Ieee 2012 titles for java & .net
-
Upload
soundar-msr -
Category
Documents
-
view
141 -
download
2
Transcript of Ieee 2012 titles for java & .net
Further more details visit : http://www.temasolution.com/downloads.html
send your request to : [email protected]
28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]
S.NO PROJECT TITLE
CODE YEAR
CLOUD COMPUTING
1. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing
JD001 2012
2. A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
JD002 2012
3. Enabling Secure and Efficient Ranked Keyword Search over Outsourced
Cloud Data
JD003 2012
4. A service oriented livestock management system using occasionally
connected mobile-cloud architecture
JD004 2012
5. Privacy Preserving Access Control with Authentication for Securing Data in
Clouds
JD005 2012
6. Data Outsourcing Simplified: Generating Data Connectors from
Confidentiality and Access Policies
JD006 2012
7. Towards bringing real-time online applications on Clouds
JD007 2012
8. An analysis of requirements to supporting mobility in Body Area Networks
JD008 2012
KNOWLEDGE AND DATA ENGINEERING
9. Answering General Time-Sensitive Queries
JD009 2012
10. Creating Evolving User Behaviour Profiles Automatically
JD010 2012
11. Effective Pattern Discovery for Text Mining
JD011 2012
12. Extending Attribute Information for Small Data Set Classification
JD012 2012
13. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining
Analysis
JD013 2012
14. Organizing User Search Histories
JD014 2012
15. Outsourced Similarity Search on Metric Data Assets
JD015 2012
16. Practical Efficient String Mining
JD016 2012
17. Ranking Model Adaptation for Domain-Specific Search
JD017 2012
18. Tree-Based Mining for Discovering Patterns of Human Interaction in
Meetings
JD018 2012
19. Slicing: A New Approach for Privacy Preserving Data Publishing
JD019 2012
20. SPIRE: Efficient Data Inference and Compression over RFID Streams
JD020 2012
21. ROAD: A New Spatial Object Search Framework for Road Networks
JD021 2012
Further more details visit : http://www.temasolution.com/downloads.html
send your request to : [email protected]
28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]
22. Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data
Systems
JD022 2012
23. Segmentation and Sampling of Moving Object Trajectories Based on
Representativeness
JD023 2012
MOBILE COMPUTING
24. Approximation Algorithms for Data Broadcast in Wireless Networks
JD024 2012
25. Enhancing Privacy and Accuracy in Probe Vehicle-Based Traffic Monitoring
via Virtual Trip Lines
JD025 2012
26. Energy-Efficient Cooperative Video Distribution with Statistical QoS
Provisions over Wireless Networks
JD026 2012
27. Mobile Data Offloading through Opportunistic Communications and Social
Participation
JD027 2012
28. A New Mobile Spatial Information Service Grid Computing Model Based on
Mobile Agent
JD028 2012
29. Mobile Computing Systems Programming: A Graduate Distributed
Computing Course
JD029 2012
30. Mobile cloud computing service based on heterogeneous wireless and
mobile P2P networks
JD030 2012
31. Mobile computing scheduling mechanism based on self ranking algorithm JD031 2012
32. Reducing location management costs in hierarchical-based model of mobile
and wireless computing systems
JD032 2012
33. A proposal of a memory management architecture for mobile computing
environments
JD033 2012
34. Real-time transaction management in mobile computing systems
JD034 2012
35. A Distributed Cache Management Architecture for Mobile Computing
Environments
JD035 2012
36. Trusted Management for Mobile Computing Entities Enabled by Fuzzy
Logic Approach
JD036 2012
37. Monitoring and detecting abnormal behaviour in mobile cloud infrastructure
JD037 2012
NETWORK SECURITY
38. Scalable Video Multicast with Adaptive Modulation and Coding in
Broadband Wireless Data Systems
JD038 2012
39. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks
JD039 2012
40. Exploiting Data Fusion to Improve the Coverage of Wireless Sensor
Networks
JD040 2012
41. Distributed Resource Allocation Based on Queue Balancing in Multihop
Cognitive Radio Networks
JD041 2012
42. Insights on Media Streaming Progress Using BitTorrent-Like Protocols for
On-Demand Streaming
JD042 2012
43. Bit Rate Reduction Video Transcoding with Distributed Computing JD043 2012
44. Distributed S-Net: Cluster and Grid Computing without the Hassle JD044 2012
Further more details visit : http://www.temasolution.com/downloads.html
send your request to : [email protected]
28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]
NETWORK ROUTING
45. Multi-rate combination of opportunistic routing and network coding: An
optimization perspective
JD045 2012
46. LRNC: Lifetime-aware routing using network coding in wireless sensor
network
JD046 2012
47. A Multipath Layered Cluster Based Routing for Ad Hoc Networks JD047 2012
48. Comparison of routing and network coding in undirected network group
communications
JD048 2012
49. Measurement-Aware Monitor Placement and Routing: A Joint Optimization
Approach for Network-Wide Measurements
JD049 2012
50. On dynamics of field based anycast routing in wireless mesh networks JD050 2012
51. Multipath routing backbones for load balancing in Mobile Ad hoc Networks JD051 2012
NETWORK ATTACK AND INDRUTION DETECION
52. Knowledge-independent traffic monitoring: Unsupervised detection of
network attacks
JD052 2012
53. An efficient sequential watermark detection model for tracing network attack
flows
JD053 2012
54. FireCol: A Collaborative Protection Network for the Detection of Flooding
DDoS Attacks
JD054 2012
55. Detection and prevention of SIP flooding attacks in voice over IP networks JD055 2012
56. The Model — Dynamic and Flexible Intrusion Detection Protocol for high
error rate Wireless Sensor Networks based on data flow
JD056 2012
57. Alert over the attacks of data packet and detect the intruders JD057 2012
58. Privacy-preserving anomaly detection across multi-domain networks JD058 2012
59. Classification and Experimental Analysis for Clone Detection Approaches in
Wireless Sensor Networks
JD059 2012
60. Port-based traffic verification as a paradigm for anomaly detection JD060 2012
61. On detecting malicious behaviors in interactive networks: Algorithms and
analysis
JD061 2012
62. Genetic algorithm and artificial immune systems: A combinational approach
for network intrusion detection
JD062 2012
NETWORK TRAFFIC
63. Network traffic anomaly detection using machine learning approaches JD063 2012
64. Analysis and provisioning of network traffic in cloud environment using
Markov model
JD064 2012
65. Traffic clustering and online traffic prediction in vehicle networks: A social
influence perspective
JD065 2012
Further more details visit : http://www.temasolution.com/downloads.html
send your request to : [email protected]
28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]
66. Detecting anomalies in network traffic using Entropy and Mahalanobis
distance
JD066 2012
67. Traffic Engineering for Multicast Connections in Multiservice Cellular
Networks
JD067 2012
DATA MINING LATTICE BASED
68. Data Mining method based on Lattice JD068 2012
69. Application of data mining in educational databases for predicting academic
trends and patterns
JD069 2012
70. Data mining based network intrusion detection system: A database centric
approach
JD070 2012
71. Fuzzy Modeling Built Through a Data Mining Process JD071 2012
72. Visual data mining over a video wall JD072 2012
73. Relevance Matters: Capitalizing on Less (Top-k Matching in
Publish/Subscribe)
JD073 2012
74. Multidimensional Analysis of Atypical Events in Cyber-Physical Data JD074 2012
75. The eICU Research Institute - A Collaboration Between Industry, Health-
Care Providers, and Academia
JD075 2012
76. Deciphering human language [information extraction] JD076 2012
77. Architecture for the management and presentation of communication
network performance data
JD077 2012
78. Smart shopper: an agent-based web-mining approach to Internet shopping JD078 2012
MULTIMEDIA
79. Interactive Video Indexing With Statistical Active Learning
JD079 2012
80. Sparse Ensemble Learning for Concept Detection
JD080 2012
81. A Matrix-Based Approach to Unsupervised Human Action Categorization
JD081 2012
82. Robust Image Coding Based Upon Compressive Sensing
JD082 2012
83. Web Video Geolocation by Geotagged Social Resources
JD083 2012
BIOMEDICAL
84. Video Distribution Techniques over WiMAX Networks for m-Health
Applications
JD084 2012
85. Secure Management of Biomedical Data With Cryptographic Hardware
JD085 2012
86. Mobile Medical Visual Information Retrieval
JD086 2012
IMAGE PROCESSING
Further more details visit : http://www.temasolution.com/downloads.html
send your request to : [email protected]
28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]
87. Scene-Oriented Hierarchical Classification of Blurry and Noisy Images
JD087 2012
88. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for
Binary Covers
JD088 2012
89. Game-Theoretic Pricing for Video Streaming in Mobile Networks
JD089 2012
IMAGE SEGMENTATION
90. Multiple kernel fuzzy C-means algorithm with ALS method for satellite and
medical image segmentation
JD090 2012
91. Leap segmentation for recovering image surface layout
JD091 2012
92. A Scale-Synthesis Method for High Spatial Resolution Remote Sensing
Image Segmentation
JD093 2012
93. Multistage Image Clustering and Segmentation with Normalised Cuts
JD093 2012
PARALLEL AND DISTRIBUTED SYSTEMS
94. Autonomic Placement of Mixed Batch and Transactional Workloads JD094 2012
95. An Online Data Access Prediction and Optimization Approach for
Distributed Systems
JD095 2012
96. Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths
JD096 2012
SOFTWARE ENGINEERING
97. QoS Assurance for Dynamic Reconfiguration of Component-Based Software
Systems
JD097 2012
98. StakeRare: Using Social Networks and Collaborative Filtering for Large-
Scale Requirements Elicitation
JD098 2012
99. Comparing Semi-Automated Clustering Methods for Personal Development
JD099 2012
100. Invariant-Based Automatic Testing of Modern Web Applications
JD100 2012
101. Automatically Generating Test Cases for Specification Mining
JD101 2012
102. Aspectizing Java Access Control
JD102 2012
DEPENDABLE AND SECURE COMPUTING
103. Automatic Reconfiguration for Large-Scale Reliable Storage Systems JD103 2012
104. Detecting and Resolving Firewall Policy Anomalies JD104 2012
105. DoubleGuard: Detecting Intrusions in Multitier Web Applications JD105 2012
106. JS-Reduce: Defending Your Data from Sequential Background Knowledge
Attacks
JD106 2012
107. Incentive Compatible Privacy-Preserving Distributed Classification JD107 2012
Further more details visit : http://www.temasolution.com/downloads.html
send your request to : [email protected]
28,South Usman Road,, TNagar, Chennai-17. Ph : 044-43855940 Mobile : +91-9042085008 Web : www.temasolution.com email : [email protected]
WEB MINING
108. Web 2.0 content extraction JD108 2012
109. Automated Security Test Generation with Formal Threat Models JD109 2012
110. Improving the Automation of Security Information Management: A
Collaborative Approach
JD110 2012
111. Optimal Aviation Security Screening Strategies With Dynamic Passenger
Risk Updates
JD111 2012
TOPOLOGY
112. Routing characterization in volatile connectivity environments JD112 2012
113. A Distributed Reliable and Energy-Efficient Topology Control Algorithm in
Wireless Sensor Network
JD113 2012
114. A method of tree network topology inference based on hierarchical host table JD114 2012
115. Topology management for mission critical networks: Applying supply and
demand to manage public safety networks
JD115 2012
116. SNMP-based network topology discovery algorithm and implementation JD116 2012
117. Overlaid Mesh Topology Design and Deadlock Free Routing in Wireless
Network-on-Chip
JD117 2012
118. Topology Enhancements in Wireless Multihop Networks: A Top-Down
Approach
JD118 2012
119. A dynamic detective method against ROP attack on ARM platform JD119 2012
120. Countering entropy measure attacks on packed software detection
JD120 2012
121. Performance Modeling and Analysis of Network Firewalls JD121 2012
122. Research on Malicious Code Detection Based on Least-squares Estimation JD122 2012
123. Stochastic analysis of horizontal IP scanning
JD123 2012