecture for Mobile Computing JD035 2012 Environments 36. Trusted Management for Mobile Computing Entities Enabled by Fuzzy JD036 2012 Logic Approach 37. Monitoring and detecting abnormal behaviour in mobile cloud infrastructure JD037 2012 NETWORK SECURITY 38. Scalable Video Multicast with Adaptive Modulation and Coding in JD038 2012 Broadband Wireless Data Systems 39. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks JD039 2012 40. Exploiting Data Fusion to Improve the Coverage of Wireless Sensor JD040 2012 Networks 41. Distributed Resource Allocation Based on Queue Balancing in Multihop JD041 2012 Cognitive Radio Networks 42. Insights on Media Streaming Progress Using BitTorrent-Like Protocols for JD042 2012 On-Demand Streaming 43. Bit Rate Reduction Video Transcoding with Distributed Computing JD043 2012 44. Distributed S-Net: Cluster and Grid Computing without the Hassle JD044 2012 Further more details visit : http://www.temasolution.com/downloads.html send your request to : info@temasolution.com
  • 3. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : temasolution@gmail.com NETWORK ROUTING 45. Multi-rate combination of opportunistic routing and network coding: An JD045 2012 optimization perspective 46. LRNC: Lifetime-aware routing using network coding in wireless sensor JD046 2012 network 47. A Multipath Layered Cluster Based Routing for Ad Hoc Networks JD047 2012 48. Comparison of routing and network coding in undirected network group JD048 2012 communications 49. Measurement-Aware Monitor Placement and Routing: A Joint Optimization JD049 2012 Approach for Network-Wide Measurements 50. On dynamics of field based anycast routing in wireless mesh networks JD050 2012 51. Multipath routing backbones for load balancing in Mobile Ad hoc Networks JD051 2012 NETWORK ATTACK AND INDRUTION DETECION 52. Knowledge-independent traffic monitoring: Unsupervised detection of JD052 2012 network attacks 53. An efficient sequential watermark detection model for tracing network attack JD053 2012 flows 54. FireCol: A Collaborative Protection Network for the Detection of Flooding JD054 2012 DDoS Attacks 55. Detection and prevention of SIP flooding attacks in voice over IP networks JD055 2012 56. The Model — Dynamic and Flexible Intrusion Detection Protocol for high JD056 2012 error rate Wireless Sensor Networks based on data flow 57. Alert over the attacks of data packet and detect the intruders JD057 2012 58. Privacy-preserving anomaly detection across multi-domain networks JD058 2012 59. Classification and Experimental Analysis for Clone Detection Approaches in JD059 2012 Wireless Sensor Networks 60. Port-based traffic verification as a paradigm for anomaly detection JD060 2012 61. On detecting malicious behaviors in interactive networks: Algorithms and JD061 2012 analysis 62. Genetic algorithm and artificial immune systems: A combinational approach JD062 2012 for network intrusion detection NETWORK TRAFFIC 63. Network traffic anomaly detection using machine learning approaches JD063 2012 64. Analysis and provisioning of network traffic in cloud environment using JD064 2012 Markov model 65. Traffic clustering and online traffic prediction in vehicle networks: A social JD065 2012 influence perspective Further more details visit : http://www.temasolution.com/downloads.html send your request to : info@temasolution.com
  • 4. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : temasolution@gmail.com 66. Detecting anomalies in network traffic using Entropy and Mahalanobis JD066 2012 distance 67. Traffic Engineering for Multicast Connections in Multiservice Cellular JD067 2012 Networks DATA MINING LATTICE BASED 68. Data Mining method based on Lattice JD068 2012 69. Application of data mining in educational databases for predicting academic JD069 2012 trends and patterns 70. Data mining based network intrusion detection system: A database centric JD070 2012 approach 71. Fuzzy Modeling Built Through a Data Mining Process JD071 2012 72. Visual data mining over a video wall JD072 2012 73. Relevance Matters: Capitalizing on Less (Top-k Matching in JD073 2012 Publish/Subscribe) 74. Multidimensional Analysis of Atypical Events in Cyber-Physical Data JD074 2012 75. The eICU Research Institute - A Collaboration Between Industry, Health- JD075 2012 Care Providers, and Academia 76. Deciphering human language [information extraction] JD076 2012 77. Architecture for the management and presentation of communication JD077 2012 network performance data 78. Smart shopper: an agent-based web-mining approach to Internet shopping JD078 2012 MULTIMEDIA 79. Interactive Video Indexing With Statistical Active Learning JD079 2012 80. Sparse Ensemble Learning for Concept Detection JD080 2012 81. A Matrix-Based Approach to Unsupervised Human Action Categorization JD081 2012 82. Robust Image Coding Based Upon Compressive Sensing JD082 2012 83. Web Video Geolocation by Geotagged Social Resources JD083 2012 BIOMEDICAL 84. Video Distribution Techniques over WiMAX Networks for m-Health JD084 2012 Applications 85. Secure Management of Biomedical Data With Cryptographic Hardware JD085 2012 86. Mobile Medical Visual Information Retrieval JD086 2012 IMAGE PROCESSING Further more details visit : http://www.temasolution.com/downloads.html send your request to : info@temasolution.com
  • 5. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : temasolution@gmail.com 87. Scene-Oriented Hierarchical Classification of Blurry and Noisy Images JD087 2012 88. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for JD088 2012 Binary Covers 89. Game-Theoretic Pricing for Video Streaming in Mobile Networks JD089 2012 IMAGE SEGMENTATION 90. Multiple kernel fuzzy C-means algorithm with ALS method for satellite and JD090 2012 medical image segmentation 91. Leap segmentation for recovering image surface layout JD091 2012 92. A Scale-Synthesis Method for High Spatial Resolution Remote Sensing JD093 2012 Image Segmentation 93. Multistage Image Clustering and Segmentation with Normalised Cuts JD093 2012 PARALLEL AND DISTRIBUTED SYSTEMS 94. Autonomic Placement of Mixed Batch and Transactional Workloads JD094 2012 95. An Online Data Access Prediction and Optimization Approach for JD095 2012 Distributed Systems 96. Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths JD096 2012 SOFTWARE ENGINEERING 97. QoS Assurance for Dynamic Reconfiguration of Component-Based Software JD097 2012 Systems 98. StakeRare: Using Social Networks and Collaborative Filtering for Large- JD098 2012 Scale Requirements Elicitation 99. Comparing Semi-Automated Clustering Methods for Personal Development JD099 2012 100. Invariant-Based Automatic Testing of Modern Web Applications JD100 2012 101. Automatically Generating Test Cases for Specification Mining JD101 2012 102. Aspectizing Java Access Control JD102 2012 DEPENDABLE AND SECURE COMPUTING 103. Automatic Reconfiguration for Large-Scale Reliable Storage Systems JD103 2012 104. Detecting and Resolving Firewall Policy Anomalies JD104 2012 105. DoubleGuard: Detecting Intrusions in Multitier Web Applications JD105 2012 106. JS-Reduce: Defending Your Data from Sequential Background Knowledge JD106 2012 Attacks 107. Incentive Compatible Privacy-Preserving Distributed Classification JD107 2012 Further more details visit : http://www.temasolution.com/downloads.html send your request to : info@temasolution.com
  • 6. 28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : temasolution@gmail.com WEB MINING 108. Web 2.0 content extraction JD108 2012 109. Automated Security Test Generation with Formal Threat Models JD109 2012 110. Improving the Automation of Security Information Management: A JD110 2012 Collaborative Approach 111. Optimal Aviation Security Screening Strategies With Dynamic Passenger JD111 2012 Risk Updates TOPOLOGY 112. Routing characterization in volatile connectivity environments JD112 2012 113. A Distributed Reliable and Energy-Efficient Topology Control Algorithm in JD113 2012 Wireless Sensor Network 114. A method of tree network topology inference based on hierarchical host table JD114 2012 115. Topology management for mission critical networks: Applying supply and JD115 2012 demand to manage public safety networks 116. SNMP-based network topology discovery algorithm and implementation JD116 2012 117. Overlaid Mesh Topology Design and Deadlock Free Routing in Wireless JD117 2012 Network-on-Chip 118. Topology Enhancements in Wireless Multihop Networks: A Top-Down JD118 2012 Approach 119. A dynamic detective method against ROP attack on ARM platform JD119 2012 120. Countering entropy measure attacks on packed software detection JD120 2012 121. Performance Modeling and Analysis of Network Firewalls JD121 2012 122. Research on Malicious Code Detection Based on Least-squares Estimation JD122 2012 123. Stochastic analysis of horizontal IP scanning JD123 2012 Further more details visit : http://www.temasolution.com/downloads.html send your request to : info@temasolution.com