SlideShare une entreprise Scribd logo
1  sur  6
IEEE 2012 PROJECTS Call:+919966062808
S.NO.                         Project Title                          DOMINE          TECH

                                                                     Parallel &
        A Network Coding Equivalent Content Distribution Scheme
                                                                    Distributed      JAVA
1       For Efficient Peer To Peer Interactive Vod Streaming
                                                                      Systems
                                                                     Parallel &
        An Optimizing Overlay Topologies For Search In
                                                                    Distributed      JAVA
2       Unstructed Peer To Peer Networks
                                                                      Systems
        Automatic Discovery of Association Orders between Name
                                                                   Knowledge &
        and Aliases from the Web using Anchor Texts-based Co-                        JAVA
3
        occurrences                                               Data Engineering

        Cloud Data Production for Masses                          Cloud Computing    JAVA
4
        Clustering With Multi View Point – Based Similarity        Knowledge &
                                                                                     JAVA
5       Measure                                                   Data Engineering
                                                                     Parallel &
        Cooperative Provable Data Possession for Integrity
                                                                    Distributed      JAVA
6       Verification in Multi-Cloud Storage
                                                                      Systems
                                                                     Parallel &
        Distributed Packet Buffers For High Band Width Switches
                                                                    Distributed      JAVA
7       & Routers
                                                                      Systems
                                                                   Knowledge &
        Efficient Fuzzy Type – A Head Search In Xml Data                             JAVA
8
                                                                  Data Engineering
        Fast Data Collection in Tree-Based Wireless Sensor            Mobile
                                                                                     JAVA
9       Networks.                                                   Computing
                                                                     Parallel &
        Foot Print Detecting Sybil Attacks In Urban Vehicular
                                                                    Distributed      JAVA
10      Networks
                                                                      Systems
        Game-Theoretic Pricing for Video Streaming in Mobile          Mobile
                                                                                     JAVA
11      Networks
                                                                    Computing

        Hand Written Chinese Text Recognition By Integrating      Pattern Analysis   JAVA
12
Multiple Contexts                                                & Machine
                                                                     Intelligence
     In Tags We Trust: Trust modeling in social tagging of
                                                                   Signal Processing   JAVA
13   multimedia content

     Learn to Personalized Image Search from the Photo
                                                                     Multimedia        JAVA
14   Sharing Websites

     MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL    Knowledge &
                                                                                       JAVA
15   AND MECHANISMS
                                                                   Data Engineering
     Online Modeling of Proactive Moderation System for                 Secure
                                                                                       JAVA
16   Auction Fraud Detection                                          Computing
                                                                    Knowledge &
     Organizing User Search Histories                                                  JAVA
17
                                                                   Data Engineering
     Packet Loss Control Using Tokens at the Network Edge            Networking        JAVA
18
     Packet-Hiding Methods for Preventing Selective Jamming             Secure
                                                                                       JAVA
19   Attacks                                                          Computing
                                                                    Knowledge &
     Ranking Model Adaptation for Domain-Specific Search                               JAVA
20
                                                                   Data Engineering
                                                                        Secure
     Risk-Aware Mitigation for MANET Routing Attacks                                   JAVA
21
                                                                      Computing
     Self Adaptive Contention Aware Routing Protocol For                Mobile
                                                                                       JAVA
22   Intermittently Connected Mobile Networks                         Computing
     Slicing: A New Approach to Privacy Preserving Data             Knowledge &
                                                                                       JAVA
23   Publishing                                                    Data Engineering
     Ensuring Distributed Accountability For Data Sharing In            Secure
                                                                                       JAVA
24   The Cloud.                                                       Computing
     Adaptive Opportunistic Routing for Wireless Ad Hoc
                                                                     Networking        JAVA
25   Networks

     Vehicle Detection in Aerial Surveillance Using Dynamic
                                                                     Networking        JAVA
26   Bayesian Networks

     Catching Packet Droppers and Modifiers in Wireless               Parallel &
                                                                                       JAVA
27   Sensor Networks
                                                                      Distributed
Systems
     Energy-Efficient Cooperative Distribution with Statistical
                                                                    Networking       JAVA
28   QoS Provisions Video Over Wireless Networks

                                                                     Parallel &
     CCD A Distributed Publish Subscribe Framework for Rich
                                                                    Distributed      JAVA
29   Content Format
                                                                      Systems
                                                                   Knowledge &
     Clustering with Multi viewpoint-Based Similarity Measure                        JAVA
30
                                                                  Data Engineering
                                                                     Parallel &
     A Network Coding Equivalent Content Distribution Scheme
                                                                    Distributed      JAVA
31   for Efficient
                                                                      Systems
                                                                     Parallel &
     An Efficient Caching Scheme and Consistency
                                                                    Distributed      JAVA
32   Maintenance in Hybrid P2P System
                                                                      Systems
                                                                     Parallel &
                                                                    Distributed      JAVA
33   Cut detection in wireless sensor networks
                                                                      Systems
                                                                      Service
     Confucius: A Tool Supporting Collaborative Scientific                           JAVA
34   Workflow Composition                                           Computing
DOTNET2012

S.No.                        Project Title                           DOMINE         TECH

 1      A New Cell Counting Based Attack Against Tor.              Networking       .NET

 2      AMPLE: An Adaptive Traffic Engineering System Based on       Wireless
                                                                                    .NET
        Virtual Routing Topologies.                              Communications

 3      Compressed-Sensing-Enabled Video Streaming for
                                                                 Image Processing   .NET
        Wireless Multimedia Sensor Networks.

 4      Defenses Against Large Scale Online Password Guessing
                                                                 Image processing   .NET
        Attacks by using Persuasive click Points.

 5      Design and Implementation of TARF: A Trust-Aware
                                                                 Secure Computing   .NET
        Routing Framework for WSNs.

 6      Query Planning for Continuous Aggregation Queries          Data Mining      .NET

 7      Optimal Power Allocation in Multi-Relay MIMO
                                                                   Networking       .NET
        Cooperative Networks: Theory and Algorithms.

 8      Robust Face-Name Graph Matching for Movie Character
                                                                 Image Processing   .NET
        Identify.

 9      Scalable and Secure Sharing of Personal Health Records
                                                                 Cloud computing    .NET
        in Cloud Computing using Attribute-based Encryption

 10     Securing Node Capture Attacks for Hierarchical Data        International
                                                                                    .NET
        Aggregation in Wireless Sensor Networks                     Conference

 11     Semi supervised Biased Maximum Margin Analysis for
                                                                 Image processing   .NET
        Interactive Image Retrieval

 12     SPOC: A Secure and Privacy-preserving Opportunistic
                                                                    Parallel &
        Computing Framework for Mobile-Healthcare Emergency         Distributed     .NET
                                                                     Systems

 13     Topology control in mobile ad hoc networks with              Mobile         .NET
cooperative communications                                        Computing

14   Secure And Efficient Handover Authentication Based On
                                                                    Secure Computing   .NET
     Bilinear Pairing Functions

15   Grouping-Enhanced Resilient Probabilistic En-Route Filtering       Parallel &
     of Injected False Data in WSNs                                    Distributed     .NET
                                                                         Systems

16   Latency Equalization as a New Network Service Primitive           Networking      .NET

17   Efficient audit service outsourcing for data integrity in         Systems &
                                                                                       .NET
     clouds                                                             Software

18   Fair Torrent A Deficit – Based Distributed Algorithm to
                                                                       Networking      .NET
     Ensure Fairness in peer to peer Systems

     Network Assisted Mobile Computing with                              Mobile
19
                                                                                       .NET
     Optimal Uplink Query Processing                                   Computing
     BECAN: A Bandwidth-Efficient Cooperative                           Parallel &
20
     Authentication Scheme for Filtering Injected False Data in
     Wireless Sensor Networks                                       Distributed        .NET
                                                                    Systems
     Towards Secure and Dependable Storage Services in Cloud
21                                                                  Cloud Computing
     Computing
     Joint Relay and Jammer Selection for Secure Two-Way Relay      Information
22
     Networks
                                                                    Forensics&
                                                                    Security
     Automatic Reconfiguration for Large-Scale Reliable Storage
23                                                                  Secure Computing
     Systems
     Expert Discovery and Interactions in Mixed Service-Oriented    Service
24
     Systems
                                                                    Computing
Cse,it ieee 2012 projects

Contenu connexe

En vedette

Self-Organising News Management: The Molecules of Knowledge Approach
Self-Organising News Management: The Molecules of Knowledge ApproachSelf-Organising News Management: The Molecules of Knowledge Approach
Self-Organising News Management: The Molecules of Knowledge ApproachAndrea Omicini
 
Andrew evaluation
Andrew  evaluationAndrew  evaluation
Andrew evaluationandzzo
 
Andrew research, planning & construction
Andrew  research, planning & constructionAndrew  research, planning & construction
Andrew research, planning & constructionandzzo
 
Otkriveno teslino tajno oružje
Otkriveno teslino tajno oružjeOtkriveno teslino tajno oružje
Otkriveno teslino tajno oružjenemauser
 
Labelled Variables in Logic Programming: A First Prototipe in tuProlog
Labelled Variables in Logic Programming: A First Prototipe in tuPrologLabelled Variables in Logic Programming: A First Prototipe in tuProlog
Labelled Variables in Logic Programming: A First Prototipe in tuPrologRoberta Calegari
 
Coordination Models and Technologies toward Self-Organising Systems
Coordination Models and Technologies toward Self-Organising SystemsCoordination Models and Technologies toward Self-Organising Systems
Coordination Models and Technologies toward Self-Organising SystemsAndrea Omicini
 
The Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
The Autonomy of Automated Systems: Social Systems and the Multi-level AutonomyThe Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
The Autonomy of Automated Systems: Social Systems and the Multi-level AutonomyAndrea Omicini
 
Coordination in Situated Systems: Engineering MAS Environment in TuCSoN
Coordination in Situated Systems: Engineering MAS Environment in TuCSoNCoordination in Situated Systems: Engineering MAS Environment in TuCSoN
Coordination in Situated Systems: Engineering MAS Environment in TuCSoNAndrea Omicini
 

En vedette (9)

Ieee 2012 projects
Ieee 2012 projectsIeee 2012 projects
Ieee 2012 projects
 
Self-Organising News Management: The Molecules of Knowledge Approach
Self-Organising News Management: The Molecules of Knowledge ApproachSelf-Organising News Management: The Molecules of Knowledge Approach
Self-Organising News Management: The Molecules of Knowledge Approach
 
Andrew evaluation
Andrew  evaluationAndrew  evaluation
Andrew evaluation
 
Andrew research, planning & construction
Andrew  research, planning & constructionAndrew  research, planning & construction
Andrew research, planning & construction
 
Otkriveno teslino tajno oružje
Otkriveno teslino tajno oružjeOtkriveno teslino tajno oružje
Otkriveno teslino tajno oružje
 
Labelled Variables in Logic Programming: A First Prototipe in tuProlog
Labelled Variables in Logic Programming: A First Prototipe in tuPrologLabelled Variables in Logic Programming: A First Prototipe in tuProlog
Labelled Variables in Logic Programming: A First Prototipe in tuProlog
 
Coordination Models and Technologies toward Self-Organising Systems
Coordination Models and Technologies toward Self-Organising SystemsCoordination Models and Technologies toward Self-Organising Systems
Coordination Models and Technologies toward Self-Organising Systems
 
The Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
The Autonomy of Automated Systems: Social Systems and the Multi-level AutonomyThe Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
The Autonomy of Automated Systems: Social Systems and the Multi-level Autonomy
 
Coordination in Situated Systems: Engineering MAS Environment in TuCSoN
Coordination in Situated Systems: Engineering MAS Environment in TuCSoNCoordination in Situated Systems: Engineering MAS Environment in TuCSoN
Coordination in Situated Systems: Engineering MAS Environment in TuCSoN
 

Similaire à Cse,it ieee 2012 projects

Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titlesingenioustech
 
Java ieee 2015 16 projects from do8.in
Java ieee 2015 16 projects from do8.inJava ieee 2015 16 projects from do8.in
Java ieee 2015 16 projects from do8.inSuresh Gutur
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesSrinivasan Natarajan
 
Java ieee 2015_project_list
Java ieee 2015_project_listJava ieee 2015_project_list
Java ieee 2015_project_listNagaraj Naidu
 
OpenStack Quantum Network Service
OpenStack Quantum Network ServiceOpenStack Quantum Network Service
OpenStack Quantum Network ServiceLew Tucker
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011IndicThreads
 
Cloudfoundry architecture
Cloudfoundry architectureCloudfoundry architecture
Cloudfoundry architectureRamnivas Laddad
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...Fred Beringer
 
Windows Phone 7.5 와 Windows 8 메트로 스타일 앱 개발
Windows Phone 7.5  와 Windows 8 메트로 스타일 앱 개발Windows Phone 7.5  와 Windows 8 메트로 스타일 앱 개발
Windows Phone 7.5 와 Windows 8 메트로 스타일 앱 개발Seo Jinho
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Juniper Networks
 
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)mosaicnet
 
Malware Analysis and Prediction System
Malware Analysis and Prediction SystemMalware Analysis and Prediction System
Malware Analysis and Prediction SystemAzri Hafiz
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vidsantosomar
 
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...Pantech ProEd Pvt Ltd
 
Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa Data
 

Similaire à Cse,it ieee 2012 projects (20)

IEEE Projects 2012
IEEE Projects 2012IEEE Projects 2012
IEEE Projects 2012
 
Java & dotnet titles
Java & dotnet titlesJava & dotnet titles
Java & dotnet titles
 
Java ieee 2015 16 projects from do8.in
Java ieee 2015 16 projects from do8.inJava ieee 2015 16 projects from do8.in
Java ieee 2015 16 projects from do8.in
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titles
 
5. _java_2012-13_titles
5.  _java_2012-13_titles5.  _java_2012-13_titles
5. _java_2012-13_titles
 
Java ieee 2015_project_list
Java ieee 2015_project_listJava ieee 2015_project_list
Java ieee 2015_project_list
 
Project list
Project listProject list
Project list
 
OpenStack Quantum Network Service
OpenStack Quantum Network ServiceOpenStack Quantum Network Service
OpenStack Quantum Network Service
 
Inaugural address manjusha - Indicthreads cloud computing conference 2011
Inaugural address manjusha -  Indicthreads cloud computing conference 2011Inaugural address manjusha -  Indicthreads cloud computing conference 2011
Inaugural address manjusha - Indicthreads cloud computing conference 2011
 
Project by Koushik
Project by KoushikProject by Koushik
Project by Koushik
 
Cloudfoundry architecture
Cloudfoundry architectureCloudfoundry architecture
Cloudfoundry architecture
 
The Cloud: A game changer to test, at scale and in production, SOA based web...
The Cloud: A game changer to test, at scale and in production,  SOA based web...The Cloud: A game changer to test, at scale and in production,  SOA based web...
The Cloud: A game changer to test, at scale and in production, SOA based web...
 
Windows Phone 7.5 와 Windows 8 메트로 스타일 앱 개발
Windows Phone 7.5  와 Windows 8 메트로 스타일 앱 개발Windows Phone 7.5  와 Windows 8 메트로 스타일 앱 개발
Windows Phone 7.5 와 Windows 8 메트로 스타일 앱 개발
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)
 
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
실전 윈도우폰 망고 앱 디자인 & 개발 III(최종)
 
Malware Analysis and Prediction System
Malware Analysis and Prediction SystemMalware Analysis and Prediction System
Malware Analysis and Prediction System
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vid
 
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...IEEE 2011 - 12  java-j2 ee-j2me-cloud-computing-networking-network-security-c...
IEEE 2011 - 12 java-j2 ee-j2me-cloud-computing-networking-network-security-c...
 
Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013Kappa data corporate preso v2 luxembourg 2013
Kappa data corporate preso v2 luxembourg 2013
 

Dernier

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 

Dernier (20)

Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 

Cse,it ieee 2012 projects

  • 1. IEEE 2012 PROJECTS Call:+919966062808 S.NO. Project Title DOMINE TECH Parallel & A Network Coding Equivalent Content Distribution Scheme Distributed JAVA 1 For Efficient Peer To Peer Interactive Vod Streaming Systems Parallel & An Optimizing Overlay Topologies For Search In Distributed JAVA 2 Unstructed Peer To Peer Networks Systems Automatic Discovery of Association Orders between Name Knowledge & and Aliases from the Web using Anchor Texts-based Co- JAVA 3 occurrences Data Engineering Cloud Data Production for Masses Cloud Computing JAVA 4 Clustering With Multi View Point – Based Similarity Knowledge & JAVA 5 Measure Data Engineering Parallel & Cooperative Provable Data Possession for Integrity Distributed JAVA 6 Verification in Multi-Cloud Storage Systems Parallel & Distributed Packet Buffers For High Band Width Switches Distributed JAVA 7 & Routers Systems Knowledge & Efficient Fuzzy Type – A Head Search In Xml Data JAVA 8 Data Engineering Fast Data Collection in Tree-Based Wireless Sensor Mobile JAVA 9 Networks. Computing Parallel & Foot Print Detecting Sybil Attacks In Urban Vehicular Distributed JAVA 10 Networks Systems Game-Theoretic Pricing for Video Streaming in Mobile Mobile JAVA 11 Networks Computing Hand Written Chinese Text Recognition By Integrating Pattern Analysis JAVA 12
  • 2. Multiple Contexts & Machine Intelligence In Tags We Trust: Trust modeling in social tagging of Signal Processing JAVA 13 multimedia content Learn to Personalized Image Search from the Photo Multimedia JAVA 14 Sharing Websites MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL Knowledge & JAVA 15 AND MECHANISMS Data Engineering Online Modeling of Proactive Moderation System for Secure JAVA 16 Auction Fraud Detection Computing Knowledge & Organizing User Search Histories JAVA 17 Data Engineering Packet Loss Control Using Tokens at the Network Edge Networking JAVA 18 Packet-Hiding Methods for Preventing Selective Jamming Secure JAVA 19 Attacks Computing Knowledge & Ranking Model Adaptation for Domain-Specific Search JAVA 20 Data Engineering Secure Risk-Aware Mitigation for MANET Routing Attacks JAVA 21 Computing Self Adaptive Contention Aware Routing Protocol For Mobile JAVA 22 Intermittently Connected Mobile Networks Computing Slicing: A New Approach to Privacy Preserving Data Knowledge & JAVA 23 Publishing Data Engineering Ensuring Distributed Accountability For Data Sharing In Secure JAVA 24 The Cloud. Computing Adaptive Opportunistic Routing for Wireless Ad Hoc Networking JAVA 25 Networks Vehicle Detection in Aerial Surveillance Using Dynamic Networking JAVA 26 Bayesian Networks Catching Packet Droppers and Modifiers in Wireless Parallel & JAVA 27 Sensor Networks Distributed
  • 3. Systems Energy-Efficient Cooperative Distribution with Statistical Networking JAVA 28 QoS Provisions Video Over Wireless Networks Parallel & CCD A Distributed Publish Subscribe Framework for Rich Distributed JAVA 29 Content Format Systems Knowledge & Clustering with Multi viewpoint-Based Similarity Measure JAVA 30 Data Engineering Parallel & A Network Coding Equivalent Content Distribution Scheme Distributed JAVA 31 for Efficient Systems Parallel & An Efficient Caching Scheme and Consistency Distributed JAVA 32 Maintenance in Hybrid P2P System Systems Parallel & Distributed JAVA 33 Cut detection in wireless sensor networks Systems Service Confucius: A Tool Supporting Collaborative Scientific JAVA 34 Workflow Composition Computing
  • 4. DOTNET2012 S.No. Project Title DOMINE TECH 1 A New Cell Counting Based Attack Against Tor. Networking .NET 2 AMPLE: An Adaptive Traffic Engineering System Based on Wireless .NET Virtual Routing Topologies. Communications 3 Compressed-Sensing-Enabled Video Streaming for Image Processing .NET Wireless Multimedia Sensor Networks. 4 Defenses Against Large Scale Online Password Guessing Image processing .NET Attacks by using Persuasive click Points. 5 Design and Implementation of TARF: A Trust-Aware Secure Computing .NET Routing Framework for WSNs. 6 Query Planning for Continuous Aggregation Queries Data Mining .NET 7 Optimal Power Allocation in Multi-Relay MIMO Networking .NET Cooperative Networks: Theory and Algorithms. 8 Robust Face-Name Graph Matching for Movie Character Image Processing .NET Identify. 9 Scalable and Secure Sharing of Personal Health Records Cloud computing .NET in Cloud Computing using Attribute-based Encryption 10 Securing Node Capture Attacks for Hierarchical Data International .NET Aggregation in Wireless Sensor Networks Conference 11 Semi supervised Biased Maximum Margin Analysis for Image processing .NET Interactive Image Retrieval 12 SPOC: A Secure and Privacy-preserving Opportunistic Parallel & Computing Framework for Mobile-Healthcare Emergency Distributed .NET Systems 13 Topology control in mobile ad hoc networks with Mobile .NET
  • 5. cooperative communications Computing 14 Secure And Efficient Handover Authentication Based On Secure Computing .NET Bilinear Pairing Functions 15 Grouping-Enhanced Resilient Probabilistic En-Route Filtering Parallel & of Injected False Data in WSNs Distributed .NET Systems 16 Latency Equalization as a New Network Service Primitive Networking .NET 17 Efficient audit service outsourcing for data integrity in Systems & .NET clouds Software 18 Fair Torrent A Deficit – Based Distributed Algorithm to Networking .NET Ensure Fairness in peer to peer Systems Network Assisted Mobile Computing with Mobile 19 .NET Optimal Uplink Query Processing Computing BECAN: A Bandwidth-Efficient Cooperative Parallel & 20 Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks Distributed .NET Systems Towards Secure and Dependable Storage Services in Cloud 21 Cloud Computing Computing Joint Relay and Jammer Selection for Secure Two-Way Relay Information 22 Networks Forensics& Security Automatic Reconfiguration for Large-Scale Reliable Storage 23 Secure Computing Systems Expert Discovery and Interactions in Mixed Service-Oriented Service 24 Systems Computing