IEEE DOTNET PROJECTS TITLES
|
YEAR--2012
|
||
PROJECT TITLE
|
DOMAIN
|
||
1.
|
A New Cell-Counting-Based Attack Against Tor
|
Networking
|
|
2.
|
Defenses Against Large Scale Online Password Guessing Attacks By
Using
Persuasive Click Points
|
Data Mining
|
|
3.
|
A Novel Anti Phishing Framework Based On Visual Cryptography
|
Distributed And Parallel Systems
|
|
4.
|
A Probabilistic Model Of Visual Cryptography Scheme With Dynamic
Group
|
Information Forensics And Security
|
|
5.
|
A Query Formulation Language For The Data Web
|
Data Mining
|
|
6.
|
A Secure Erasure Code-Based Cloud Storage System With Secure
Data Forwarding
|
Parallel And Distributed Systems
|
|
7.
|
Ample: An Adaptive Traffic Engineering System Based On Virtual
Routing Topologies
|
Networking
|
|
8.
|
Automatic Reconfiguration For Large-Scale Reliable Storage
Systems
|
Dependable And Secure Computing
|
|
9.
|
Automatic Reconfiguration For Large-Scale Reliable Storage
Systems
|
Dependable And Secure Computing
|
|
10.
|
Catching Packet Droppers And Modifiers In Wireless Sensor
Networks
|
Parallel And Distributed Systems
|
|
11.
|
Cloud Computing Security: From Single To Multi-Clouds
|
System Sciences
|
|
12.
|
Cooperative Download In Vehicular Environments
|
Mobile Computing
|
|
13.
|
Design And Implementation Of Tarf: A Trust-Aware Routing
Framework For Wsns
|
Dependable And Secure Computing
|
|
14.
|
Distributed Throughput Maximization In Wireless Networks Via Random
Power Allocation
|
Mobile Computing
|
|
15.
|
Efficient Audit Service Outsourcing For Data Integrity In Clouds
|
Cloud Computing
|
|
16.
|
Enhanced Data Security Model For Cloud Computing
|
Cloud And Mobile Computing
|
|
17.
|
Ensuring Distributed Accountability For Data Sharing In The
Cloud
|
Dependable And Secure Computing
|
|
18.
|
Es-Mpich2: A Message Passing Interface With Enhanced Security
|
Dependable And Secure Computing
|
|
19.
|
Efficient Multidimensional Fuzzy Search For Personal Information
Management Systems
|
Data Mining
|
|
20.
|
Fairtorrent: A Deficit-Based Distributed Algorithm To Ensure
Fairness In Peer-To-Peer Systems
|
Networking
|
|
21.
|
Grouping-Enhanced Resilient Probabilistic En-Route Filtering Of
Injected
False Data In Wsns
|
Parallel And Distributed Systems,
|
|
22.
|
Hasbe: A Hierarchical Attribute-Based Solution For Flexible And
Scalable Access Control In Cloud Computing
|
Information Forensics And Security
|
|
23.
|
Horizontal Aggregations In Sql To Prepare Data Sets For Data
Mining Analysis
|
Data Mining
|
|
24.
|
Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques
|
Data Mining
|
|
25.
|
Mining Web Graphs For Recommendations
|
Data Mining
|
|
26.
|
Multiple Exposure Fusion For High Dynamic Range Image
Acquisition
|
Image Processing
|
|
27.
|
On The Security And Efficiency Of Content Distribution Via
Network Coding
|
Dependable And Secure Computing
|
|
28.
|
Optimal Power Allocation In Multi-Relay Mimo Cooperative
Networks: Theory And Algorithms
|
Selected Areas In Communications
|
|
29.
|
Optimal Source-Based Filtering Of Malicious Traffic
|
Networking
|
|
30.
|
Organizing User Search Histories
|
Data Mining
|
|
31.
|
Outsourced Similarity Search On Metric Data Assets
|
Data Mining
|
|
32.
|
Protecting Location Privacy In Sensor Networks Against A Global
Eavesdropper
|
Mobile Computing,
|
|
33.
|
Query Planning For Continuous Aggregation Queries Over A Network
Of Data Aggregators
|
Data Mining
|
|
34.
|
Revisiting Defenses Against Large-Scale Online Password Guessing
Attacks
|
Dependable And Secure Computing
|
|
35.
|
Scalable Learning Of Collective Behavior
|
Data Mining
|
|
36.
|
Secure And Efficient Handover Authentication Based On Bilinear
Pairing Functions
|
Wireless Communications
|
|
37.
|
Semi Supervised Biased Maximum Margin Analysis For Interactive
Image Retrieval
|
Image Processing,
|
|
38.
|
Smile Detection By Boosting Pixel Differences
|
Image Processing
|
|
39.
|
Spoc: A Secure And Privacy-Preserving Opportunistic Computing Framework
For Mobile-Healthcare Emergency
|
Parallel And Distributed Systems
|
|
40.
|
The Three-Tier Security Scheme In Wireless Sensor Networks With
Mobile Sinks
|
Parallel And Distributed Systems
|
|
41.
|
Topology Control In Mobile Ad Hoc Networks With Cooperative
Communications
|
Wireless Networking
|
|
42.
|
Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc
Networks
|
Mobile Computing
|
|
43.
|
Towards Secure And Dependable Storage Services In Cloud
Computing
|
Cloud Computing
|
|
44.
|
Tree-Based Mining For Discovering Patterns Of Human Interaction
In Meetings
|
Data Mining
|
|
45.
|
Becan: A Bandwidth-Efficient Cooperative Authentication Scheme
For Filtering Injected False Data In Wireless Sensor Networks
|
Parallel And Distributed Systems
|
|
46.
|
Compressed-Sensing-Enabled Video Streaming For Wireless
Multimedia Sensor Networks
|
Multimedia
|
|
47.
|
Scalable And Secure Sharing Of Personal Health Records In Cloud
Computing Using Attribute-Based Encryption
|
Cloud Computing
|
|
48.
|
Robust Face-Name Graph Matching For Movie Character
Identification
|
Multimedia
|
|
49.
|
Securing Node Capture Attacks For Hierarchical Data Aggregation
In Wireless Sensor Networks
|
Wireless Networking
|
|
We will provide IEEE Projects 2014, 2013, 2012 Project code and docs at low cost Java web application and Android Projects Available at low cost For B.tech, M,Tech, MCA , and others For more info: ieeeprojectsinhyd@gmail.com
Monday, 8 September 2014
IEEE 2012 DotNET projects list
Subscribe to:
Posts (Atom)