IEEE 2013 – 2014 Java Final Year Projects @ Frontline Technolgies. Chennai, Coimbatore, Trichy, Karur, Bangalore

IEEE Java Projects – IEEE 2013

1. Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework — Data mining

2. Ranking on Data Manifold with Sink Points — Data mining

3. Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks — Data mining

4. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse — Data mining

5. A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data — Data mining

6. A Survey of XML Tree Patterns — Data mining

7. Region-Based Foldings in Process Discovery — Data mining

8. Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures — Data mining

9. T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence — Data mining

10. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm — Data mining

11. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model — Data mining

12. A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models — Data mining

13. Ontology Matching: State of the Art and Future Challenges — Data mining

14. Large Graph Analysis in the GMine System — Data mining

15. Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies — Data mining

16. A System to Filter Unwanted Messages from OSN User Walls — Data mining

17. A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments — Data mining

18. A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments — Data mining

19. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia — Data mining

20. AML: Efficient Approximate Membership Localization within a Web-Based Join Framework — Data mining

21. Event Tracking for Real-Time Unaware Sensitivity Analysis — Data mining

22. Detecting Intrinsic Loops Underlying Data Manifold — Data mining

23. Clustering Large Probabilistic Graphs — Data mining

24. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering — Data mining

25. Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping — Data mining

26. Finding Rare Classes: Active Learning with Generative and Discriminative Models — Data mining

27. Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models — Data mining

28. Simple Hybrid and Incremental Postpruning Techniques for Rule Induction — Data mining

29. Supporting Search-As-You-Type Using SQL in Databases — Data mining

30. Reinforced Similarity Integration in Image-Rich Information Networks — Data mining

31. Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing — Mobile Computing

32. Quality-Differentiated Video Multicast in Multirate Wireless Networks — Mobile Computing

33. EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks — Mobile Computing

34. Capacity of Hybrid Wireless Mesh Networks with Random APs — Mobile Computing

35. Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding — Mobile Computing

36. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation — Mobile Computing

37. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks — Mobile Computing

38. Evaluating Temporal Robustness of Mobile Networks — Mobile Computing

39. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks — Mobile Computing

40. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System — Mobile Computing

41. SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity — Mobile Computing

42. An Investigation on LTE Mobility Management — Mobile Computing

43. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks — Mobile Computing

44. Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks — Mobile Computing

45. On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks — Mobile Computing

46. Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information — Mobile Computing

47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks — Mobile Computing

48. Toward a Statistical Framework for Source Anonymity in Sensor Networks — Mobile Computing

49. On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling — Mobile Computing

50. Model-Based Analysis of Wireless System Architectures for Real-Time Applications — Mobile Computing

51. Successive Interference Cancellation: Carving Out MAC Layer Opportunities — Mobile Computing

52. Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks — Mobile Computing

53. Group-Based Medium Access Control for IEEE 802.11n Wireless LANs — Mobile Computing

54. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks — Mobile Computing

55. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications — Mobile Computing

56. Secure Communication Based on Ambient Audio — Mobile Computing

57. Importance of Coherence Protocols with Network Applications on Multicore Processors — Multimedia

58. An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs — Multimedia

59. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes — Networking

60. Distance Bounding A Practical Security Solution for Real-Time Location Systems — Networking

61. Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm — Parallel & Dis Systems

62. Network Traffic Classification Using Correlation Information — Parallel & Dis Systems

63. Distributed Web Systems Performance Forecasting Using Turning Bands Method — Parallel & Dis Systems

64. High Performance Resource Allocation Strategies for Computational Economies — Parallel & Dis Systems

65. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks — Parallel & Dis Systems

66. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption — Parallel & Dis Systems

67. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks — Parallel & Dis Systems

68. Adaptive Network Coding for Broadband Wireless Access Networks — Parallel & Dis Systems

69. Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip — Parallel & Dis Systems

70. MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching — Parallel & Dis Systems

71. Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision — Parallel & Dis Systems

72. Covering Points of Interest with Mobile Sensors — Parallel & Dis Systems

73. Topology Abstraction Service for IP-VPNs — Parallel & Dis Systems

74. Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller — Parallel & Dis Systems

75. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models — Parallel & Dis Systems

76. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks — Parallel & Dis Systems

77. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks — Parallel & Dis Systems

78. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks — Parallel & Dis Systems

79. Analysis of Distance-Based Location Management in Wireless Communication Networks — Parallel & Dis Systems

80. Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks — Parallel & Dis Systems

81. Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery — Parallel & Dis Systems

82. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks — Parallel & Dis Systems

83. Dynamic Coverage of Mobile Sensor Networks — Parallel & Dis Systems

84. In-Network Estimation with Delay Constraints in Wireless Sensor Networks — Parallel & Dis Systems

85. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks — Parallel & Dis Systems

86. Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor — Parallel & Dis Systems

87. IP-Geolocation Mapping for Moderately Connected Internet Regions — Parallel & Dis Systems

88. IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments — Parallel & Dis Systems

89. A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Parallel and Distributed Systems

90. EAACK-A Secure Intrusion-Detection System for MANETs — Secure Computing

91. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks — Signal Processing

92. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper — Signal Processing

93. Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks — Signal Processing

94. The Generalization Ability of Online Algorithms for Dependent Data —- Webmining

95. Localization-Based Radio Model Calibration for Fault-Tolerant Wireless Mesh Networks — Wireless Networks

96. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling — Wireless Networks

97. A Data Fusion Technique for Wireless Ranging Performance Improvement — Wireless Networks

98. SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks — Wireless Networks

IEEE 2013 – 2014 DotNet Final Year Projects Frontline Technolgies Chennai, Coimbatore, Trichy, Karur, Bangalore

 


2013 IEEE Projects – Dotnet

 

  1.  

A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

Datamining

  1.  

A Survey of XML Tree Patterns

Datamining

  1.  

Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model

Datamining

  1.  

Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

Datamining

  1.  

Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse

Datamining

  1.  

Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework

Datamining

  1.  

Ranking on Data Manifold with Sink Points

Datamining

  1.  

Region-Based Foldings in Process Discovery

Datamining

  1.  

Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures

Datamining

  1.  

T-Drive Enhancing Driving Directions with Taxi Drivers’ Intelligence

Datamining

  1.  

Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm

Datamining

  1.  

A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models

Datamining

  1.  

Ontology Matching: State of the Art and Future Challenges

Datamining

  1.  

Large Graph Analysis in the GMine System

Datamining

  1.  

Nonadaptive Mastermind Algorithms for String and Vector Databases, with Case Studies

Datamining

  1.  

A System to Filter Unwanted Messages from OSN User Walls

Datamining

  1.  

A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments

Datamining

  1.  

A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments

Datamining

  1.  

A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

Datamining

  1.  

AML: Efficient Approximate Membership Localization within a Web-Based Join Framework

Datamining

  1.  

Event Tracking for Real-Time Unaware Sensitivity Analysis

Datamining

  1.  

Detecting Intrinsic Loops Underlying Data Manifold

Datamining

  1.  

Clustering Large Probabilistic Graphs

Datamining

  1.  

Anonymization of Centralized and Distributed Social Networks by Sequential Clustering

Datamining

  1.  

Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping

Datamining

  1.  

Finding Rare Classes: Active Learning with Generative and Discriminative Models

Datamining

  1.  

Fast Activity Detection: Indexing for Temporal Stochastic Automaton-Based Activity Models

Datamining

  1.  

Simple Hybrid and Incremental Postpruning Techniques for Rule Induction

Datamining

  1.  

Supporting Search-As-You-Type Using SQL in Databases

Datamining

  1.  

Reinforced Similarity Integration in Image-Rich Information Networks

Datamining

  1.  

Capacity of Hybrid Wireless Mesh Networks with Random APs

Mobile Computing

  1.  

Channel Assignment for Throughput Optimization in Multichannel Multiradio Wireless Mesh Networks Using Network Coding

Mobile Computing

  1.  

Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation

Mobile Computing

  1.  

EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

Mobile Computing

  1.  

Pulse Switching Toward a Packet-Less Protocol Paradigm for Event Sensing

Mobile Computing

  1.  

Quality-Differentiated Video Multicast in Multirate Wireless Networks

Mobile Computing

  1.  

Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

Mobile Computing

  1.  

Evaluating Temporal Robustness of Mobile Networks

Mobile Computing

  1.  

A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks

Mobile Computing

  1.  

Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

Mobile Computing

  1.  

SSD: A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity

Mobile Computing

  1.  

An Investigation on LTE Mobility Management

Mobile Computing

  1.  

On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks

Mobile Computing

  1.  

Channel Allocation and Routing in Hybrid Multichannel Multiradio Wireless Mesh Networks

Mobile Computing

  1.  

On the Real-Time Hardware Implementation Feasibility of Joint Radio Resource Management Policies for Heterogeneous Wireless Networks

Mobile Computing

  1.  

Autonomous Sensing Order Selection Strategies Exploiting Channel Access Information

Mobile Computing

  1.  

Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

Mobile Computing

  1.  

Toward a Statistical Framework for Source Anonymity in Sensor Networks

Mobile Computing

  1.  

On Centralized and Localized Approximation Algorithms for Interference-Aware Broadcast Scheduling

Mobile Computing

  1.  

Model-Based Analysis of Wireless System Architectures for Real-Time Applications

Mobile Computing

  1.  

Successive Interference Cancellation: Carving Out MAC Layer Opportunities

Mobile Computing

  1.  

Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

Mobile Computing

  1.  

Group-Based Medium Access Control for IEEE 802.11n Wireless LANs

Mobile Computing

  1.  

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

Mobile Computing

  1.  

A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

Mobile Computing

  1.  

Secure Communication Based on Ambient Audio

Mobile Computing

  1.  

Importance of Coherence Protocols with Network Applications on Multicore Processors

Multimedia

  1.  

Multimedia Fusion With Mean-Covariance Analysis

Multimedia

  1.  

Distance Bounding A Practical Security Solution for Real-Time Location Systems

Networking

  1.  

Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes

Networking

  1.  

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

Parallel & Dis Systems

  1.  

Distributed Web Systems Performance Forecasting Using Turning Bands Method

Parallel & Dis Systems

  1.  

High Performance Resource Allocation Strategies for Computational Economies

Parallel & Dis Systems

  1.  

Modeling and Optimizing the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm

Parallel & Dis Systems

  1.  

Network Traffic Classification Using Correlation Information

Parallel & Dis Systems

  1.  

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Parallel & Dis Systems

  1.  

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

Parallel & Dis Systems

  1.  

Adaptive Network Coding for Broadband Wireless Access Networks

Parallel & Dis Systems

  1.  

Online Real-Time Task Scheduling in Heterogeneous Multicore System-on-a-Chip

Parallel & Dis Systems

  1.  

MIN-MAX: A Counter-Based Algorithm for Regular Expression Matching

Parallel & Dis Systems

  1.  

Binary Tree Slotted ALOHA for Passive RFID Tag Anticollision

Parallel & Dis Systems

  1.  

Covering Points of Interest with Mobile Sensors

Parallel & Dis Systems

  1.  

Topology Abstraction Service for IP-VPNs

Parallel & Dis Systems

  1.  

Thermal and Energy Management of High-Performance Multicores: Distributed and Self-Calibrating Model-Predictive Controller

Parallel & Dis Systems

  1.  

Strategies for Energy-Efficient Resource Management of Hybrid Programming Models

Parallel & Dis Systems

  1.  

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

Parallel & Dis Systems

  1.  

Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks

Parallel & Dis Systems

  1.  

Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks

Parallel & Dis Systems

  1.  

Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks

Parallel & Dis Systems

  1.  

Analysis of Distance-Based Location Management in Wireless Communication Networks

Parallel & Dis Systems

  1.  

Gaussian versus Uniform Distribution for Intrusion Detection in Wireless Sensor Networks

Parallel & Dis Systems

  1.  

Fast Channel Zapping with Destination-Oriented Multicast for IP Video Delivery

Parallel & Dis Systems

  1.  

Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks

Parallel & Dis Systems

  1.  

Dynamic Coverage of Mobile Sensor Networks

Parallel & Dis Systems

  1.  

In-Network Estimation with Delay Constraints in Wireless Sensor Networks

Parallel & Dis Systems

  1.  

Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks

Parallel & Dis Systems

  1.  

Microarchitecture of a Coarse-Grain Out-of-Order Superscalar Processor

Parallel & Dis Systems

  1.  

IP-Geolocation Mapping for Moderately Connected Internet Regions

Parallel & Dis Systems

  1.  

IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments

Parallel & Dis Systems

  1.  

EAACK—A Secure Intrusion-Detection System for MANETs

Secure Computing

  1.  

Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper

Signal Processing

  1.  

Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks

Signal Processing

  1.  

Receiver-Driven Adaptive Enhancement Layer Switching Algorithm for Scalable Video Transmission Over Link-adaptive Networks

Signal Processing

  1.  

The Generalization Ability of Online Algorithms for Dependent Data

Webmining

  1.  

A Data Fusion Technique for Wireless Ranging Performance Improvement

Wireless Networks

  1.  

Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling

Wireless Networks

  1.  

SinkTrail A Proactive Data Reporting Protocol for Wireless Sensor Networks

Wireless Networks

  1.  

A Data Fusion Technique for Wireless Ranging Performance Improvement

Wireless Networks

IEEE 2012 -2013 Java .Net

Full Source Code, Abstract, IEEE Basepaper,review ppt slides,video,complete documentation
Contact —   [frontlinetechnosol]@[gmail.com]   +91-9789-338855

 

2012 IEEE JAVA & .NET TITLES
1.   A Fusion Approach for Efficient Human Skin Detection

    DOMAIN: IMAGE PROCESSING                                        LANGUAGE: DOTNET
2.   A New Cell Counting Based Attack Against Tor
    DOMAIN: NETWORK                                                     LANGUAGE: DOTNET
3.   A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
    DOMAIN: NETWORK SECURITY                                      LANGUAGE: DOTNET
4.   A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group
    DOMAIN: NETWORK SECURITY                                      LANGUAGE: DOTNET
5.   A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
    DOMAIN: CLOUD COMPUTING                                           LANGUAGE: JAVA
6.   A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-Hoc Networks
   DOMAIN: WIRELESS NETWORK                                           LANGUAGE: JAVA
7.   A Trigger Identification Service for Defending Reactive Jammers in WSN
    DOMAIN: MOBILE COMPUTING                                          LANGUAGE: JAVA
8.   A Unified Spectral-Domain Approach for Saliency Detection and Its Application to Automatic Object Segmentation
    DOMAIN: IMAGE PROCESSING                                        LANGUAGE: DOTNET
9.   Active Visual Segmentation
    DOMAIN: IMAGE PROCESSING                                        LANGUAGE: DOTNET
10.AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
    DOMAIN: WIRELESS NETWORK                                      LANGUAGE: DOTNET
11.An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
    DOMAIN: WIRELESS COMMUNICATION                               LANGUAGE: JAVA
12.An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks
    DOMAIN: PARALLEL & DISTRIBUTED                      LANGUAGE: DOTNET
13.An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
    DOMAIN: NETWORKING                                                    LANGUAGE: JAVA
14.Automatic Reconfiguration for Large-Scale Reliable Storage Systems
    DOMAIN: NETWORK                                                     LANGUAGE: DOTNET
15.Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
    DOMAIN: NETWORK SECURITY                                      LANGUAGE: DOTNET
16.Cloud Computing Security From Single to Multi-Clouds
    DOMAIN: CLOUD COMPUTING                                           LANGUAGE: JAVA
17.Cloud Computing Security: From Single to Multi-Clouds
   DOMAIN: CLOUD COMPUTING                                           LANGUAGE: JAVA
18.Contrast-Independent Curvilinear Structure Detection in Biomedical Images
    DOMAIN: IMAGE PROCESSING                                        LANGUAGE: DOTNET
19.Cooperative download in vehicular environments
    DOMAIN: MOBILE COMPUTING                                      LANGUAGE: DOTNET
20.Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
    DOMAIN: CLOUD COMPUTING                                           LANGUAGE: JAVA
21.Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points
    DOMAIN: IMAGE PROCESSING                                        LANGUAGE: DOTNET
22.Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
    DOMAIN: NETWORK SECURITY                                      LANGUAGE: DOTNET
23.Discovering Characterizations of the Behavior of Anomalous Sub-populations
    DOMAIN: DATA MINING                                                  LANUAGE: DOTNET
24.Distributed Throughput Maximization in Wireless Networks via Random Power Allocation
    DOMAIN: NETWORK                                                     LANGUAGE: DOTNET
25.Efficient Audit Service Outsourcing for Data Integrity in Clouds sniffer
    DOMAIN: CLOUD COMPUTING                                       LANGUAGE: DOTNET
26.Energy-Efficient Strategies for Cooperative Multichannel MAC Protocols
    DOMAIN: MOBILE COMPUTING                                          LANGUAGE: JAVA
27.Ensuring Distributed Accountability for Data Sharing in the Cloud
    DOMAIN: CLOUD COMPUTING                                           LANGUAGE: JAVA
28.Fast Data Collection in Tree-Based Wireless Sensor Networks
    DOMAIN: NETWORK                                                         LANGUAGE: JAVA
29.Fast Matrix Embedding by Matrix Extending
    DOMAIN: NETWORK SECURITY                                          LANGUAGE: JAVA
30.FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
    DOMAIN: MOBILE COMPUTING                                          LANGUAGE: JAVA
31.FireCol A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
    DOMAIN: NETWORK                                                         LANGUAGE: JAVA
32. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
    DOMAIN: CLOUD COMPUTING                                           LANGUAGE: JAVA
33.Learn to Personalized Image Search from the Photo Sharing Websites
    DOMAIN: WEBMINING                                                       LANGUAGE: JAVA
34.Load Balancing Multipath Switching System with Flow Slice
    DOMAIN: NETWORK                                            LANGUAGE: JAVA/DOTNET
35.Network Assisted Mobile Computing with Optimal Uplink Query Processing
    DOMAIN: MOBILE COMPUTING                                      LANGUAGE: DOTNET
36.Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
    DOMAIN: NETWORKING                                                    LANGUAGE: JAVA
37.Outsourced Similarity Search on Metric Data Assets
    DOMAIN: WEBMINING                                                   LANGUAGE: DOTNET
38.Packet-Hiding Methods for Preventing Selective Jamming Attacks
    DOMAIN: NETWORK                                                         LANGUAGE: JAVA
39.PDE-Based Enhancement of Color Images in RGB Space
    DOMAIN: IMAGE PROCESSING                                        LANGUAGE: DOTNET
40.Portable Cloud Services Using TOSCA
    DOMAIN: CLOUD COMPUTING                                           LANGUAGE: JAVA
41.Privacy- and Integrity-Preserving Range Queries in Sensor Networks
    DOMAIN: WEBMINING                                                       LANGUAGE: JAVA
42.Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
    DOMAIN: DATA MINING                                                LANGUAGE: DOTNET
43.Ranking Model Adaptation for Domain-Specific Search
    DOMAIN: DATA MINING                                                    LANGUAGE: JAVA   
44.Risk-Aware Mitigation for MANET Routing Attacks
    DOMAIN: NETWORK SECURITY                                      LANGUAGE: DOTNET
45.Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
    DOMAIN: PARALLEL And DISTRIBUTED                          LANGUAGE: DOTNET
46.Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
    DOMAIN: DATA MINING                                                LANGUAGE: DOTNET
47.Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
    DOMAIN: IMAGE PROCESSING                                        LANGUAGE: DOTNET
48.SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency
    DOMAIN: PARALLEL And DISTRIBUTED                          LANGUAGE: DOTNET
49.The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
    DOMAIN: PARALLEL & DISTRIBUTED                      LANGUAGE: DOTNET
50.Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
    DOMAIN: MOBILE COMPUTING                                          LANGUAGE: JAVA
51.Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
    DOMAIN: MOBILE COMPUTING                                          LANGUAGE: JAVA
52.Towards Accurate Mobile Sensor Network Localization in Noisy Environments
    DOMAIN: NETWORK                                                         LANGUAGE: JAVA
53.View-invariant action recognition based on Artificial Neural Networks
    DOMAIN: NETWORK                                                     LANGUAGE: DOTNET

IEEE 2012 NS2 Projects

IEEE 2012 NS2 Projects
1.   Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
2.   Cut Detection in Wireless Sensor Networks
3.   Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
4.   Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
5.   Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
6.   Hop-By-Hop Routing In Wireless Mesh Networks with Bandwidth Guarantees
7.   TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Network
8.   The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
9.   Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
10.   ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing

2007 IEEE PROJECTS

Full Source Code, Abstract, IEEE Basepaper,review ppt slides,video,complete documentation
Contact —   [frontlinetechnosol]@[gmail.com]   +91-9789-338855

 

S.NO.
2007 IEEE PROJECT TITLES
YEAR
1
Distributed cache updating for the Dynamic source routing protocol
Distribute Computing
2
An Adaptive Programming Model for Fault-Tolerant Distributed Computing
Secure Computing
3
Face Recognition Using Laplacian faces
Image Processing
4
Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm
Network Computing
5
Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
Image Processing
6
A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
Network Computing
7
Noise Reduction by Fuzzy Image Filtering
Image Processing
8
Online Handwritten Script Recognition
Image Processing
9
ODAM: An Optimized Distributed Association Rule Mining Algorithm
Data Mining
10
Structure and Texture Filling-In of Missing Image Blocks in Wireless Transmission and Compression App
Image Processing
11
An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks
Network Computing
12
ITP: An Image Transport Protocol for the Internet
Network Computing
13
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes (HIDS)
Secure Computing
14
Network border patrol: preventing congestion collapse and promoting fairness in the Internet
Network Computing
15
Application of BPCS steganography to wavelet compressed video
Secure Computing
26
Neural Networks for Unicode Optical Character Recognition
Image Processing
27
An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs
Network Computing
28
XTC: A Practical Topology Control Algorithm for Ad-Hoc Networks
Network Computing
29
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Network Computing
20
Mobile Agents In Distributed Multimedia Database Systems 
Multimedia
21
Image Stream Transfer Using Real-Time Transmission Protocol 
Image Processing
22
Personal Authentication Using 3-D Finger Geometry
Image Processing
23
Efficient Broadcasting with Guaranteed Coverage in Mobile Ad Hoc Networks
Network Computing
24
A Memory Learning Framework for Effective Image Retrieval
Image Processing
25
Personal Identification Based On Iris Texture Analysis
Image Processing
26
GHIC A Hierarchical Pattern-Based Clustering Algorithm for Grouping Web Transactions
Data Mining
27
Workflow Mining Discovering Process Models from Event Logs
Data Mining
28
Identification of Humans Using Gait
Image Processing
29
Location Aided Routing In Mobile AD-HOC Networks
Network Computing
30
Neural Network Based Face Detection
Image Processing
S.NO.
IEEE Research Projects
Domain 
31
Genetic Algorithm Based Train Simulation Using Concurrent Engineering
Network Computing
32
Image Compression and De-compression
Image Processing
33
Network Component For XML Migration
Network Computing
34
Java water marking and image combustion
Image Processing
35
Edge Detection in Images with Wavelet Transform
Image Processing
36
Neural Network for Recognition of Handwritten and Digits
Image Processing
37
Back Propagation Neural Network for Image Recognition
Image Processing
38
Steganography for Hiding Data in Wave Audio Files
Secure Computing
39
Multiple Ant Colonies Optimization for Load Balancing in Distributed Systems
Network Computing
40
Image Processing for Edge Detection
Image Processing
41
Windows Management Instrumentation (WMI) Implementation
System
42
Cryptographically Safe Server Client Protocol
Secure Computing
43
Hiding messages in the Noise of a Picture
Secure Computing
44
Performance Evaluation of RMI
Network Computing
45
Public Key Validation for DNS security Extension
Network Computing
46
Java Visual Editor and Compiler Tool
System
47
Homogenous Network Control and Implementation
Network Computing
48
Hopfield model of neural network for pattern recognition
Image Processing
49
Intrusion Detection Prevention And Traceback Systems
Network Computing
50
Image Processing for Convolution Filters
Image Processing

OLD IEEE BULK PROJECTS BEST PRICE

Full Source Code, Abstract, IEEE Basepaper,review ppt slides,video,complete documentation
Contact —   [frontlinetechnosol]@[gmail.com]   +91-9789-338855

 

S.NO.
2010 IEEE PROJECT TITLES
YEAR
DOMAIN
1
DOTNET- Maximizing Rewards in Wireless Networks with Energy
2010
WIRELESS NETWORKING
2
DOTNET- Slow Adaptive OFDMA Systems Through Chance Constrained Programming
2010
WIRELESS NETWORKING
3
DOTNET- Toward Optimal Network Fault Correction in Externally Managed Overlay Networks
2010
WIRELESS NETWORKING
4
DOTNET- Anonymous Query Processing in Road Networks
2010
DATA MINING
5
DOTNET- Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks
2010
MOBIE COMPUTING
6
DOTNET- VEBEK Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
2010
NETWORK SECURITY
7
DOTNET- Minimizing Delay and Maximizing Lifetime for Wireless Sensor Networks With Anycast
2010
WIRELESS NETWORKING
8
DOTNET- Secure Client-Side ST-DM Watermark   Embedding
2010
NETWORK SECURITY
9
DOTNET- On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
2010
WIRELESS NETWORKING
10
DOTNET- Cross-Layer Design in Multihop Wireless Networks
2010
WIRELESS NETWORKING
11
DOTNET- Privacy-Preserving Public Auditing for Data StorageSecurity in Cloud Computing
2010
CLOUD COMPUTING
12
DOTNET- S4 Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks
2010
MOBIE COMPUTING
13
DOTNET- Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
2010
NETWORKING
14
DOTNET- A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks
2010
PARALLEL COMPUTING
15
DOTNET- Fast Algorithms for Resource Allocation in Wireless Cellular Networks
2010
WIRELESS NETWORKING
16
DOTNET- Distributed Algorithms for Minimum Cost Multicast with Network Coding in Wireless Networks
2010
WIRELESS NETWORKING
17
DOTNET- Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink In Delay-Tolerant Application
2010
MOBIE COMPUTING
18
DOTNET- Fuzzy Keyword Search over Encrypted Data in Cloud Computing
2010
CLOUD COMPUTING
19
DOTNET- Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Network
2010
NERWORKING
20
DOTNET- Dynamic Authentication for Cross-Realm SOA-Based Business Processes
2010
PARALLEL COMPUTING
21
DOTNET- TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Ne
2010
WIRELESS NETWORKING
22
JAVA-- Secure Data Objects Replication in Data Grid
2010
NETWORKING
23
JAVA-- RM Integrated File Replication and Consistency Maintenance in P2P Systems
2010
NETWORKING
24
JAVA-- Fault-tolerant Mobile Agent-based Monitoring Mechanism for Highly Dynamic Distributed Networks
2010
NETWORKING
25
JAVA-- Agent Based Efficient Anomaly Intrusion Detection System in Adhoc networks
2010
NETOWORK SECURITY
26
JAVA-- Deriving Concept-Based User Profiles from Search Engine Logs
2010
DATA MINING
27
JAVA-- On The Performance Of Content Delivery Under Competition In A Stochastic Unstructured Peer-To-Peer
2010
NETWORKING
28
JAVA-- Rate Adaptation in Congested Wireless Networks through Real-Time Measurements
2010
NETWORKING
29
JAVA-- A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming
2010
NETWORKING
30
JAVA-- Conditional Shortest Path Routing In Delay Tolerant Networks
2010
NETWORKING
31
JAVA-- Privacy-Conscious Location-Based Queries in Mobile Environments
2010
MOBIE COMPUTING
32
JAVA-- Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization
2010
IMAGE PROCESSING
33
JAVA-- Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks
2010
WIRELESS NETWORKING
34
JAVA-- MABS Multicast Authentication Based on Batch Signature
2010
NETWORK SECURITY
35
JAVA-- Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks
2010
WIRELESS NETWORKING
36
JAVA-- Layered Approach Using Conditional Random Fields for Intrusion Detection
2010
NETWORK SECURITY
37
JAVA-- Inside the Permutation-Scanning Worms Propagation Modeling and Analysis
2010
NETWORK SECURITY
38
JAVA-- Achieving Guaranteed Anonymity in GPS Traces via Uncertainty Aware Path Cloaking
2010
MOBIE COMPUTING
39
JAVA-- Congestion Control Of Transmission Control Protocol Based On Bandwidth Estimation
2010
40
JAVA-- Provisioning of Deadline-Driven Requests With Flexible Transmission Rates inWDMMesh Networks
2010
NETWORKING
41
JAVA-- Performance Evaluation of Video Streaming over Multi-Hop Wireless Local Area Networks
2010
WIRELESS NETWORKING
42
JAVA-- Toward Practical Opportunistic Routing With Intra-Session Network Coding for Mesh Networks
2010
NETWORKING
43
JAVA-- Record Matching over Query Results from Multiple Web Databases
2010
DATA MINING
44
JAVA-- Maximizing The Lifetime Of Wireless Sensor Networks With Mobile Sink In Delay-Tolerant Application
2010
WIRELESS NETWORKING
45
JAVA-- Label-Based Dv-Hop Localization Against Wormhole Attacks In Wireless Sensor Networks
2010
WIRELESS NETWORKING
46
JAVA-- FiVaTech Page-Level Web Data Extraction from Template Pages
2010
WEB MINING
47
JAVA-- Pie Cooperative Peer-To-Peer Information Exchange In Network Coding Enabled Wireless Networks
2010
WIRELESS NETWORKING
48
JAVA-- Image Thumbnails That Represent Blur and Noise
2010
IMAGE PROCESSING
49
JAVA-- PAM An Efficient And Privacy-Aware Monitoring Framework For Continuously Moving Objects
2010
WIRELESS NETWORKING
50
JAVA-- KTR an Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
2010
WIRELESS NETWORKING
S.NO.
2009 IEEE PROJECT TITLES
YEAR
DOMAIN
1
DOTNET- A Gen2-based RFID Authentication Protocol for Security and Privacy
2009
2
DOTNET- A Tabu Searching Algorithm For Cluster Building in Wirless Sensor Networks
2009
3
DOTNET- Analysis of Shortest Path Routing for Larg Multi-Hop Wirless Networks
2009
4
DOTNET- Biased Random Walks in Uniform Wirless Networks
2009
5
DOTNET- Cell Breathing Techniques for Load Balancing in Wirless LANs
2009
6
DOTNET- Compaction of Schedules and a Two-Stage Approach for Duplication-
2009
7
DOTNET- Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic
2009
8
DOTNET- Energy Maps for Mobile Wireless Networks Coherence Time versus Spreading Period
2009
9
DOTNET- Enforcing Minimum-Cost Multicast Routing against Shelfish Information Flows
2009
10
DOTNET- Greedy Routing with Anti-Void Traversal for Wirless Sensor Networks
2009
11
DOTNET- Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target
2009
12
DOTNET- Local Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks
2009
13
DOTNET- Movement-Assisted Connectivity Restoration in Wireless Sensor and
2009
14
DOTNET- On the Planning of Wirless Sensor Networks Energy-Efficient Clustering under the Joint Rou
2009
15
DOTNET- On the Security of Route Discovery in MANETs
2009
16
DOTNET- Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise
2009
17
PRESTO Feedback-Driven Data Management in Sensor Networks
2009
18
DOTNET- Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks
2009
19
DOTNET- Resequencing Analysis of Stop-and-Wait ARQ for Parallel
2009
20
DOTNET- Resource Allocation in OFDMA Wireless Communications Systems
2009
21
DOTNET- Route Stability in MANETs under the Random Direction Mobility Model
2009
22
DOTNET- Secure and Policy-Complaint Source Routing
2009
23
DOTNET- Single-Link Failure Detection in All-Optical Networks Using
2009
24
DOTNET- Spread-Spectrum Watermarking Security
2009
25
DOTNET- The Effectiveness of Checksums for Embedded Control Networks
2009
26
DOTNET- Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for RFID
2009
27
JAVA-- A Distributed Stream Query Optimization Framework through Integrated Planning and Deployment
2009
28
JAVA-- Adaptive Fuzzy Filtering for Artifact Reduction in Compressed Images and Videos
2009
29
JAVA-- Measuring Capacity Bandwidth of Targeted Path Segments
2009
30
JAVA-- Capturing Router Congestion and Delay
2009
31
JAVA-- Continuous Monitoring of Spatial Queries in Wireless Broadcast
2009
32
JAVA-- Detecting Malicious Packet Losses
2009
33
JAVA-- Dynamic Routing with Security Considerations
2009
34
JAVA-- Energy Maps For Mobile Wireless networks coherence Time Versues Spreding Period
2009
35
JAVA-- Energy-Efficient SINR-Based Routing for Multihop Wireless
2009
36
JAVA-- Evaluating the Vulnerability of Network Traffic Using Joint Routing
2009
37
JAVA-- Facial Recognition using multisensor images based on localized kernel eigen spaces
2009
38
JAVA-- Flexible Roll Back Recovery
2009
39
JAVA-- Large Connectivity for Dynamic Random Geometric Graphs
2009
40
JAVA-- Measuring Capacity Bandwidth of Targeted Path Segments
2009
41
JAVA-- Mitigation oF Control Channel Jamming Under Node Caputer Attacks
2009
42
JAVA-- Mobility Management Approaches for Mobile IP Networks
2009
43
JAVA-- Movement-Assisted Connectivity Restoration in Wireless Sensor and
2009
44
JAVA-- Multipath Dissemination in Regular Mesh Topologies
2009
45
JAVA-- Multiple Routing Configurations for Fast IP Network Recovery
2009
46
JAVA-- Residual-Based Estimation of Peer and Link Lifetimes in P2P Networks
2009
47
JAVA-- SIMPS Using Sociology for Personal Mobility
2009
48
JAVA-- Spatio-Temporal Network Anomaly Detection by Assessing Deviations of Empirical Measures
2009
49
JAVA-- Monitoring the Application-Layer DDoS Attacks for Popular Websites
2009
50
JAVA-- Ranking and Suggesting Popular Items
2009
S.NO.
2008 IEEE PROJECT TITLES
YEAR
DOMAIN
1
DOTNET- Estimation of Defects Based On Defect Decay Model ED3M
2008
2
DOTNET- HBA Distributed Metadata Management for Large Cluster-Based Storage Systems
2008
3
DOTNET- Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks
2008
4
DOTNET- Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity Approach
2008
5
DOTNET- Trustworthy Computing Under Resource Constraints With The Down Policy
2008
6
DOTNET- Localized Sensor Area Coverage With Low Communication Overhead
2008
7
DOTNET- Active Learning Methods for Interactive Image Retrieval
2008
8
DOTNET- Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light
2008
9
DOTNET- Hardware enhanced association rule mining with Hashing and Pipelining
2008
10
DOTNET- Efficient Resource Allocation For Wireless Multicast
2008
11
DOTNET- A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video
2008
12
DOTNET- A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers
2008
13
DOTNET- A New Model For Dissemination Of XML Content
2008
14
DOTNET- Efficient 2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring Elements
2008
15
DOTNET- Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case
2008
16
DOTNET- Watermarking Relational Databases Using Optimization Based Techniques
2008
17
DOTNET- Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision
2008
18
DOTNET- Probabilistic Packet Marking For Large Scale IP Trace Back
2008
19
DOTNET- Credit Card Fraud Detection Using Hidden Markov Models
2008
20
JAVA- A Geometric Approach to Improving Active Packet Loss Measurement
2008
21
JAVA-Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks
2008
22
JAVA-Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
2008
23
JAVA-Location Based Spatial Query Processing In Wireless Broadcast Environments
2008
24
JAVA-Modeling & Automated Containment of Worms
2008
25
JAVA-Benefit Based Data Caching In Ad Hoc Networks
2008
26
JAVA-Minimizing File Download Time in Stochastic Peer-to-Peer Networks
2008
27
JAVA-Rate & Delay Guarantees Provided By Close Packet Switches with Load Balancing
2008
28
JAVA-Performance of a Speculative Transmission Scheme for Scheduling-Latency Reduction
2008
29
JAVA-QUIVER Consistent Object Sharing For Edge Services
2008
30
JAVA-Truth Discovery with multiple Conflicting Information Providers on web
2008
31
JAVA-Dual-Link Failure Resiliency through Backup Link Mutual Exclusion
2008
32
JAVA-Bandwidth Efficient Video Multicasting in Multiradio Muilticellular Wireless
2008
33
JAVA-An Efficient Association Rule Mining Algorithm In Distributed Databases
2008
34
JAVA-BRA A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks
2008
35
JAVA-A Precise Termination Condition of the Probabilistic Packet Marking Algorithm
2008
36
JAVA-Protection of Database Security via Collaborative Inference Detection
2008
37
JAVA-Efficient and Secure Content Processing and Distribution by Cooperative Intermediaries
2008
38
JAVA-A Signature-Based Indexing Method for Efficient Content-Based Retrieval of Relative Temporal Pattern
2008
39
JAVA-Controlling IP Spoofing Through Inter Domain Packet Filters
2008
40
JAVA-Securing User-Controlled Routing Infrastructures
2008

OLD IEEE BULK PROJECTS BEST PRICE

 

Full Source Code, Abstract, IEEE Basepaper,review ppt slides,video,complete documentation
Contact —   [frontlinetechnosol]@[gmail.com]   +91-9789-338855
OLD IEEE BULK PROJECTS BEST PRICE
S.NO
2011 IEEE PROJECT TITLES
YEAR
DOMAIN
1
DOTNET- A Web Search Engine-Based Approach to Measure Semantic Similarity between Words
2011
WEB MINING
2
DOTNET- Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
2011
NETWORK SECURITY
3
DOTNET- Adaptive Provisioning of Human Expertise in Service-oriented Systems
2011
DATA MINING
4
DOTNET- An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
2011
NETWORK SECURITY
5
DOTNET- Bridging Socially-Enhanced Virtual Communities
2011
DATA MINING
6
DOTNET- Combining Haar Feature And Skin Color Based Classifiers For Face
2011
IMAGE PROCESSING
7
DOTNET- Continuous Neighbor Discovery in Asynchronous Sensor Networks
2011
NETWORKING
8
DOTNET- Data integrity proofs in cloud storage
2011
CLOUD COMPUTING
9
DOTNET- Data Leakage Detection
2011
DATA MINING
10
DOTNET- Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
2011
NETWORKING
11
DOTNET- Distributed Adaptation of Quantized Feedback for Downlink Network MIMO   Systems
2011
WIRELESS NETWORKING
12
DOTNET- Efficient Computation of Range Aggregates against uncertain location based queries
2011
DATA MINING
13
DOTNET- Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
2011
DATA MINING
14
DOTNET- Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
2011
PARALLEL COMPUTING
15
DOTNET- Exploring Application-Level Semantics for Data Compression
2011
DATA MINING
16
DOTNET- Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
2011
DATA MINING
17
DOTNET- Integration of Sound Signature in Graphical Password Authentication System
2011
DATA MINING
18
DOTNET- Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
2011
NETWORKING
19
DOTNET- Monitoring Service Systems from a Language-Action Perspective
2011
DATA MINING
20
DOTNET- NABS Novel Approaches for Biometric Systems
2011
NETWORK SECURITY
21
DOTNET- Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks
2011
WIRELESS NETWORKING
23
DOTNET- One Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web Databases
2011
DATA MINING
24
DOTNET -Optimal service pricing for a cloud cache
2011
CLOUD COMPUTING
25
DOTNET- Personalized Ontology Model for Web Information Gathering
2011
DATA MINING
26
DOTNET- Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
2011
CLOUD COMPUTING
27
DOTNET- Publishing Search Logs – A Comparative Study of Privacy Guarantees
2011
DATA MINING
28
DOTNET- Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking
2011
NETWORK SECURITY
29
DOTNET- Scalable Learning of Collective Behavior
2011
DATA MINING
30
DOTNET- Self-Reconfigurable Wireless Mesh Networks
2011
WIRELESS NETWORKING
31
DOTNET- The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
2011
DATA MINING
32
DOTNET- The Geometric Efficient Matching Algorithm for Firewalls
2011
NETWORK SECURITY
33
DOTNET- The World in a Nutshell Concise Range Queries
2011
DATA MINING
34
JAVA-- A Competitive Study of Cryptography Techniques over Block Cipher
2011
CYPTOGRAPHY
35
JAVA-- A Dual Framework and Algorithms for Targeted Online Data Delivery
2011
DATA MINING
36
JAVA-- A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
2011
DATA MINING
37
JAVA-- A Link-Analysis Extension Of Correspondence Analysis For Mining Relational Databases
2011
DATA MINING
38
JAVA-- A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
2011
DATA MINING
39
JAVA-- A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems
2011
WIRELESS NETWORKING
40
JAVA-- A Novel 3-D Color Histogram Equalization Method With Uniform 1-D Gray Scale   Histogram
2011
IMAGE PROCESSING
41
JAVA-- A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
2011
MOBILE COMPUTING
42
JAVA-- Adaptive Cluster Distance Bounding for High-Dimensional Indexing
2011
DATA MINING
43
JAVA-- Analysis on Credit Card Fraud Detection Methods
2011
DATA MINING
44
JAVA-- Anti-Forensics of Digital Image Compression
2011
IMAGE PROCESSING
45
JAVA-- Buffer Sizing for 802.11 Based Networks
2011
WIRELESS NETWORKING
46
JAVA-- Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc   Networks
2011
WIRELESS NETWORKING
47
JAVA-- Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
2011
WIRELESS NETWORKING
48
JAVA-- Digital Image hiding using curvelet transform
2011
IMAGE PROCESSING
49
JAVA-- Discovering Conditional Functional Dependencies
2011
DATA MINING
50
JAVA-- Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service
2011
WIRELESS NETWORKING
51
JAVA-- Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks
2011
NETWORK SECURITY
52
JAVA-- Effective Navigation of Query Results Based on Concept Hierarchies
2011
DATA MINING
53
JAVA-- Embedded Extended Visual Cryptography Schemes
2011
CRYPTOGRAPHY
54
JAVA-- Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
2011
CLOUD COMPUTING
55
JAVA-- Extended XML Tree Pattern Matching Theories and Algorithms
2011
DATA MINING
56
JAVA-- Fast Simulation of services avalibility in mesh network with dynamic path restoration
2011
NETWORKING
57
JAVA-- Going Back and Forth Efficient Multi deployment and Multi snapshotting on Clouds
2011
CLOUD COMPUTING
58
JAVA-- Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
2011
WIRELESS NETWORKING
59
JAVA-- Intrusion detection An Energy efficient approach in Heterogeneous WSN
2011
NETWORK SECURITY
60
JAVA-- Live Streaming With Receiver-Based Peer-Division Multiplexing
2011
NETWORKING
61
JAVA-- Modeling and Detection of Camouflaging Worm
2011
NETWORK SECURITY
62
JAVA-- More Secure Steganography Method in Spatial Domain
2011
STEGANOGRAPHY
63
JAVA-- Nymble Blocking Misbehaving Users in Anonymizing Networks
2011
NETWORK SECURITY
64
JAVA-- Online Intrusion Alert Aggregation with Generative Data Stream Modeling
2011
NETWORK SECURITY
65
JAVA-- Optimal Bandwidth Assignment for Multiple Description Coded Video
2011
WIRELESS NETWORKING
66
JAVA-- Optimal Stochastic Location Updatees in Mobile Ad Hoc Network
2011
WIRELESS NETWORKING
67
JAVA-- Ranking Spatial Data by Quality Preferences
2011
DATA MINING
68
JAVA-- Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding
2011
STEGANOGRAPHY
69
JAVA-- SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
2011
MOBILE COMPUTING
70
JAVA-- Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports
2011
NETWORKING
71
JAVA-- Secure and Practical Outsourcing of Linear Programming in Cloud Computing
2011
CLOUD COMPUTING
72
JAVA-- Secure High-Throughput Multicast Routing in Wireless Mesh Networks
2011
WIRELESS NETWORKING
73
JAVA-- Sketch4Match – Content-based Image Retrieval System Using Sketches
2011
IMAGE PROCESSING
74
JAVA-- The CoQUOS Approach to Continuous Queries in Unstructured Overlays
2011
DATA MINING
75
JAVA-- Throughput Optimization in High Speed Downlink Packet Access
2011
WIRELESS NETWORKING
76
JAVA-- Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows
2011
WIRELESS NETWORKING
77
JAVA-- Cloud Computing for Agent-Based Urban Transportation Systems
2011
CLOUD COMPUTING
78
JAVA-- Clustering with Multi-Viewpoint based Similarity Measure
2011
DATA MINING
79
JAVA-- Decision Trees for Uncertain Data
2011
DATA MINING
80
JAVA-- A User Oriented Image Retrieval System Based On Interactive Genetic Algorithm
2011
IMAGE PROCESSING