Download

Download

Featured Posts

Latest DOTNET | JAVA Final year Project Titles 2012 -2013 | Download

12:02 PM - By Admin 0




LATEST 
FINAL YEAR PROJECT TOPICS  DOTNET | JAVA  Project Titles 2012 - 2013 | Download here
IEEE 2012 2013 JAVA Project Titles

1.   Online Intrusion Alert Aggregation with Generative Data Stream Modeling.

2.   Embedded Extended Visual Cryptography Schemes. (Domain: Secure Computing + Image Processing)

3.   Architecting a Secure Enterprise Data Sharing. (Domain : Secure Computing)

4.   A Hierarchical Hybrid Structure for Botnet Control and Command. (Domain: Secure Computing)

5.   ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING. (Domain: Secure Computing + Image Processing)

6.   Competitive Study of Cryptography Techniques over Block Cipher. (Domain: Secure Computing)

7.   Analysis on Credit Card Fraud Detection Methods. (Domain: Secure Computing)

8.   Seeking Quality of Web Service Composition in a Semantic Dimension. (Domain: Web Service)

9.   QoS-Aware Web Service Recommendation by Collaborative Filtering. (Domain: Web Service)

10. Interval ckMeans An Algorithm for Clustering Symbolic Data. (Domain: Knowledge and Data Engineering)

11.    Clustering with Multi-Viewpoint based Similarity Measure. (Domain: Knowledge and Data Engineering)

12. On Demand Check Pointing for Grid Application Reliability using Communicating Process Model. (Domain: Networking)

13. Sketch4Match – Content-based Image Retrieval System Using Sketches. (Domain: Image processing & Knowledge and Data Engineering)
14. Subspace-Based Striping Noise Reduction in Hyperspectral Images. (Domain: Image processing).

15. Ontology Based Business Process Customization for Composite Web Services. (Domain: Web Service)

16. Design of p-Cycles for Full Node Protection in WDM Mesh Networks. (Domain: Networking)

17. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
18. Intrusion detection An Energy efficient approach. (Domain: Secure Computing).

19. Dynamic Channel Allocation for wireless zone-based Multicast and Broadcast Service. (Domain: Networking)

20.  A foundation for stochastic bandwidth estimation of networks with random service. (Domain: Networking)

21.  Analysis of quality of object oriented systems using object oriented metrics. (Domain: Software Engineering)

22. A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems. (Domain: Networking)

23. Simplified algorithm on network shortest path problem. (Domain: Networking)

24. Voronoi-based continuous query processing for mobile users. (Domain: Networking).

25.  Geographical Routing With Location Service in Intermittently Connected MANETs

26.  Resource management using dynamical load prediction and multiprocessor cooperation

27.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes (Domain: Secure Computing & Image Processing).

28.  Multiple exposure fusion for high dynamic range image acquisition. (Domain: Image Processing).

29.  On the Information Flow Required for Tracking Control in Networks of Mobile Sensing Agents.

30.  Mobile Sampling of Sensor Field  Data Using Controlled Broadcast



31. Denial of Service Attacks in Wireless Networks:  The Case of Jammers

32.  Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks

33. Secure Communications Over Wireless Broadcast Networks: Stability and Utility Maximization

34.   A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows

35.  Load Shedding in Mobile Systems with MobiQual

36.   Optimal Bandwidth Assignment for Multiple-Description-Coded Video

37. Caching Strategies Based on Information Density. (Domain: Networking).

38. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing (Domain: Cloud Computing)

39.  Effective Navigation of Query Results Based on Concept Hierarchies. (Domain: Knowledge & Data Engineering).

40. Nymble- Blocking Misbehaving Users in Anonymizing Networks. (Domain: Secure Computing).

41.  Modeling and Detection of Camouflaging Worm. (Domain: Secure Computing).

42. Buffer Sizing for 802.11 Based Networks

43.  SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks

44.  Discovering Conditional Functional Dependencies

45.  Ranking Spatial Data by Quality Preferences

46. Extended XML Tree Pattern Matching: Theories and Algorithms

47.  Cloud Computing for Agent-Based Urban Transportation Systems

48. Secure and Practical Outsourcing of Linear Programming in Cloud Computing

49. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

50. ProgME: Towards Programmable Network Measurement

51. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks

IEEE 2012 -2013/14 DOTNET Project Titles

52. A More Secure Steganography Method in Spatial Domain. (Domain: Image Processing & Secure Computing)

53. Problems and Solutions of Web Search Engines. (Domain: Knowledge & Data Engineering)

54. Studies and Evaluation on Meta Search Engines.(Domain: Knowledge & Data Engineering)

55. A Web Search Engine-Based Approach to Measure Semantic Similarity between Words.(Domain: Knowledge & Data Engineering)

56. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm. (Domain: Image Processing)

57. Automated Blocking of Malicious Code with NDIS Intermediate Driver. (Domain: Secure Computing)

58. NABS Novel Approaches for Biometric Systems. (Domain: Secure Computing & Image Processing)

59. Analysis on Credit Card Fraud Detection Methods. (Domain: Secure Computing)

60. Digital Image hiding using curvelet transforms. (Domain: Secure Computing & Image Processing)

61.  Proportionally Fair Rate Allocation in Regular Wireless Sensor Networks. (Domain: Networking)

62. On the Fairness of Frequency Domain Resource Allocation in WMN. (Domain: Networking)

63.  Multiple exposure fusion for high dynamic range image acquisition. (Domain: Image Processing).

64.  Architecting a Secure Enterprise Data Sharing. (Domain: Networking & Secure Computing)

65.  Blind Image Watermarking Using a Sample Projection Approach. (Domain: Image Processing).

66.  Efficient Multi-dimensional Fuzzy Search for Personal Informatio. (Domain: Knowledge & Data Engineering)

67. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models

68. A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks

69.  A Multilevel Hierarchical Image Segmentation Method for Urban Impervious Surface Mapping Using Very High Resolution Imagery

70. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts

71.  Fuzzy-Zoning-Based Classification for Handwritten Characters

72.  Adaptive Spectral Transform for Wavelet-Based Color Image Compression

73. Facial Expression Recognition Using Facial  Movement Features

74.  A New Color Filter Array With Optimal Properties  for Noiseless and Noisy Color Image Acquisition

75.  Histogram Specification: A fast and flexible Method to process digital images

76. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks

77. DATA LEAGAGE DETECTION

78.  Data integrity proofs in cloud storage

79. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data

80.   Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud

81. Optimal service pricing for a cloud cache

82. Personalized Ontology Model for Web Information Gathering

83.  Efficient Computation of Range Aggregates against uncertain location based queries

84.  Scalable Learning of Collective Behavior

85. The World in a Nutshell Concise Range Queries


86. The Awareness Network, To Whom Should I Display My Actions And, Whose Actions

87. Publishing Search Logs – A Comparative Study of Privacy Guarantees

88.  One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases

89.  Monitoring Service Systems from a Language-Action Perspective

90.  Adaptive Provisioning of Human Expertise in Service-oriented Systems

91. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

92. Exploring Application-Level Semantics for Data Compression

93.  Bridging Socially-Enhanced Virtual Communities

94. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis

95. Vulnerability Analysis in SOA-based Business Processes

96. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.

97. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection

98.  Continuous Neighbor Discovery in Asynchronous Sensor Networks

99. The Geometric Efficient Matching Algorithm for Firewalls


100. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems

101.  Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks

102. Integration of Sound Signature in Graphical Password Authentication System

103.  Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks




About the Author

Onlineinfocity Team Follow me onlineinfocity
View all posts by admin →

Get Updates

Subscribe to our e-mail newsletter to receive updates.

Share This Post

0 comments:

Labels

AI PROJECTS (8) ALL DEPT (42) BCA (22) BE (13) BSC (20) BTECH (17) C PROJECTS (4) C#.NET (19) C++ PROJECTS (2) CHEMISTRY (3) CIVIL (25) CSE (94) DIPLOMA (22) DOWNLOADS (60) ECE (37) EEE (39) FINAL YEAR PROJECTS (30) HOW TO (58) HTML PROJECTS (4) IEEE PROJECTS (108) IT (85) MATLAB PROJECTS (8) MBA (1) mca (73) ME (19) mech (4) MINI PROJECTS (97) MSC (17) MTECH (18) MYSQL PROJECTS (6) NETWORK PROJECTS (7) OTHER PROJECTS (67) OTHERS (28) PAPER PRESENTATION (4) PG (18) PHP PROJECTS (7) PROJECTS (5) SOURCE CODES (22) SYSTEM PROJECTS (15) UG (17) VB PROJECTS (15) WHITE PAPER (19)

Blog Archive

Total Pageviews

Discussion

Followers

Powered by Blogger.
back to top
Don't Forget To Join US Our Community
×