Monday 17 March 2014

IEEE .NET PROJECTS

 IEEE .NET PROJECTS



IEEE .NET PROJECTS
IEEE .NET PROJECTS



  • A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks
  • A Distributed Database Architecture for Global Roaming in Next-Generation Mobile Networks
  • A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm

  • A feature selection algorithm based on svm average distance
  • A Formal Framework for Automated Round-trip Software Engineering in Static Aspect Weaving and Transformations
  • A Fusion Approach for Efficient Human Skin Detection
  • A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
  • A New Cell Counting Based Attack Against Tor

  • A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
  • A Personalized Ontology Model For Web Information Gathering
  • A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group

  • A Unified Spectral-Domain Approach for Saliency Detection and Its Application to Automatic Object Segmentation
  • Active Visual Segmentation
  • Alert Based Monitoring of Stock Trading Systems
  • AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
  • An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks
  • An Empirical Study of Test Case Filtering Techniques Based on Exercising Information Flows
  • Analysis of x-means and global k-means using tumor classification
  • Anonymous Query Processing in Road Networks
  • API-Based and Information-Theoretic Metrics for Measuring the Quality of Software Modularization
  • Approximate Entropy-Based Epileptic EEG Detection Using Artificial Neural Networks
  • Automatic Reconfiguration for Large-Scale Reliable Storage Systems
  • Bridging domains using world wide knowledge for transfer learning
  • Bridging Socially-Enhanced Virtual Communities
  • Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
  • Collaborative Sensing to Improve Information Quality for Target Tracking in Wireless Sensor Networks
  • Contrast-Independent Curvilinear Structure Detection in Biomedical Images
  • Cooperative download in vehicular environments - 2012
  • Cross-Layer Design in Multihop Wireless Networks
  • Data Integrity Proofs In Cloud Storage
  • Data leakage detection
  • Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive Click Points
  • Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
  • Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs
  • Digital Image hiding using curve let transform
  • Digital Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings
  • Digital Image Tracing by Sequential Multiple Watermarking
  • Discovering Characterizations of the Behavior of Anomalous Sub-populations
  • Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups
  • Distributed Throughput Maximization in Wireless Networks via Random Power Allocation
  • Dynamic Authentication for Cross-Realm SOA-Based Business Processes
  • Efficient Audit Service Outsourcing for Data Integrity in Clouds snifer
  • Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries
  • Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
  • Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud
  • Exploring Application-Level Semantics For Data Compression
  • Fast Algorithms for Resource Allocation in Cellular Networks
  • FiVaTech Page-Level Web Data Extraction from Template Pages
  • Fusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
  • Fuzzy based ant miner algorithm in datamining for hepatitiss
  • Fuzzy Keyword Search over Encrypted Data in Cloud Computing
  • Image Retargeting
  • Image Super resolution Using Support Vector Regression
  • Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
  • Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
  • Integration Of Sound Signature In Graphical Password Authentication System
  • Intrusion detection: An Energy efficient approach in heterogeneous WSN
  • Learning and Matching of Dynamic Shape Manifolds for Human Action recognition
  • Load Balancing Multipath Switching System with Flow Slice
  • Localized Multicast Efficient And Distributed Replica Detection In Large-Scale Sensor Networks
  • Maximizing Rewards in Wireless Networks with Energy
  • Monitoring Service Systems From A Language-Action Perspective - 2011
  • Multicast Multi-path Power Efficient Routing in Mobile ADHOC Networks
  • Multiple Exposure Fusion for High Dynamic Range Image Acquisition Image Processing
  • NABS Novel Approaches for Biometric Systems
  • Network Assisted Mobile Computing with Optimal Uplink Query Processing
  • On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow Probability
  • One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases
  • Optical Character Recognition for printed Tamil text using Unicode
  • Optimal Service Pricing For A Cloud Cache
  • Outsourced Similarity Search on Metric Data Assets
  • PDE-Based Enhancement of Color Images in RGB Space
  • Privacy Preserving public Auditing Data for data storage security in Cloud computing
  • Publishing Search Logs – A Comparative Study Of Privacy Guarantees
  • Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
  • Risk-Aware Mitigation for MANET Routing Attacks
  • S4 Small State and Small Stretch Compact Routing Protocol for Large Static Wireless Networks
  • Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
  • Secure Client-Side ST-DM Watermark Embedding
  • Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes
  • Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
  • Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
  • Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
  • Session scheduling algorithm of grid computing
  • Slow Adaptive OFDMA Systems Through Chance Constrained Programming
  • Software Effort, Quality, and Cycle Time: A Study of CMM Level 5 Projects
  • SPOC A Secure and Privacy preserving Opportunistic Computing Framework for Mobile Healthcare Emergency
  • Target Tracking Using a Joint Acoustic Video System
  • The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
  • The role of context in image interpretation
  • The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
  • The World In A Nutshell: Concise Range Queries
  • Toward Optimal Network Fault Correction in Externally Managed Overlay Networks
  • VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
  • View-invariant action recognition based on Artificial Neural Networks
  • WSCE: A Crawler Engine for Large-Scale Discovery of Web Services






ENJOY:IEEE .NET PROJECTS

No comments:

Post a Comment