Tuesday, August 28, 2012

IEEE ANDROID PROJECTS 2012


1.         Safe Driving Using Mobile Phones    IEEE TRANSACTIONS       ON INTELLIGENT            TRANSPORTATION SYSTEMS     2012/ANDROID

2.         EduPad — A tablet based educational system for improving adult literacy in rural India    IEEE (CONFERENCE)       2012/ANDROID

3.         Designing Mobile Language Learning Applications Using Multimedia: Implications from a Small-scale Prospective Learner Study      IEEE (CONFERENCE)         2012/ANDROID

4.         Research and design of chatting room system based on Android Bluetooth            IEEE (CONFERENCE)            2012/ANDROID

5.         Design and Implementation of Improved Authentication System for Android Smartphone Users  IEEE (CONFERENCE)       2012/ANDROID

6.         Learn to Personalized Image Search from the Photo Sharing Websites         IEEE TRANSACTIONS ON MULTIMEDIA           2012/ANDROID

7.         SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency      PARALLEL AND DISTRIBUTED SYSTEMS      2012/ANDROID

8.         The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks    PARALLEL AND DISTRIBUTED SYSTEMS  2012/ANDROID

9.         Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption      CLOUD COMPUTING, PARALLEL AND DISTRIBUTED SYSTEMS 2012/ANDROID

10.       Payments for Outsourced Computations        PARALLEL AND DISTRIBUTED SYSTEMS            2012/ANDROID

11.       Outsourced Similarity Search on Metric Data Assets            KNOWLEDGE AND DATA ENGINEERING            2012/ANDROID

12.       A Query Formulation Language for the Data Web    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING        2012/ANDROID

13.       PMSE A Personalized Mobile Search Engine            IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING        2012/ANDROID

14.       Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators            KNOWLEDGE AND DATA ENGINEERING      2012/ANDROID

15.       Ranking Model Adaptation for Domain-Specific Search      KNOWLEDGE AND DATA ENGINEERING            2012/ANDROID

16.       DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS      SECURE COMPUTING (IJCE)       2012/ANDROID

17.       Efficient audit service outsourcing for data integrity in clouds         CLOUD COMPUTING (ELSEVIER)            2012/ANDROID

18.       Ensuring Distributed Accountability for Data Sharing in the Cloud CLOUD COMPUTING, DEPENDABLE AND SECURE COMPUTING     2012/ANDROID

19.       Network Assisted Mobile Computing Optimal Uplink Query Processing     MOBILE COMPUTING            2012/ANDROID

20.       Tram location and route navigation system using smartphone           IEEE (CONFERENCE)            2012/ANDROID

DOWNLOAD BASE PAPERS





IEEE NS2 PROJECTS 2012


1. A Statistical Mechanics-Based Framework to Analyze Ad Hoc Networks with Random Access MOBILE COMPUTING 2012 / NS2

2. A Trigger Identification Service for Defending Reactive Jammers in WSN MOBILE COMPUTING 2012 / NS2

3. Capacity Scaling of Wireless Ad Hoc Networks: Shannon Meets Maxwell MOBILE COMPUTING 2012 / NS2

4. Connectivity of Multiple Cooperative Cognitive Radio Ad Hoc Networks MOBILE COMPUTING 2012 / NS2

5. CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks MOBILE COMPUTING 2012 / NS2

6. DSDMAC: Dual Sensing Directional MAC Protocol for Ad Hoc Networks with Directional Antennas MOBILE COMPUTING 2012 / NS2

7. FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks MOBILE COMPUTING 2012 / NS2

8. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network MOBILE COMPUTING 2012 / NS2

9. Improving QoS in High-Speed Mobility Using Bandwidth Maps MOBILE COMPUTING 2012 / NS2

10. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions MOBILE COMPUTING 2012 / NS2

11. Maximal Scheduling in Wireless Ad Hoc Networks with Hyper graph Interference Models VECHICULAR TECHNOLOGIES 2012 / NS2

12. TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks MOBILE COMPUTING 2012 / NS2

13. Throughput and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels NETWORKING 2012 / NS2

14. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012 / NS2

DOWNLOAD BASE PAPERS

IEEE MATLAB PROJECTS 2012


1. A Block-Based Pass-Parallel SPIHT Algorithm IMAGE PROCESSING 2012/MATLAB

2. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IMAGE PROCESSING 2012/MATLAB

3. A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/MATLAB

4. A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability IMAGE PROCESSING 2012/MATLAB

5. A Semisupervised Segmentation Model for Collections of Images IMAGE PROCESSING 2012/MATLAB

6. Active Visual Segmentation IMAGE PROCESSING 2012/MATLAB

7. An Energy Efficient Algrithm Based on LEACH Protocol NETWORKING (CONFERENCE) 2012/MATLAB

8. An Energy-Based Model for the Image Edge-Histogram Specification Problem IMAGE PROCESSING 2012/MATLAB

9. An Extended Visual Cryptography Algorithm for General Access Structures IMAGE PROCESSING 2012/MATLAB

10. Blind Adaptive Sampling of Images IMAGE PROCESSING 2012/MATLAB

11. Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition and Image Matching IMAGE PROCESSING 2012/MATLAB

12. Fast Wavelet-Based Image Characterization for Highly Adaptive Image Retrieval IMAGE PROCESSING 2012/MATLAB

13. Image Reduction Using Means on Discrete Product Lattices IMAGE PROCESSING 2012/MATLAB

14. Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/MATLAB

15. Improved Image Recovery From Compressed Data Contaminated With Impulsive Noise IMAGE PROCESSING 2012/MATLAB

16. Low Distortion Transform for Reversible Watermarking IMAGE PROCESSING 2012/MATLAB

17. Outdoor Scene Image Segmentation based on Background Recognition and Perceptual Organization IMAGE PROCESSING 2012/MATLAB

18. Performance Analysis of a Block-Neighborhood- Based Self- Recovery Fragile Watermarking Scheme IMAGE PROCESSING 2012/MATLAB

19. Preconditioning for Edge-Preserving Image Super Resolution IMAGE PROCESSING 2012/MATLAB

20. Riverbed: A Novel User-Steered Image Segmentation Method Based on Optimum Boundary Tracking IMAGE PROCESSING 2012/MATLAB

21. Robust Watermarking of Compressed and Encrypted JPEG 2000 images IMAGE PROCESSING 2012/MATLAB

22. Segmentation of Stochastic Images with a Stochastic Random Walker Method IMAGE PROCESSING 2012/MATLAB

23. Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval. IMAGE PROCESSING 2012/MATLAB

24. Sparse Color Interest Points for Image Retrieval and Object Categorization IMAGE PROCESSING 2012/MATLAB

25. Spatially Adaptive Block-Based Super-Resolution IMAGE PROCESSING 2012/MATLAB

26. Principal Visual Word Discovery for Automatic License Plate Detection IMAGE PROCESSING 2012/MATLAB

DOWNLOAD BASE PAPERS



https://rapidshare.com/files/4276624947/MATLAB.rar

IEEE JAVA PROJECTS 2012


1. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding CLOUD COMPUTING 2012/JAVA

2. Cloud Computing Security: From Single to Multi-Clouds CLOUD COMPUTING 2012/JAVA

3. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage CLOUD COMPUTING 2012/JAVA

4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing CLOUD COMPUTING 2012/JAVA

5. Outsourced Similarity Search on Metric Data Assets CLOUD COMPUTING 2012/JAVA

6. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption CLOUD COMPUTING 2012/JAVA

7. Toward Secure and Dependable Storage Services in Cloud Computing CLOUD COMPUTING 2012/JAVA

8. Clustering with Multi-viewpoint-Based Similarity Measure KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

9. Efficient Extended Boolean Retrieval KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

10. Ranking Model Adaptation for Domain-Specific Search KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

11. Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

12. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA

13. Payments for Outsourced Computations PARALLEL AND DISTRIBUTED SYSTEMS 2012/JAVA

14. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks NETWORKING 2012/JAVA

15. Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters NETWORKING 2012/JAVA

16. Independent Directed Acyclic Graphs for Resilient Multipath Routing NETWORKING 2012/JAVA

17. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring NETWORKING 2012/JAVA

18. Privacy- and Integrity-Preserving Range Queries in Sensor Networks NETWORKING 2012/JAVA

19. RIHT: A Novel Hybrid IP Traceback Scheme NETWORKING 2012/JAVA

20. Router Support for Fine-Grained Latency Measurements NETWORKING 2012/JAVA

21. A Stochastic Model of Multi-virus Dynamics SECURE COMPUTING 2012/JAVA

22. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING 2012/JAVA

23. Detecting and Resolving Firewall Policy Anomalies SECURE COMPUTING 2012/JAVA

24. Detecting Spam Zombies by Monitoring Outgoing Messages SECURE COMPUTING 2012/JAVA

25. On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks SECURE COMPUTING 2012/JAVA

26. Online Modeling of Proactive Moderation System for Auction Fraud Detection SECURE COMPUTING 2012/JAVA

27. Packet-Hiding Methods for Preventing Selective Jamming Attacks SECURE COMPUTING 2012/JAVA

28. Risk-Aware Mitigation for MANET Routing Attacks SECURE COMPUTING 2012/JAVA

29. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/JAVA

30. Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers IMAGE PROCESSING 2012/JAVA

31. Scalable Coding of Encrypted Images IMAGE PROCESSING 2012/JAVA

32. Learn to Personalized Image Search from the Photo Sharing Websites MULTIMEDIA 2012/JAVA

33. Fast Data Collection in Tree-Based Wireless Sensor Networks MOBILE COMPUTING 2012/JAVA

34. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/JAVA

35. Bootstrapping Ontologies for Web Services SERVICE COMPUTING (WEB SERVICE) 2012/JAVA

36. Handwritten Chinese Text Recognition by Integrating Multiple Contexts IMAGE PROCESSING 2012/JAVA

37. Adaptive Membership Functions for Hand-Written Character Recognition by Voronoi-based Image Zoning IMAGE PROCESSING 2012/JAVA

38. Semantics-Based Automated Service Discovery WEB SERVICE (SOA) 2012/JAVA

39. Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/JAVA

40. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/JAVA

41. Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks MOBILE COMPUTING 2012/JAVA


DOWNLOAD BASE PAPERS


https://rapidshare.com/files/3188434777/JAVA.rar

Monday, August 27, 2012

IEEE DOTNET PROJECTS 2012



1 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding.
CLOUD COMPUTING 2012/.NET

2 Cloud Computing Security From Single to Multi-Clouds.CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET

3 Enhanced Data Security Model for Cloud Computing CLOUD COMPUTING (IEEE CONFERENCE) 2012/.NET

4 Ensuring Distributed Accountability for Data Sharing in the Cloud. CLOUD COMPUTING 2012/.NET

5 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing. CLOUD COMPUTING 2012/.NET

6 Outsourced Similarity Search on Metric Data Assets.CLOUD COMPUTING 2012/.NET

7 Privacy-Preserving Public Auditing for Secure Cloud Storage CLOUD COMPUTING 2012/.NET

8 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption. CLOUD COMPUTING 2012/.NET

9 Toward Secure and Dependable Storage Services in Cloud Computing. CLOUD COMPUTING 2012/.NET

10 A Query Formulation Language for the data web KNOWLEDGE AND DATA ENGINEERING 2012/.NET

11 Creating Evolving User Behavior Profiles Automatically KNOWLEDGE AND DATA ENGINEERING 2012/.NET

12 D-Cache: Universal Distance Cache for Metric Access Methods KNOWLEDGE AND DATA ENGINEERING 2012/.NET

13 DDD: A New Ensemble Approach for Dealing with Concept Drift KNOWLEDGE AND DATA ENGINEERING 2012/.NET

14 Efficient Computation of Range Aggregates against Uncertain Location-Based Queries KNOWLEDGE AND DATA ENGINEERING
2012/.NET

15 Efficient Fuzzy Type-Ahead Search in XML Data KNOWLEDGE AND DATA ENGINEERING 2012/.NET

16 Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis KNOWLEDGE AND DATA ENGINEERING 2012/.NET

17 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques KNOWLEDGE AND DATA ENGINEERING 2012/.NET

18 Measuring the Sky: On Computing Data Cubes via Skylining the Measures KNOWLEDGE AND DATA ENGINEERING 2012/.NET

19 Mining Web Graphs for Recommendations KNOWLEDGE AND DATA ENGINEERING 2012/.NET

20 Organizing User Search Histories KNOWLEDGE AND DATA ENGINEERING 2012/.NET

21 Publishing Search Logs—A Comparative Study of Privacy Guarantees KNOWLEDGE AND DATA ENGINEERING 2012/.NET

22 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators KNOWLEDGE AND DATA ENGINEERING 2012/.NET

23 ROAD: A New Spatial Object Search Framework for Road Networks KNOWLEDGE AND DATA ENGINEERING 2012/.NET

24 Scalable Learning of Collective Behavior KNOWLEDGE AND DATA ENGINEERING 2012/.NET

25 Slicing: A New Approach for Privacy Preserving Data Publishing KNOWLEDGE AND DATA ENGINEERING 2012/.NET

26 Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings KNOWLEDGE AND DATA ENGINEERING 2012/.NET

27 Bounding the Impact of Unbounded Attacks in Stabilization PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

28 Catching Packet Droppers and Modifiers in Wireless Sensor Networks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

29 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

30 A New Cell-Counting-Based Attack Against Tor NETWORKING 2012/.NET

31 Optimal Source-Based Filtering of Malicious Traffic NETWORKING 2012/.NET

32 Topology Control in Mobile AD-HOC Networks with Cooperative Communications NETWORKING (IEEE JOURNAL) 2012/.NET

33 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network SECURE COMPUTING (IJCA) 2012/.NET

34 Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs SECURE COMPUTING  2012/.NET

35 ES-MPICH2: A Message Passing Interface with Enhanced Security SECURE COMPUTING 2012/.NET

36 On the Security and Efficiency of Content Distribution via Network Coding SECURE COMPUTING 2012/.NET

37 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework forMobile-Healthcare Emergency SECURE COMPUTING 2012/.NET

38 A Novel Data Embedding Method Using Adaptive Pixel Pair Matching IMAGE PROCESSING 2012/.NET

39 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group IMAGE PROCESSING 2012/.NET

40 Active Visual Segmentation IMAGE PROCESSING 2012/.NET

41 Image Segmentation Based on the Poincaré Map Method IMAGE PROCESSING 2012/.NET

42 K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER IMAGE PROCESSING (IJEST) 2012/.NET

43 Multiple Exposure Fusion for High Dynamic Range Image Acquisition IMAGE PROCESSING 2012/.NET

44 Semi-supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IMAGE PROCESSING 2012/.NET

45 Smile Detection by Boosting Pixel Differences IMAGE PROCESSING 2012/.NET

46 View-invariant action recognition based on Artificial Neural Networks IMAGE PROCESSING 2012/.NET

47 Cooperative Download in Vehicular Environments MOBILE COMPUTING 2012/.NET

48 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation MOBILE COMPUTING 2012/.NET

49 Network Assisted Mobile Computing with Optimal Uplink Query Processing MOBILE COMPUTING 2012/.NET

50 Protecting Location Privacy in Sensor Networks against a Global Eavesdropper MOBILE COMPUTING 2012/.NET

51 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks MOBILE COMPUTING 2012/.NET

52 Revisiting Defenses against Large-Scale Online Password Guessing Attacks SECURE COMPUTING 2012/.NET

53 A Novel Anti phishing framework based on visual cryptography IMAGE PROCESSING 2012/.NET

54 AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies NETWORKING (JOURNAL) 2012/.NET

55 Robust Face-Name Graph Matching for Movie Character Identification MULTIMEDIA 2012/.NET

56 Low-Complexity Compression Method for Hyperspectral Images Based on Distributed Source Coding IMAGE PROCESSING 2012/.NET

57 Balancing the Trade-Offs between Query Delay and Data Availability in MANETs PARALLEL AND DISTRIBUTED SYSTEMS 2012/.NET

58 Efficient Multidimensional Fuzzy Search for Personal Information Management Systems KNOWLEDGE AND DATA ENGINEERING 2012/.NET

59 Robustness of Offline Signature Verification Based on Gray Level Features IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY
2012/.NET

60 Controllable SecureWatermarking Technique for Tradeoff Between Robustness and Security IMAGE PROCESSING/ INFORMATION FORENSICS & SECURITY 2012/.NET

61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET

61 A Discriminative Model of Motion and Cross Ratio for View- Invariant Action Recognition IMAGE PROCESSING 2012/.NET

62 Towards Accurate Mobile Sensor Network Localization in Noisy Environments MOBILE COMPUTING 2012/.NET

63 Persuasive Cued Click-Points: Design, Implementation, and Evaluation of a Knowledge-Based Authentication Mechanism SECURE COMPUTING 2012/.NET

64 Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning LEARNING TECHNOLOGIES 2012/.NET

65 Multi-biometric Cryptosystems Based on Feature-Level Fusion IMAGE PROCESSING 2012/.NET

Download Base papers:

https://rapidshare.com/files/2544105175/Dot NET.rar

Monday, October 3, 2011

IEEE 2012 Base Papers