LATEST FINAL YEAR PROJECT TOPICS DOTNET | JAVA Project Titles 2012 - 2013 | Download here
IEEE 2012 2013 JAVA Project Titles
1. Online Intrusion Alert Aggregation with Generative
Data Stream Modeling.
2. Embedded Extended Visual Cryptography Schemes.
(Domain: Secure Computing + Image Processing)
3. Architecting a Secure Enterprise Data Sharing. (Domain
: Secure Computing)
4. A Hierarchical Hybrid Structure for Botnet Control and
Command. (Domain: Secure Computing)
5. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA
HIDING AND SELECTIVE EMBEDDING. (Domain: Secure Computing + Image Processing)
6. Competitive Study of Cryptography Techniques over
Block Cipher. (Domain: Secure Computing)
7. Analysis on Credit Card Fraud Detection Methods.
(Domain: Secure Computing)
8. Seeking Quality of Web Service Composition in a
Semantic Dimension. (Domain: Web Service)
9. QoS-Aware Web Service Recommendation by Collaborative
Filtering. (Domain: Web Service)
10. Interval ckMeans An Algorithm for Clustering Symbolic Data.
(Domain: Knowledge and Data Engineering)
11. Clustering with Multi-Viewpoint based
Similarity Measure. (Domain: Knowledge and Data Engineering)
12. On Demand Check Pointing for Grid Application Reliability
using Communicating Process Model. (Domain: Networking)
13. Sketch4Match – Content-based Image Retrieval System Using
Sketches. (Domain: Image processing & Knowledge and Data Engineering)
14. Subspace-Based Striping Noise Reduction in Hyperspectral
Images. (Domain: Image processing).
15. Ontology Based Business Process Customization for Composite
Web Services. (Domain: Web Service)
16. Design of p-Cycles for Full Node Protection in WDM Mesh
Networks. (Domain: Networking)
17. Dynamics of Malware Spread in Decentralized Peer-to-Peer
Networks
18. Intrusion detection An Energy efficient approach. (Domain:
Secure Computing).
19. Dynamic Channel Allocation for wireless zone-based Multicast
and Broadcast Service. (Domain: Networking)
20. A foundation for stochastic bandwidth estimation of
networks with random service. (Domain: Networking)
21. Analysis of quality of object oriented systems using
object oriented metrics. (Domain: Software Engineering)
22. A new approach for FEC decoding based on the BP algorithm in
LTE and Wi-MAX systems. (Domain: Networking)
23. Simplified algorithm on network shortest path problem.
(Domain: Networking)
24. Voronoi-based continuous query processing for mobile users.
(Domain: Networking).
25. Geographical Routing With Location Service in
Intermittently Connected MANETs
26. Resource management using dynamical load prediction
and multiprocessor cooperation
27. Minimizing Additive Distortion in Steganography Using
Syndrome-Trellis Codes (Domain: Secure Computing & Image Processing).
28. Multiple exposure fusion for high dynamic range image
acquisition. (Domain: Image Processing).
29. On the Information Flow Required for Tracking Control
in Networks of Mobile Sensing Agents.
30. Mobile Sampling of Sensor Field Data Using
Controlled Broadcast
31. Denial of Service Attacks in Wireless Networks: The Case of Jammers
32. Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks
33. Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization
34. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
35. Load Shedding in Mobile Systems with MobiQual
36. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
37. Caching Strategies Based on Information Density. (Domain: Networking).
38. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (Domain: Cloud Computing)
39. Effective Navigation of Query Results Based on Concept Hierarchies. (Domain: Knowledge & Data Engineering).
40. Nymble- Blocking Misbehaving Users in Anonymizing Networks. (Domain: Secure Computing).
41. Modeling and Detection of Camouflaging Worm. (Domain: Secure Computing).
42. Buffer Sizing for 802.11 Based Networks
43. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
44. Discovering Conditional Functional Dependencies
45. Ranking Spatial Data by Quality Preferences
46. Extended XML Tree Pattern Matching: Theories and Algorithms
47. Cloud Computing for Agent-Based Urban Transportation Systems
48. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
49. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
50. ProgME: Towards Programmable Network Measurement
51. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
IEEE 2012 -2013/14 DOTNET Project Titles
52. A More Secure Steganography Method in Spatial Domain.
(Domain: Image Processing & Secure Computing)
53. Problems and Solutions of Web Search Engines. (Domain:
Knowledge & Data Engineering)
54. Studies and Evaluation on Meta Search Engines.(Domain:
Knowledge & Data Engineering)
55. A Web Search Engine-Based Approach to Measure Semantic
Similarity between Words.(Domain: Knowledge & Data Engineering)
56. A User-Oriented Image Retrieval System Based on Interactive
Genetic Algorithm. (Domain: Image Processing)
57. Automated Blocking of Malicious Code with NDIS Intermediate
Driver. (Domain: Secure Computing)
58. NABS Novel Approaches for Biometric Systems. (Domain: Secure
Computing & Image Processing)
59. Analysis on Credit Card Fraud Detection Methods. (Domain:
Secure Computing)
60. Digital Image hiding using curvelet transforms. (Domain:
Secure Computing & Image Processing)
61. Proportionally Fair Rate Allocation in Regular
Wireless Sensor Networks. (Domain: Networking)
62. On the Fairness of Frequency Domain Resource Allocation in
WMN. (Domain: Networking)
63. Multiple exposure fusion for high dynamic range image
acquisition. (Domain: Image Processing).
64. Architecting a Secure Enterprise Data Sharing.
(Domain: Networking & Secure Computing)
65. Blind Image Watermarking Using a Sample Projection
Approach. (Domain: Image Processing).
66. Efficient Multi-dimensional Fuzzy Search for Personal
Informatio. (Domain: Knowledge & Data Engineering)
67. Improving Offline Handwritten Text Recognition with Hybrid
HMM/ANN Models
68. A Distributed and Scalable Time Slot Allocation Protocol for
Wireless Sensor Networks
69. A Multilevel Hierarchical Image Segmentation Method
for Urban Impervious Surface Mapping Using Very High Resolution Imagery
70. Human Motion Tracking by Temporal-Spatial Local Gaussian Process
Experts
71. Fuzzy-Zoning-Based Classification for Handwritten
Characters
72. Adaptive Spectral Transform for Wavelet-Based Color
Image Compression
73. Facial Expression Recognition Using Facial Movement
Features
74. A New Color Filter Array With Optimal Properties
for Noiseless and Noisy Color Image Acquisition
75. Histogram Specification: A fast and flexible Method to
process digital images
76. On Combining Shortest-Path and Back-Pressure Routing Over
Multi-hop Wireless Networks
77. DATA LEAGAGE DETECTION
78. Data integrity proofs in cloud storage
79. Privacy-Preserving Multi-keyword Ranked Search over
Encrypted Cloud Data
80. Exploiting Dynamic Resource Allocation for Efficient
Parallel Data Processing in the Cloud
81. Optimal service pricing for a cloud cache
82. Personalized Ontology Model for Web Information Gathering
83. Efficient Computation of Range Aggregates against uncertain
location based queries
84. Scalable Learning of Collective Behavior
85. The World in a Nutshell Concise Range Queries
86. The Awareness Network, To Whom Should I Display My Actions
And, Whose Actions
87. Publishing Search Logs – A Comparative Study of Privacy
Guarantees
88. One Size Does Not Fit All Towards User- and
Query-Dependent Ranking For Web Databases
89. Monitoring Service Systems from a Language-Action
Perspective
90. Adaptive Provisioning of Human Expertise in
Service-oriented Systems
91. Improving Aggregate Recommendation Diversity Using
Ranking-Based Techniques
92. Exploring Application-Level Semantics for Data Compression
93. Bridging Socially-Enhanced Virtual Communities
94. Horizontal Aggregations in SQL to prepare Data Sets for Data
Mining Analysis
95. Vulnerability Analysis in SOA-based Business Processes
96. Robust Correlation of Encrypted Attack Traffic through
Stepping Stones by Flow Watermarking.
97. Jamming-Aware Traffic Allocation for Multiple-Path Routing
Using Portfolio Selection
98. Continuous Neighbor Discovery in Asynchronous Sensor
Networks
99. The Geometric Efficient Matching Algorithm for Firewalls
100. Distributed Adaptation of Quantized Feedback for Downlink
Network MIMO Systems
101. Adaptive Fault Tolerant QoS Control Algorithms for
Maximizing System Lifetime of Query-Based Wireless Sensor Networks
102. Integration of Sound Signature in Graphical Password
Authentication System
103. Network Coding Based Privacy Preservation against
Traffic Analysis in Multi-Hop Wireless Networks
0 comments: