SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH.
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
PARLLEL DISTRIBUTION
1. CCD: A Distributed Publish/Subscribe Framework for Rich Content
Formats
2. Catching Packets Droppers and Modifiers in Wireless Sensor
Network
3. Cut Detection in Wireless Sensor Networks
4. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks
5. Design and Implementation of TARF: A Trust-Aware Routing
FrameWork for WSNs
6. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
7. SPOC: A Secure and Privacy Preserving Oppertunistic Computing
FrameWork For Mobile Healthcare Emergency
8. The Three-Tier Security Scheme in Wireless Sensor Networks with
Mobile Sinks
9. Catching Packet Droppers and Modifiers in Wireless Sensor
Networks
10.Bounding the Impact of Unbounded Attacks in Stabilization
11.Balancing the Trade-Offs between Query Delay and Data A
vailability in MANETs
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
CLOUD COMPUITNG
1. A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding.
2. Cloud Computing Security From Single to Multi-Clouds.
3. Enhanced Data Security Model for Cloud Computing
4. Ensuring Distributed Accountability for Data Sharing in the Cloud.
5. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing.
6. Outsourced Similarity Search on Metric Data Assets
7. Privacy-Preserving Public Auditing for Secure Cloud Storage
8. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption.
9. Toward Secure and Dependable Storage Services in Cloud Computing.
10.Enabling Secure and Efficient Ranked Keyword Search over Outsourced
Cloud Data
11.Efficient Audit Service Outsourcing for Data Integrity in Clouds
12.A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
13.Cloud Data Production for Masses
14.Cashing in on the Cache in the Cloud
15.pCloud: A Distributed System for Practical PIR
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
1. A Query Formulation Language for the data web
2. Creating Evolving User Behavior Profiles Automatically
3. D-Cache: Universal Distance Cache for Metric Access Methods
4. DDD: A New Ensemble Approach for Dealing with Concept Drift
5. Efficient Computation of Range Aggregates against Uncertain Location-
Based Queries
6. Efficient Fuzzy Type-Ahead Search in XML Data
7. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining
Analysis
8. Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques
9. Measuring the Sky: On Computing Data Cubes via Skylining the Measures
10.Mining Web Graphs for Recommendations
11.Organizing User Search Histories
12.Publishing Search Logs—A Comparative Study of Privacy Guarantees
13.Query Planning for Continuous Aggregation Queries over a Network of
Data Aggregators
14.ROAD: A New Spatial Object Search Framework for Road Networks
15.Scalable Learning of Collective Behavior
16.Slicing: A New Approach for Privacy Preserving Data Publishing
17.Tree-Based Mining for Discovering Patterns of Human Interaction in
Meetings
18.Ranking Model Adaptation For Domain-Specific Search
19.Adding Temporal Constraints to XML Schema
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
DATA MINING
20.Combining Tag and Value Similarity for Data Extraction and Alignment
21.Coupled Behavior Analysis with Applications
22.Data Mining for XML Query‐ Answering Support
23.Document Clustering in Correlation Similarity Measure Space
24.Efficient and Effective Duplicate Detection in Hierarchical Data
25.Efficient Extended Boolean Retrieval
26.Clustering with Multiviewpoint Based Similarity Measure
27.Optimizing Bloom Filter Settings in Peer‐ to‐ Peer Multi‐ keyword
Searching
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
1. Cooperative Download in Vehicular Environments
2. Distributed Throughput Maximization in Wireless Networks via
Random Power Allocation
3. Network Assisted Mobile Computing with Optimal Uplink Query
Processing
4. Protecting Location Privacy in Sensor Networks against a Global
Eavesdropper
5. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc
Networks
6. Leveraging Smartphone Cameras for Collaborative Road Advisories
7. Compressed-Sensing-Enabled Video Streaming for Wireless
8. Secure and Efficient Handover Authentication Based on Bilinear Pairing
Functions
9. On Quality of Monitoring for Multi-channel Wireless Infrastructure
Networks
10.Learn to Personalized Image Search from the Photo Sharing Websites
11.Fast Data Collection in Tree-Based Wireless Sensor Networks
12.An Iterative Algorithm for Trust Management and Adversary Detection
for Delay Tolerant Networks
13.Message Drop and Scheduling in DTNs: Theory and Practice
14.Thwarting Control‐ Channel Jamming Attacks from Inside Jammers
15.Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation
16.Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and
Cross Layer Optimization for Scalable Video Streaming
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
MOBILE COMPUTING
17.A Trigger Identification Service for Defending Reactive Jammers in
WSN
18.Resource Aware Video Multicasting via Access Gateways in Wireless
Mesh Networks
19.Low Power Consumption Solutions for Mobile Instant Messaging
20.Converge Cast: On the Capacity and Delay Tradeoffs
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
1. Finding Cheap Routes in Profit Driven Opportunistic Spectrum Access
2. Networks: A Truthful Mechanism Design Approach
3. Online Adaptive Compression in Delay Sensitive Wireless Sensor Networks
4. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing
5. Topologies
6. Design and Implementation of TARF: A Trust‐ Aware Routing Framework
for WSNs
7. Framework for Mobile Healthcare Emergency
8. A New Cell-Counting-Based Attack Against Tor
9. Optimal Source-Based Filtering of Malicious Traffic
10.Uncoordinated Cooperative Communications in Highly Dynamic Wireless
Networks
11.Load-Balancing Multipath Switching System with Flow Slice
12.Latency Equalization as a New Network Service Primitive
13.Balancing the Trade offs between Query Delay and Data Availability in
MANETs
14.Fair Torrent: A Deficit-based Distributed Algorithm to Ensure Fairness in
Peer-to-Peer Systems
15.Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia
Sensor Networks
16.Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks:
Theory and Algorithms
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKING
17.SPOC:A Secure and Privacy preserving Opportunistic Computing
18.Framework for Mobile Healthcare Emergency
19.Topology control in mobile adhoc Networks with cooperative
communications
20.Distributed Throughput Maximization in Wireless Networks via Random
Power Allocation
21.Automatic Reconfiguration for Large-Scale Reliable Storage Systems
22.Throughput and Energy Efficiency in Wireless Ad Hoc Networks With
Gaussian Channels Throughput Maximization in Wireless Networks via Random
Power Allocation
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
NETWORKSECURITY
1. A Hybrid Approach to Private Record Matching
2. Enabling Secure and Efficient Ranked Keyword Search over
Outsourced Cloud Data
3. On Privacy of Encrypted Speech Communications
4. Persuasive Cued Click‐ Points: Design, Implementation, and Evaluation
of a Knowledge Based Authentication Mechanism
5. Privacy Preserving Enforcement of Spatially Aware RBAC
6. Revisiting Defenses against Large‐ Scale Online Password Guessing
Attacks
7. Scalable and Secure Sharing of Personal Health Records in
Cloud Computing using Attribute based Encryption
8. Security of Bertino-Shang-Wagstaff Time Bound Hierarchical Key
Management Scheme for Secure Broadcasting
9. Enhancing Data Trustworthiness via Assured Digital Signing
10.A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
11.A Probabilistic Model of Visual Cryptography Scheme With Dynamic
Group
12.Characterizing the Efficacy of the NRL Network Pump in Mitigating
Covert Timing Channels
13.Design and Implementation of TARF A Trust-Aware Routing Framework
for WSNs
14.Fast Matrix Embedding by Matrix Extending
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SERVICE COMPUTING
1. Expert Discovery and Interactions in Mixed Service-Oriented Systems
2. Towards Secure and Dependable Storage Services in Cloud Computing.
3. Detecting Spam Zombies by Monitoring Outgoing Messages
4. Expert Discovery and Interactions in Mixed Service-Oriented Systems
5. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
IMAGE PROCESSING
1. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
2. A Probabilistic Model of Visual Cryptography Scheme With Dynamic
Group
3. Active Visual Segmentation
4. Image Segmentation Based on the Poincaré Map Method
5. K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR
IMAGE USING RANDOM NUMBER
6. Multiple Exposure Fusion for High Dynamic Range Image Acquisition
7. Semi-supervised Biased Maximum Margin Analysis for Interactive
Image Retrieval
8. Smile Detection by Boosting Pixel Differences
9. View-invariant action recognition based on Artificial Neural Networks
10.A Novel Anti phishing framework based on visual cryptography
11.Low-Complexity Compression Method for Hyperspectral Images Based
on Distributed Source Coding
12.A Discriminative Model of Motion and Cross Ratio for View-Invariant
Action Recognition
13.Multibiometric Cryptosystems Based on Feature-Level Fusion
14.Automatic Image Equalization and Contrast Enhancement Using
Gaussian Mixture Modeling
15.Image Authentication Using Distributed Source Coding
16.Analyzing Image Deblurring Through Three Paradigms
17.Fast Vanishing point Detection in Unstructured Environments
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
IMAGE PROCESSING
18.An Online Learning Approach to Occlusion Boundary Detection
19.Robust Face‐ Name Graph Matching for Movie Character Identification
20.Shadow Removal Using Bilateral Filtering
21.Combining Head Pose and Eye Location Information for Gaze
Estimation
22.A Secret‐ Sharing‐ Based Method for Authentication of Grayscale
Document
23.Images via the Use of the PNG Image With a Data Repair Capability
Mobile: (0) 9849539085 Email: richbraintech@gmail.com
IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES
IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH
IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE
IEEE 2012-13 DOTNET PROJECTS
IEEE Final Year Projects 2012 |Student Projects|
IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH
Contact Mobile: (0) 9849539085
Contact Email: richbraintech@gmail.com
SECURE COMPUTING
1. Design and Implementation of TARF: A Trust-Aware Routing
Framework for WSNs
2. ES-MPICH2: A Message Passing Interface with Enhanced Security
3. On the Security and Efficiency of Content Distribution via Network
Coding
4. SPOC: A Secure and Privacy-preserving Opportunistic Computing
Framework forMobile-Healthcare Emergency
5. A Secure Intrusion detection system against DDOS attack in Wireless
Mobile Ad-hoc Network
6. Revisiting Defenses against Large-Scale Online Password Guessing
Attacks
7. Persuasive Cued Click-Points: Design, Implementation, and Evaluation
of a Knowledge-Based Authentication Mechanism
8. Automatic Reconfiguration for Large-Scale Reliable Storage Systems

Más contenido relacionado

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 

Destacado

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Ieee 2012 2013 be dotnet projects richbraintech

  • 1. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH. Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com PARLLEL DISTRIBUTION 1. CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats 2. Catching Packets Droppers and Modifiers in Wireless Sensor Network 3. Cut Detection in Wireless Sensor Networks 4. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks 5. Design and Implementation of TARF: A Trust-Aware Routing FrameWork for WSNs 6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 7. SPOC: A Secure and Privacy Preserving Oppertunistic Computing FrameWork For Mobile Healthcare Emergency 8. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 9. Catching Packet Droppers and Modifiers in Wireless Sensor Networks 10.Bounding the Impact of Unbounded Attacks in Stabilization 11.Balancing the Trade-Offs between Query Delay and Data A vailability in MANETs
  • 2. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com CLOUD COMPUITNG 1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding. 2. Cloud Computing Security From Single to Multi-Clouds. 3. Enhanced Data Security Model for Cloud Computing 4. Ensuring Distributed Accountability for Data Sharing in the Cloud. 5. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. 6. Outsourced Similarity Search on Metric Data Assets 7. Privacy-Preserving Public Auditing for Secure Cloud Storage 8. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. 9. Toward Secure and Dependable Storage Services in Cloud Computing. 10.Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 11.Efficient Audit Service Outsourcing for Data Integrity in Clouds 12.A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding 13.Cloud Data Production for Masses 14.Cashing in on the Cache in the Cloud 15.pCloud: A Distributed System for Practical PIR
  • 3. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com DATA MINING 1. A Query Formulation Language for the data web 2. Creating Evolving User Behavior Profiles Automatically 3. D-Cache: Universal Distance Cache for Metric Access Methods 4. DDD: A New Ensemble Approach for Dealing with Concept Drift 5. Efficient Computation of Range Aggregates against Uncertain Location- Based Queries 6. Efficient Fuzzy Type-Ahead Search in XML Data 7. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis 8. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques 9. Measuring the Sky: On Computing Data Cubes via Skylining the Measures 10.Mining Web Graphs for Recommendations 11.Organizing User Search Histories 12.Publishing Search Logs—A Comparative Study of Privacy Guarantees 13.Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 14.ROAD: A New Spatial Object Search Framework for Road Networks 15.Scalable Learning of Collective Behavior 16.Slicing: A New Approach for Privacy Preserving Data Publishing 17.Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings 18.Ranking Model Adaptation For Domain-Specific Search 19.Adding Temporal Constraints to XML Schema
  • 4. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com DATA MINING 20.Combining Tag and Value Similarity for Data Extraction and Alignment 21.Coupled Behavior Analysis with Applications 22.Data Mining for XML Query‐ Answering Support 23.Document Clustering in Correlation Similarity Measure Space 24.Efficient and Effective Duplicate Detection in Hierarchical Data 25.Efficient Extended Boolean Retrieval 26.Clustering with Multiviewpoint Based Similarity Measure 27.Optimizing Bloom Filter Settings in Peer‐ to‐ Peer Multi‐ keyword Searching
  • 5. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com MOBILE COMPUTING 1. Cooperative Download in Vehicular Environments 2. Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 3. Network Assisted Mobile Computing with Optimal Uplink Query Processing 4. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper 5. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks 6. Leveraging Smartphone Cameras for Collaborative Road Advisories 7. Compressed-Sensing-Enabled Video Streaming for Wireless 8. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions 9. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 10.Learn to Personalized Image Search from the Photo Sharing Websites 11.Fast Data Collection in Tree-Based Wireless Sensor Networks 12.An Iterative Algorithm for Trust Management and Adversary Detection for Delay Tolerant Networks 13.Message Drop and Scheduling in DTNs: Theory and Practice 14.Thwarting Control‐ Channel Jamming Attacks from Inside Jammers 15.Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation 16.Design of Efficient Multicast Protocol for IEEE 802.11n WLANs and Cross Layer Optimization for Scalable Video Streaming
  • 6. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com MOBILE COMPUTING 17.A Trigger Identification Service for Defending Reactive Jammers in WSN 18.Resource Aware Video Multicasting via Access Gateways in Wireless Mesh Networks 19.Low Power Consumption Solutions for Mobile Instant Messaging 20.Converge Cast: On the Capacity and Delay Tradeoffs
  • 7. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKING 1. Finding Cheap Routes in Profit Driven Opportunistic Spectrum Access 2. Networks: A Truthful Mechanism Design Approach 3. Online Adaptive Compression in Delay Sensitive Wireless Sensor Networks 4. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing 5. Topologies 6. Design and Implementation of TARF: A Trust‐ Aware Routing Framework for WSNs 7. Framework for Mobile Healthcare Emergency 8. A New Cell-Counting-Based Attack Against Tor 9. Optimal Source-Based Filtering of Malicious Traffic 10.Uncoordinated Cooperative Communications in Highly Dynamic Wireless Networks 11.Load-Balancing Multipath Switching System with Flow Slice 12.Latency Equalization as a New Network Service Primitive 13.Balancing the Trade offs between Query Delay and Data Availability in MANETs 14.Fair Torrent: A Deficit-based Distributed Algorithm to Ensure Fairness in Peer-to-Peer Systems 15.Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 16.Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
  • 8. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKING 17.SPOC:A Secure and Privacy preserving Opportunistic Computing 18.Framework for Mobile Healthcare Emergency 19.Topology control in mobile adhoc Networks with cooperative communications 20.Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 21.Automatic Reconfiguration for Large-Scale Reliable Storage Systems 22.Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels Throughput Maximization in Wireless Networks via Random Power Allocation
  • 9. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com NETWORKSECURITY 1. A Hybrid Approach to Private Record Matching 2. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data 3. On Privacy of Encrypted Speech Communications 4. Persuasive Cued Click‐ Points: Design, Implementation, and Evaluation of a Knowledge Based Authentication Mechanism 5. Privacy Preserving Enforcement of Spatially Aware RBAC 6. Revisiting Defenses against Large‐ Scale Online Password Guessing Attacks 7. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute based Encryption 8. Security of Bertino-Shang-Wagstaff Time Bound Hierarchical Key Management Scheme for Secure Broadcasting 9. Enhancing Data Trustworthiness via Assured Digital Signing 10.A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 11.A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 12.Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels 13.Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs 14.Fast Matrix Embedding by Matrix Extending
  • 10. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com SERVICE COMPUTING 1. Expert Discovery and Interactions in Mixed Service-Oriented Systems 2. Towards Secure and Dependable Storage Services in Cloud Computing. 3. Detecting Spam Zombies by Monitoring Outgoing Messages 4. Expert Discovery and Interactions in Mixed Service-Oriented Systems 5. Revisiting Defenses against Large-Scale Online Password Guessing Attacks
  • 11. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com IMAGE PROCESSING 1. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching 2. A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group 3. Active Visual Segmentation 4. Image Segmentation Based on the Poincaré Map Method 5. K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER 6. Multiple Exposure Fusion for High Dynamic Range Image Acquisition 7. Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 8. Smile Detection by Boosting Pixel Differences 9. View-invariant action recognition based on Artificial Neural Networks 10.A Novel Anti phishing framework based on visual cryptography 11.Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding 12.A Discriminative Model of Motion and Cross Ratio for View-Invariant Action Recognition 13.Multibiometric Cryptosystems Based on Feature-Level Fusion 14.Automatic Image Equalization and Contrast Enhancement Using Gaussian Mixture Modeling 15.Image Authentication Using Distributed Source Coding 16.Analyzing Image Deblurring Through Three Paradigms 17.Fast Vanishing point Detection in Unstructured Environments
  • 12. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com IMAGE PROCESSING 18.An Online Learning Approach to Occlusion Boundary Detection 19.Robust Face‐ Name Graph Matching for Movie Character Identification 20.Shadow Removal Using Bilateral Filtering 21.Combining Head Pose and Eye Location Information for Gaze Estimation 22.A Secret‐ Sharing‐ Based Method for Authentication of Grayscale Document 23.Images via the Use of the PNG Image With a Data Repair Capability
  • 13. Mobile: (0) 9849539085 Email: richbraintech@gmail.com IEEE 2012-2013 PROJECTS@RICHBRAIN TECHNOLOGIES IEEE FINAL YEAR PROJECTS FOR B.E, B.TECH, M.E, M.TECH IEEE 2012-2013 PROJECTS FOR CSE, IT, ECE, EEE IEEE 2012-13 DOTNET PROJECTS IEEE Final Year Projects 2012 |Student Projects| IEEE PROJECT TITLES FOR STUDENTS B.E., B.TECH., M.E,M.TECH Contact Mobile: (0) 9849539085 Contact Email: richbraintech@gmail.com SECURE COMPUTING 1. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs 2. ES-MPICH2: A Message Passing Interface with Enhanced Security 3. On the Security and Efficiency of Content Distribution via Network Coding 4. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency 5. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network 6. Revisiting Defenses against Large-Scale Online Password Guessing Attacks 7. Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism 8. Automatic Reconfiguration for Large-Scale Reliable Storage Systems