.
Sunday, September 2, 2012
Tuesday, August 28, 2012
IEEE ANDROID PROJECTS 2012
1. Safe Driving Using Mobile Phones IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2012/ANDROID
2. EduPad — A tablet based educational system for improving adult literacy in rural India IEEE (CONFERENCE) 2012/ANDROID
3. Designing Mobile Language Learning Applications Using Multimedia: Implications from a Small-scale Prospective Learner Study IEEE (CONFERENCE) 2012/ANDROID
4. Research and design of chatting room system based on Android Bluetooth IEEE (CONFERENCE) 2012/ANDROID
5. Design and Implementation of Improved Authentication System for Android Smartphone Users IEEE (CONFERENCE) 2012/ANDROID
6. Learn to Personalized Image Search from the Photo Sharing Websites IEEE TRANSACTIONS ON MULTIMEDIA 2012/ANDROID
7. SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID
8. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID
9. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING, PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID
10. Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID
11. Outsourced Similarity Search on Metric Data Assets KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID
12. A Query Formulation Language for the Data Web IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID
13. PMSE A Personalized Mobile Search Engine IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID
14. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID
15. Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/ANDROID
16. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS SECURE COMPUTING (IJCE) 2012/ANDROID
17. Efficient audit service outsourcing for data integrity in clouds CLOUD COMPUTING (ELSEVIER) 2012/ANDROID
18. Ensuring Distributed Accountability for Data Sharing in the Cloud CLOUD COMPUTING, DEPENDABLE AND SECURE COMPUTING 2012/ANDROID
19. Network Assisted Mobile Computing Optimal Uplink Query Processing MOBILE COMPUTING 2012/ANDROID
20. Tram location and route navigation system using smartphone IEEE (CONFERENCE) 2012/ANDROID
DOWNLOAD BASE PAPERS
IEEE NS2 PROJECTS 2012
1. A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access MOBILE COMPUTING 2012 / NS2
2. A Trigger Identification Service for Defending Reactive Jammers in WSN MOBILE COMPUTING 2012 / NS2
3. Capacity Scaling of Wireless Ad Hoc Networks: Shannon Meets Maxwell MOBILE COMPUTING 2012 / NS2
4. Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks MOBILE COMPUTING 2012 / NS2
5. CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks MOBILE COMPUTING 2012 / NS2
6. DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas MOBILE COMPUTING 2012 / NS2
7. FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks MOBILE COMPUTING 2012 / NS2
8. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network MOBILE COMPUTING 2012 / NS2
9. Improving QoS in High-Speed Mobility Using Bandwidth Maps MOBILE COMPUTING 2012 / NS2
10. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions MOBILE COMPUTING 2012 / NS2
11. Maximal Scheduling in Wireless Ad Hoc Networks with Hyper graph Interference Models VECHICULAR TECHNOLOGIES 2012 / NS2
12. TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks MOBILE COMPUTING 2012 / NS2
13. Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels NETWORKING 2012 / NS2
14. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012 / NS2
DOWNLOAD BASE PAPERS
IEEE MATLAB PROJECTS 2012
1. A Block-Based Pass-Parallel SPIHT Algorithm IMAGE PROCESSING 2012/MATLAB
2. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IMAGE PROCESSING 2012/MATLAB
3. A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/MATLAB
4. A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability IMAGE PROCESSING 2012/MATLAB
5. A Semisupervised Segmentation Model for Collections of Images IMAGE PROCESSING 2012/MATLAB
6. Active Visual Segmentation IMAGE PROCESSING 2012/MATLAB
7. An Energy Efficient Algrithm Based on LEACH Protocol NETWORKING (CONFERENCE) 2012/MATLAB
8. An Energy-Based Model for the Image Edge-Histogram Specification Problem IMAGE PROCESSING 2012/MATLAB
9. An Extended Visual Cryptography Algorithm for General Access Structures IMAGE PROCESSING 2012/MATLAB
10. Blind Adaptive Sampling of Images IMAGE PROCESSING 2012/MATLAB
11. Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition and Image Matching IMAGE PROCESSING 2012/MATLAB
12. Fast Wavelet-Based Image Characterization for Highly Adaptive Image Retrieval IMAGE PROCESSING 2012/MATLAB
13. Image Reduction Using Means on Discrete Product Lattices IMAGE PROCESSING 2012/MATLAB
14. Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/MATLAB
15. Improved Image Recovery From Compressed Data Contaminated With Impulsive Noise IMAGE PROCESSING 2012/MATLAB
16. Low Distortion Transform for Reversible Watermarking IMAGE PROCESSING 2012/MATLAB
17. Outdoor Scene Image Segmentation based on Background Recognition and Perceptual Organization IMAGE PROCESSING 2012/MATLAB
18. Performance Analysis of a Block-Neighborhood- Based Self- Recovery Fragile Watermarking Scheme IMAGE PROCESSING 2012/MATLAB
19. Preconditioning for Edge-Preserving Image Super Resolution IMAGE PROCESSING 2012/MATLAB
20. Riverbed: A Novel User-Steered Image Segmentation Method Based on Optimum Boundary Tracking IMAGE PROCESSING 2012/MATLAB
21. Robust Watermarking of Compressed and Encrypted JPEG 2000 images IMAGE PROCESSING 2012/MATLAB
22. Segmentation of Stochastic Images with a Stochastic Random Walker Method IMAGE PROCESSING 2012/MATLAB
23. Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval. IMAGE PROCESSING 2012/MATLAB
24. Sparse Color Interest Points for Image Retrieval and Object Categorization IMAGE PROCESSING 2012/MATLAB
25. Spatially Adaptive Block-Based Super-Resolution IMAGE PROCESSING 2012/MATLAB
26. Principal Visual Word Discovery for Automatic License Plate Detection IMAGE PROCESSING 2012/MATLAB
DOWNLOAD BASE PAPERS
https://rapidshare.com/files/4276624947/MATLAB.rar
IEEE JAVA PROJECTS 2012
1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING 2012/JAVA
2. Cloud Computing Security: From Single to Multi-Clouds CLOUD COMPUTING 2012/JAVA
3. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage CLOUD COMPUTING 2012/JAVA
4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing CLOUD COMPUTING 2012/JAVA
5. Outsourced Similarity Search on Metric Data Assets CLOUD COMPUTING 2012/JAVA
6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING 2012/JAVA
7. Toward Secure and Dependable Storage Services in Cloud Computing CLOUD COMPUTING 2012/JAVA
8. Clustering with Multi-viewpoint-Based Similarity Measure KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
9. Efficient Extended Boolean Retrieval KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
10. Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
11. Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
12. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA
13. Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA
14. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks NETWORKING 2012/JAVA
15. Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters NETWORKING 2012/JAVA
16. Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORKING 2012/JAVA
17. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NETWORKING 2012/JAVA
18. Privacy- and Integrity-Preserving Range Queries in Sensor Networks NETWORKING 2012/JAVA
19. RIHT: A Novel Hybrid IP Traceback Scheme NETWORKING 2012/JAVA
20. Router Support for Fine-Grained Latency Measurements NETWORKING 2012/JAVA
21. A Stochastic Model of Multi-virus Dynamics SECURE COMPUTING 2012/JAVA
22. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/JAVA
23. Detecting and Resolving Firewall Policy Anomalies SECURE COMPUTING 2012/JAVA
24. Detecting Spam Zombies by Monitoring Outgoing Messages SECURE COMPUTING 2012/JAVA
25. On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks SECURE COMPUTING 2012/JAVA
26. Online Modeling of Proactive Moderation System for Auction Fraud Detection SECURE COMPUTING 2012/JAVA
27. Packet-Hiding Methods for Preventing Selective Jamming Attacks SECURE COMPUTING 2012/JAVA
28. Risk-Aware Mitigation for MANET Routing Attacks SECURE COMPUTING 2012/JAVA
29. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/JAVA
30. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers IMAGE PROCESSING 2012/JAVA
31. Scalable Coding of Encrypted Images IMAGE PROCESSING 2012/JAVA
32. Learn to Personalized Image Search from the Photo Sharing Websites MULTIMEDIA 2012/JAVA
33. Fast Data Collection in Tree-Based Wireless Sensor Networks MOBILE COMPUTING 2012/JAVA
34. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/JAVA
35. Bootstrapping Ontologies for Web Services SERVICE COMPUTING (WEB SERVICE) 2012/JAVA
36. Handwritten Chinese Text Recognition by Integrating Multiple Contexts IMAGE PROCESSING 2012/JAVA
37. Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning IMAGE PROCESSING 2012/JAVA
38. Semantics-Based Automated Service Discovery WEB SERVICE (SOA) 2012/JAVA
39. Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/JAVA
40. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/JAVA
41. Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks MOBILE COMPUTING 2012/JAVA
DOWNLOAD BASE PAPERS
https://rapidshare.com/files/3188434777/JAVA.rar
Monday, August 27, 2012
IEEE DOTNET PROJECTS 2012
1 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
CLOUD COMPUTING 2012/.NET
2 Cloud Computing Security From Single to Multi-Clouds.CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET
3 Enhanced Data Security Model for Cloud Computing CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET
4 Ensuring Distributed Accountability for Data Sharing in the Cloud. CLOUD COMPUTING 2012/.NET
5 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. CLOUD COMPUTING 2012/.NET
6 Outsourced Similarity Search on Metric Data Assets.CLOUD COMPUTING 2012/.NET
7 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING 2012/.NET
8 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. CLOUD COMPUTING 2012/.NET
9 Toward Secure and Dependable Storage Services in Cloud Computing. CLOUD COMPUTING 2012/.NET
10 A Query Formulation Language for the data web KNOWLEDGE AND DATA ENGINEERING 2012/.NET
11 Creating Evolving User Behavior Profiles Automatically KNOWLEDGE AND DATA ENGINEERING 2012/.NET
12 D-Cache: Universal Distance Cache for Metric Access Methods KNOWLEDGE AND DATA ENGINEERING 2012/.NET
13 DDD: A New Ensemble Approach for Dealing with Concept Drift KNOWLEDGE AND DATA ENGINEERING 2012/.NET
14 Efficient Computation of Range Aggregates against Uncertain Location-Based Queries KNOWLEDGE AND DATA ENGINEERING
2012/.NET
15 Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/.NET
16 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis KNOWLEDGE AND DATA ENGINEERING 2012/.NET
17 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques KNOWLEDGE AND DATA ENGINEERING 2012/.NET
18 Measuring the Sky: On Computing Data Cubes via Skylining the Measures KNOWLEDGE AND DATA ENGINEERING 2012/.NET
19 Mining Web Graphs for Recommendations KNOWLEDGE AND DATA ENGINEERING 2012/.NET
20 Organizing User Search Histories KNOWLEDGE AND DATA ENGINEERING 2012/.NET
21 Publishing Search Logs—A Comparative Study of Privacy Guarantees KNOWLEDGE AND DATA ENGINEERING 2012/.NET
22 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING 2012/.NET
23 ROAD: A New Spatial Object Search Framework for Road Networks KNOWLEDGE AND DATA ENGINEERING 2012/.NET
24 Scalable Learning of Collective Behavior KNOWLEDGE AND DATA ENGINEERING 2012/.NET
25 Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/.NET
26 Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings KNOWLEDGE AND DATA ENGINEERING 2012/.NET
27 Bounding the Impact of Unbounded Attacks in Stabilization PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
28 Catching Packet Droppers and Modifiers in Wireless Sensor Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
29 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
30 A New Cell-Counting-Based Attack Against Tor NETWORKING 2012/.NET
31 Optimal Source-Based Filtering of Malicious Traffic NETWORKING 2012/.NET
32 Topology Control in Mobile AD-HOC Networks with Cooperative Communications NETWORKING (IEEE JOURNAL) 2012/.NET
33 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network SECURE COMPUTING (IJCA) 2012/.NET
34 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/.NET
35 ES-MPICH2: A Message Passing Interface with Enhanced Security SECURE COMPUTING 2012/.NET
36 On the Security and Efficiency of Content Distribution via Network Coding SECURE COMPUTING 2012/.NET
37 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency SECURE COMPUTING 2012/.NET
38 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/.NET
39 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/.NET
40 Active Visual Segmentation IMAGE PROCESSING 2012/.NET
41 Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/.NET
42 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER IMAGE PROCESSING (IJEST) 2012/.NET
43 Multiple Exposure Fusion for High Dynamic Range Image Acquisition IMAGE PROCESSING 2012/.NET
44 Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IMAGE PROCESSING 2012/.NET
45 Smile Detection by Boosting Pixel Differences IMAGE PROCESSING 2012/.NET
46 View-invariant action recognition based on Artificial Neural Networks IMAGE PROCESSING 2012/.NET
47 Cooperative Download in Vehicular Environments MOBILE COMPUTING 2012/.NET
48 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation MOBILE COMPUTING 2012/.NET
49 Network Assisted Mobile Computing with Optimal Uplink Query Processing MOBILE COMPUTING 2012/.NET
50 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/.NET
51 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks MOBILE COMPUTING 2012/.NET
52 Revisiting Defenses against Large-Scale Online Password Guessing Attacks SECURE COMPUTING 2012/.NET
53 A Novel Anti phishing framework based on visual cryptography IMAGE PROCESSING 2012/.NET
54 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies NETWORKING (JOURNAL) 2012/.NET
55 Robust Face-Name Graph Matching for Movie Character Identification MULTIMEDIA 2012/.NET
56 Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding IMAGE PROCESSING 2012/.NET
57 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET
58 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems KNOWLEDGE AND DATA ENGINEERING 2012/.NET
59 Robustness of Offline Signature Verification Based on Gray Level Features IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY
2012/.NET
60 Controllable SecureWatermarking Technique for Tradeoff Between Robustness and Security IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY 2012/.NET
61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET
61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET
62 Towards Accurate Mobile Sensor Network Localization in Noisy Environments MOBILE COMPUTING 2012/.NET
63 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism SECURE COMPUTING 2012/.NET
64 Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning LEARNING TECHNOLOGIES 2012/.NET
65 Multi-biometric Cryptosystems Based on Feature-Level Fusion IMAGE PROCESSING 2012/.NET
Download Base papers:
https://rapidshare.com/files/2544105175/Dot NET.rarMonday, October 3, 2011
Subscribe to:
Posts (Atom)