For Latest Version Of This Blog
Click Below Link
www.finalprojects2030.net

Monday, May 9, 2011

IEEE Final Year Projects Titles 2010 -2011 @ Brainrich Technology 10 months ago Email Favorite Download Embed More… Flash Player 9 (or above) is needed to view presentations. We have detected that you do not have it on your computer. To install it, go here. × Like this presentation? 0 comments Embed Video Subscribe to comments Post Comment IEEE Final Year Projects Titles 2010 -2011 @ Brainrich Technology - Document Transcript

  1. IEEE / SOFTWARE PROJECTS In various Domains JAVA * J2EE * J2ME Latest Projects, 2008, 2009, 2010 Our Service Address 6/1, Selvanaayaki Complex1st Floor, Gokulae Street, Ramnagar, Coimbatore- 641009. Mobile: 9894604623 Phone: 0422-4377414 Mai : info@brainrichtech.com Web : www.brainrichtech.com
  2. We are offering IEEE & Non IEEE Projects In various Domains including IEEE Projects on Image Processing IEEE Projects on Knowledge and Data Mining IEEE Projects on Networking IEEE Projects on Artificial Intelligence IEEE Projects on Audio and Video Processing IEEE Projects on Pattern Analysis & Machine Intelligence IEEE Projects on Multimedia IEEE Projects on Parallel and Distributed Systems IEEE Projects on Mobile Computing IEEE Projects on Software Engineering IEEE Projects on Information Forensics and Security IEEE Projects on Dependable and Secure Computing IEEE Projects on Systems, Man & Cybernetics IEEE Projects on Computers IEEE Projects on Learning Technologies
  3. PROJECT SUPPORTS & DELIVERABLES  Project Abstract  IEEE Paper  PPT / Review Details  Project Report  Working Procedure/Screen Shots  Materials & Books in CD  Project Certification
  4. TECHNOLOGY : JAVA DOMAIN : IEEE DIGITAL IMAGE PROCESSING S.NO CODE PROJECT TITLE YEAR 01 IP 01 Multi-body Structure-and-Motion Segmentation 2010 by Branch-and-Bound Model Selection 02 IP 02 Sliding-Window Raptor Codes for Efficient 2010 Scalable Wireless Video Broadcasting with Unequal Loss Protection 03 IP 03 Generic Lossless Visible Watermarking—A New 2010 Approach 04 IP 04 Fusing Local Patterns of Gabor Magnitude and 2010 Phase for Face Recognition 05 IP 05 Data Embedding in JPEG Bit stream by Code 2010 Mapping 06 IP 06 Video Segmentation Based on Motion Coherence 2010 of Particles in a Video Sequence 07 IP 07 Adaptive Non separable Wavelet Transform via 2010 Lifting and its Application to Content-Based Image Retrieval 08 IP 08 Multiplicative Noise Removal Using Variable 2010 Splitting and Constrained Optimization 09 IP 09 Watermarking of Free-view Video 2010 10 IP 10 Ultrasound De speckling for Contrast 2010 Enhancement 11 IP 11 A Logarithmic Quantization Index Modulation 2010 for Perceptually Better Data Hiding 12 IP 12 Contourlet-Based Image Watermarking Using 2010 Optimum Detector in a Noisy Environment 13 IP 13 Cooperation Stimulation Strategies for Peer-to- 2010
  5. Peer Wireless Live Video-Sharing Social Networks 14 IP 14 Soft Edge Smoothness Prior for Color Image 2009 Super-Resolution 15 IP 15 A Shearlet Approach to Edge Analysis and 2009 Detection 16 IP 16 Complex Wavelet Structural Similarity: A New 2009 Image Similarity Index 17 IP 17 A Histogram Modification Framework and Its 2009 Application for Image Contrast Enhancement 18 IP 18 Personal Authentication Using Hand Vein 2009 Triangulation and Knuckle Shape 19 IP 19 Huber Fractal Image Compression 2009 20 IP 20 Active Mask Segmentation of Fluorescence 2009 Microscope Images 21 IP 21 Color Texture Segmentation Based on the Modal 2009 Energy of Deformable Surfaces 22 IP 22 Entropy Interpretation of the Logarithmic 2009 Image Processing Model With Application to Contrast Enhancement 23 IP 23 A New Look to Multichannel Blind 2009 Image Deconvolution 24 IP 24 Improved Resolution Scalability for 2009 Bilevel Image Data in JPEG2000 25 IP 25 An Adaptable Image Retrieval System With 2009 Relevance Feedback Using Kernel Machines and Selective Sampling 26 IP 26 A High-Capacity Steganography Scheme for 2009 JPEG2000 Baseline System 27 IP 27 Independent Component Analysis-Based 2008 Background Subtraction for Indoor Surveillance 28 IP 28 Sparse Representation for Color Image 2008 Restoration
  6. 29 IP29 High-Fidelity Data Embedding for Image 2008 Annotation 30 IP30 A New Look to Multi channel Blind Image De- 2008 convolution 31 IP31 Image Segmentation Using Information 2008 Bottleneck Method 32 IP32 A Fast Optimization Transfer Algorithm for 2008 Image In painting in Wavelet Domains 33 IP33 Enhancement of Color Images by Scaling the 2008 DCT Coefficients 34 IP34 Improved Resolution Scalability for Bilevel Image 2008 Data in JPEG2000 35 IP35 A Unified Relevance Feedback Framework for 2008 Web Image Retrieval 36 IP36 Optimal Spread Spectrum Watermark 2008 Embedding via a Multi step Feasibility Formulation 37 IP37 Watermarking of Co lour Images in the DCT 2008 Domain Using Y Channel 38 IP38 A Robust Image Encryption Scheme using State- 2008 Feedback Control 39 IP39 Color Image Retrieval Using M-Band Wavelet 2008 Transform Based Color-Texture Feature 40 IP40 A Histogram Modification Framework and Its 2008 Application for Image Contrast Enhancement
  7. TECHNOLOGY : JAVA DOMAIN : IEEE KNOWLEDGE AND DATA MINING S.NO CODE PROJECT TITLE YEAR 01 KD 01 MILD: Multiple-Instance Learning via 2010 Disambiguation 02 KD 02 LIGHT: A Query-Efficient Yet Low-Maintenance 2010 Indexing Scheme over DHTs 03 KD 03 Density Conscious Subspace Clustering for High- 2010 Dimensional Data 04 KD 04 Dynamic Dissimilarity Measure for Support- 2010 Based Clustering 05 KD 05 Efficient Algorithm for Localized Support Vector 2010 Machine 06 KD 06 PAM: An Efficient and Privacy-Aware 2010 Monitoring Framework for Continuously Moving Objects 07 KD 07 ViDE: A Vision-Based Approach for Deep Web 2010 Data Extraction 08 KD 08 FiVaTech: Page-Level Web Data Extraction from 2010 Template Pages 09 KD 09 Automatic Ontology Matching via Upper 2010 Ontologies: A Systematic Evaluation 10 KD 10 Knowledge-Based Interactive Postmining of 2010 Association Rules Using Ontologies 11 KD 11 Modeling Image Data for Effective Indexing and 2009 Retrieval in Large General Image Databases 12 KD 12 Olex: Effective Rule Learning for Text 2009 Categorization 13 KD 13 Towards Suspicious Behavior Discovery in Video 2009 Surveillance System
  8. 14 KD 14 A Relation-Based Page Rank Algorithm for 2009 Semantic Web Search Engines 15 KD 15 Learning Image-Text Associations 2009 16 KD 16 A Framework for Clustering 2009 Concept-Drifting Categorical Data 17 KD 17 Communication Perspective on Automatic 2009 Text Categorization 18 KD 18 Predicting Missing Items in Shopping Carts 2009 19 KD 19 Exact Knowledge Hiding through Database 2009 Extension 20 KD 20 Fast Query Point Movement Techniques for 2009 Large CBIR Systems 21 KD 21 Evaluating the Effectiveness of Personalized Web 2009 Search 22 KD 22 Similarity-Profiled Temporal Association Mining 2009 23 KD 23 Batch Mode Active Learning with Applications to 2009 Text Categorization and Image Retrieval 24 KD 24 Enhancing Learning Objects with an Ontology- 2009 Based Memory 25 KD 25 Using Association Rule Mining to Improve 2008 Semantic Web Services Composition Performance 26 KD 26 Biometric Authentication for Border Control 2008 Applications 27 KD 27 Desktop search in the intranet with integrated 2008 desktop search engines 28 KD 28 A Least Grade Page Replacement Algorithm for 2008 Web Cache Optimization
  9. TECHNOLOGY : JAVA DOMAIN : IEEE NETWORKING S.NO CODE PROJECT TITLE YEAR 01 NS 01 Broadcasting Video Streams Encoded With 2010 Arbitrary Bit Rates in Energy-Constrained Mobile TV Networks 02 NS 02 S4: Small State and Small Stretch Compact 2010 Routing Protocol for Large Static Wireless Networks 03 NS 03 Rate Control with Pair wise Intersession Network 2010 Coding 04 NS 04 Equilibrium of Heterogeneous Congestion 2010 Control: Optimality and Stability 05 NS 05 Inside the Permutation-Scanning Worms: 2010 Propagation Modeling and Analysis 06 NS 06 Joint Sink Mobility and Routing to Maximize the 2010 Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility 07 NS 07 SybilLimit: A Near-Optimal Social Network 2010 Defense Against Sybil Attacks 08 NS 08 2010 A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks 09 NS 09 Upgrading Mice to Elephants: Effects and End- 2010 Point Solutions 10 NS 10 Distributed Algorithms for Minimum Cost 2010 Multicast With Network Coding 11 NS 11 Delay Analysis for Wireless Networks With Single 2010 Hop Traffic and General Interference Constraints 12 NS 12 Constrained Relay Node Placement in Wireless 2010 Sensor Networks: Formulation and
  10. Approximations 13 NS 13 Efficient and Dynamic Routing Topology 2010 Inference From End-to-End Measurements 14 NS 14 Provably Secure Nested One-Time Secret 2010 Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications 15 NS 15 Spatio-Temporal Network Anomaly Detection by 2009 Assessing Deviations of Empirical Measures 16 NS 16 Monitoring the Application-Layer DDoS Attacks 2009 for Popular Websites 17 NS 17 Multiple Routing Configurations for Fast 2009 IP Network Recovery 18 NS 18 Improving Locality of Bit Torrent with ISP 2009 Cooperation 19 NS 19 PRIME: Peer-to-Peer Receiver-Driven Mesh- 2009 Based Streaming 20 NS 20 A Simple and Efficient Hidden Markov Model 2009 Scheme for Host-Based Anomaly Intrusion Detection 21 NS 21 Plexus: A Scalable Peer-to-Peer Protocol Enabling 2009 Efficient Subset Search 22 NS 22 Capturing Router Congestion and Delay 2009 23 NS 23 Node Isolation Model and Age-Based Neighbor 2009 Selection in Unstructured P2P Networks 24 NS 24 Residual-Based Estimation of Peer and Link 2009 Lifetimes in P2P Networks 25 NS 25 A Peer-to-Peer Resources Search Algorithm Based 2009 on Small-World Model 26 NS 26 Analysis of Shortest Path Routing for Large Multi- 2009 Hop Wireless Networks 27 NS 27 Multicast Capacity of Wireless Ad Hoc Networks 2009 28 NS 28 Evaluating the Vulnerability of Network Traffic 2009
  11. Using Joint Security and Routing Analysis 29 NS 29 Novel Approach for Computation –Efficient 2009 Rekeying for Multicast Key Distribution 30 NS 30 SIMPS: Using Sociology for Personal Mobility 2009 31 NS 31 DDoS-Shield: DDoS-Resilient Scheduling to 2009 Counter Application Layer Attacks 32 NS 32 Credit Card Fraud Detection Using Hidden 2008 Markov Model 33 NS 33 Encryption Techniques for the Security of Satellite 2008 Images 34 NS34 Modeling Node Capture Attacks in Wireless 2008 Sensor Networks 35 NS35 Adaptive Data Hiding in Edge Areas of Images 2008 With Spatial LSB Domain Systems 36 NS36 The Design Trade-Offs of Bit Torrent-Like File 2008 Sharing Protocols 37 NS37 Honey pot Scheme for Distributed Denial-of- 2008 Service Attack 38 NS38 Vulnerability of Network Traffic under Node 2008 Capture Attacks using Circuit Theoretic Analysis 39 NS39 P2P File Sharing Software in IPv4/IPv6 Network 2008 40 NS40 Design and Implementation of a SIP-based 2008 Centralized Multimedia Conferencing System 41 NS41 Design and Implementation of Distributed 2008 Firewall System for IPv6 42 NS42 A Hypothesis Testing Approach to Semi-fragile 2008 Watermark Based Authentication 43 NS43 A New RMI Framework for Outdoor Objects 2008 Recognition 44 NS44 Contributory group key exchange in the presence 2008 of malicious participants 45 NS45 Schemes for Evaluating Signal Processing 2008
  12. Properties of Audio Watermarking 46 NS46 Double compression in JPEG images 2008 47 NS47 The Evaluation Report of SHA-256 Crypt Analysis 2008 Hash Function 48 NS48 Jig DFS: A Secure Distributed File System 2008 49 NS49 General access structures in audio cryptography 2008 50 NS50 Improving Locality of Bit Torrent with ISP 2008 Cooperation 51 NS51 Minimizing File Download Time in Stochastic 2008 Peer-to-Peer Networks 52 NS52 Triple DES Algorithm Based Image Watermarking 2008 53 NS53 Bidirectional Routing Abstraction for 2008 Asymmetric Mobile Ad Hoc Networks
  13. TECHNOLOGY : JAVA DOMAIN : IEEE MULTIMEDIA S.NO CODE PROJECT TITLE YEAR 01 M 01 A Stochastic Approach to Image Retrieval Using 2010 Relevance Feedback and Particle Swarm Optimization 02 M 02 Constructing Concept Lexica With Small 2010 Semantic Gaps 03 M 03 An Adaptive Computational Model for Salient 2010 Object Detection 04 M 04 An Adaptive Strategy for Mobile Ad Hoc Media 2010 Streaming 05 M 05 Video Annotation Through Search and Graph 2010 Reinforcement Mining 06 M 06 Image Annotation by Graph-Based Inference 2010 With Integrated Multiple/Single Instance Representations 07 M 07 Network Awareness of P2P Live Streaming 2010 Applications: A Measurement Study 08 M 08 Fine-Granularity Transmission Distortion 2010 Modeling for Video Packet Scheduling Over Mesh Networks 09 M 09 Investigating the Scheduling Sensitivity of P2P 2009 Video Streaming 10 M 10 Coherent Phrase Model for Efficient Image Near 2009 Duplicate Retrieval 11 M 11 Robust Scaling-Based Image Watermarking Using 2009 Maximum-Likelihood Decoder With Optimum Strength Factor 12 M 12 LayerP2P: Using Layered Video Chunks in P2P 2009 Live Streaming 13 M 13 Content-Based Image Retrieval Using Multi 2008
  14. resolution Color and Texture Features 14 M 14 Digital-Invisible-Ink Data Hiding Based on 2008 Spread-Spectrum and Quantization Techniques 15 M 15 Dynamic Resource Allocation for Robust 2008 Distributed Multi-Point Video Conferencing 16 M 16 Improving Robustness of Quantization-Based 2008 Image Watermarking via Adaptive Receiver 17 M 17 Locality-Awareness in BitTorrent-Like P2P 2008 Applications 18 M 18 Watermarking Method Based on Significant 2008 Difference of Wavelet Coefficient Quantization 19 M 19 Analyzing Voice Quality in Popular VoIP 2008 Applications 20 M 20 Image Retrieval With Relevance Feedback Based 2008 on Graph-Theoretic Region Correspondence Estimation 21 M 21 Robust Audio Data Hiding Using Correlated 2008 Quantization With Histogram-Based Detector 22 M 22 Collision Attacks With Budget Constraints on 2008 Key Management Schemes for Secure Multimedia Multicast
  15. TECHNOLOGY : JAVA DOMAIN : IEEE AUDIO,SPEECH & VIDEO PROCESSING S.NO CODE PROJECT TITLE YEAR 01 AV 01 Robust Multiplicative Patchwork Method for 2009 Audio Watermarking 02 AV 02 Scalable Audio Compression at Low Bitrates 2008 03 AV03 Multiparty Voice over IP (M VoIP) Peer-Based 2008 System for Large-Scale Conference Support 04 AV 04 Extracting Question/Answer Pairs In Multi-Party 2008 Meeting 05 AV 05 Hybrid Signal-and-Link-Parametric Speech 2008 Quality Measurement for VoIP Communications 06 AV 06 Rate-Distortion Optimal Video Transport Over 2008 IP Allowing Packets With Bit Errors
  16. TECHNOLOGY : JAVA DOMAIN : IEEE ARTIFICAL INTELLIGENCE S.NO CODE PROJECT TITLE YEAR 01 AI 01 Vehicle Number Plate Recognition Using 2008 Mathematical Morphology and Neural Networks 02 AI 02 Vision-Based Eye Blink Monitoring System for 2008 Human-Computer Interfacing 03 AI 03 Multi-modal Interfaces for Interaction 2008 Communication between Hearing and Visually Impaired Individuals: Problems & Issues 04 AI 04 Embedded Vehicle Control System Based on 2008 Voice Processing Technologies 05 AI 05 A Test bed for Voice-Based Robot Control 2008 06 AI 06 Human Voice Based Wheel Chair Control 2008
  17. TECHNOLOGY : JAVA DOMAIN : IEEE MOBILE COMPUTING S.NO CODE PROJECT TITLE YEAR
  18. 01 MC 01 Energy-Efficient Communication Scheme for 2009 Mobile Ad Hoc Networks 02 MC 02 A Novel Scheduled Power Saving Mechanism for 2009 802.11 Wireless LANs 03 MC 03 MDPF: Minimum Distance Packet Forwarding 2009 for Search Applications in Mobile Ad Hoc Networks 04 MC 04 Mitigation of Control Channel Jamming under 2009 Node Capture Attacks 05 MC 05 Tabu Search Algorithm for Cluster Building 2009 in Wireless Sensor Networks 06 MC 06 An Energy Efficient Communication Scheme for 2009 Mobile AD HOC Networks 07 MC 07 Hybrid routing in clustered DTNs with message 2007 ferrying 08 MC 08 Transmission Power Control in Wireless Ad Hoc 2007 Networks
  19. TECHNOLOGY : JAVA DOMAIN : IEEE INFORMATION AND FORENSICS SECURITY S.NO CODE PROJECT TITLE YEAR 01 IF 01 Edge Adaptive Image Steganography Based on 2010 LSB Matching Revisited 02 IF 02 Blind Authentication: A Secure Crypto-Biometric 2010 Verification Protocol 03 IF 03 Predictive Network Anomaly Detection and 2010 Visualization 04 IF 04 Lossless Data Embedding in Electronic Inks 2010 05 IF 05 SVD-Based Universal Spatial Domain Image 2010 Steganalysis 06 IF 06 Reversible Image Watermarking Using Interpolation 2010 Technique 07 IF 07 MPSteg-Color: Data Hiding Through Redundant 2009 Basis Decomposition 08 IF 08 Temporal Derivative-Based Spectrum and Mel- 2009 Cepstrum Audio Steganalysis 09 IF 09 Halftone Visual Cryptography Via Error 2009 Diffusion 10 IF 10 A Hypothesis Testing Approach to Semifragile 2009 Watermark-Based Authentication 11 IF 11 Unseen Visible Watermarking: A Novel 2009 Methodology for Auxiliary Information Delivery via Visual Contents 12 IF 12 Watermarking Robustness Evaluation Based on 2009 Perceptual Quality via Genetic Algorithms 13 IF 13 Spread-Spectrum Watermarking Security 2008 14 IF 14 Robust Blind Watermarking of Point-Sampled 2009 Geometry
  20. 15 IF 15 Security of Lattice-Based Data Hiding Against the 2008 Watermarked-Only Attack 16 IF 16 Multipurpose Watermarking Based on Multiscale 2008 Curvelet Transform 17 IF 17 Cryptographic Secrecy of Steganographic Matrix 2008 Embedding 18 IF 18 Digital Video Watermarking in P-Frames With 2008 Controlled Video Bit-Rate Increase 19 IF 19 A Novel Difference Expansion Transform for 2008 Reversible Data Embedding 20 IF 20 Adaptive Data Hiding in Edge Areas of Images 2008 With Spatial LSB Domain Systems 21 IF 21 Color Image Watermarking Using 2008 Multidimensional Fourier Transforms
  21. TECHNOLOGY : JAVA DOMAIN : IEEE Pattern Analysis & Machine Intelligence S.NO CODE PROJECT TITLE YEAR 01 PA 01 Using Language to Learn Structured Appearance 2010 Models for Image Annotation 02 PA 02 A Boosting Framework for Visuality-Preserving 2010 Distance Metric Learning and Its Application to Medical Image Retrieval 03 PA 03 Accurate Image Search Using the Contextual 2010 Dissimilarity Measure 04 PA 04 A Nonlinear Derivative Scheme Applied to Edge 2010 Detection 05 PA 05 In the Eye of the Beholder: A Survey of Models for 2010 Eyes and Gaze 06 PA 06 Polynomial Time Algorithms for Ratio Regions 2010 and a Variant of Normalized Cut 07 PA 07 Single-Image Super-Resolution Using Sparse 2010 Regression and Natural Image Prior 08 PA 08 Self-Similarity and Points of Interest 2010 09 PA 09 Iris Recognition: On the Segmentation of 2010 Degraded Images Acquired in the Visible Wavelength 10 PA 10 Image Segmentation with a Unified Graphical 2010 Model 11 PA 11 A Perceptually Inspired Variation Framework for 2009 Color Enhancement 12 PA 12 Image Transformations and Blurring 2009 13 PA 13 Robust Wavelet-Based Super-Resolution 2009 Reconstruction: Theory and Algorithm 14 PA 14 IRGS: Image Segmentation Using Edge Penalties 2009 and Region Growing
  22. 15 PA 15 Real World Image Annotation and Retrieval 2008 16 PA 16 Visual Rank: Applying Page Rank to Large-Scale 2008 Image Search 17 PA 17 Localized Content-Based Image Retrieval 2008 18 PA 18 Annotating Images by Mining Image Search 2008 Results 19 PA 19 A Discriminative Kernel-Based Approach to Rank 2008 Images from Text Queries
  23. TECHNOLOGY : JAVA DOMAIN : IEEE Parallel And Distributed Systems S.NO CODE PROJECT TITLE YEAR 01 PD 01 Secure Synchronization of Periodic Updates in Ad 2010 Hoc Networks 02 PD 02 An Analytical Approach to Optimizing Parallel 2010 Image Registration/Retrieval 03 PD 03 Improving Reliability for Application-Layer 2010 Multicast Overlays 04 PD 04 Impact of Feature Reduction on the Efficiency of 2010 Wireless Intrusion Detection Systems 05 PD 05 Snoogle: A Search Engine for Pervasive 2010 Environments 06 PD 06 A Cross-Layer Approach-Based Gnutella for 2010 Collaborative Virtual Environments over Mobile Ad Hoc Networks 07 PD 07 Correlation-Based Traffic Analysis Attacks on 2010 Anonymity Networks 08 PD 08 A Hypergraph Approach to Linear Network 2010 Coding in Multicast Networks 09 PD 09 On the Benefits of Cooperative Proxy Caching for 2010 Peer-to-Peer Traffic 10 PD 10 SocioNet: A Social-Based Multimedia Access 2010 System for Unstructured P2P Networks 11 PD 11 An Efficient Superpeer Overlay Construction and 2010 Broadcasting Scheme Based on Perfect Difference Graph 12 PD 12 Toward Systematical Data Scheduling for Layered 2010 Streaming in Peer-to-Peer Networks: Can We Go Farther?
  24. 13 PD 13 mTreebone: A Collaborative Tree-Mesh Overlay 2010 Network for Multicast Video Streaming 14 PD 14 Efficient Broadcasting Using Network Coding and 2010 Directional Antennas in MANETs 15 PD 15 A Distributed Protocol to Serve Dynamic Groups for 2010 Peer-to-Peer Streaming 16 PD 16 Efficient Multicast Algorithms for Multichannel 2010 Wireless Mesh Networks 17 PD 17 A Dynamic Performance-Based Flow Control 2010 Method for High-Speed Data Transfer 18 PD 18 Enforcing Minimum-Cost Multicast Routing 2009 against Selfish Information Flows 19 PD 19 Delay Asymptotics and Scalability for Peer-to- 2009 Peer Live Streaming 20 PD 20 Enforcing Minimum-Cost Multicast Routing 2009 against Selfish Information Flows 21 PD 21 Scalable Routing in Cyclic Mobile Networks 2009 22 PD 22 Dynamic Search Algorithm in Unstructured 2009 Peer-to-Peer Networks 23 PD 23 Movement-Assisted Connectivity Restoration in 2009 Wireless Sensor and Actor Networks 24 PD 24 A Faithful Distributed Mechanism for Sharing 2009 the Cost of Multicast Transmissions 25 PD 25 Multipath Dissemination in Regular Mesh Topologies 2009 26 PD 26 Detecting Malicious Packet Losses 2009 27 PD 27 Diverse Firewall Design 2008 28 PD 28 Free-Riding on BitTorrent-Like Peer-to-Peer File 2008 Sharing Systems: Modeling Analysis and Improvement 29 PD 29 Computation-Efficient Multicast Key 2008 Distribution
  25. TECHNOLOGY : JAVA DOMAIN : IEEE Dependable and Secure Computing S.NO CODE PROJECT TITLE YEAR 01 DSC 01 Layered Approach Using Conditional Random 2010 Fields for Intrusion Detection 02 DSC 02 In-Depth Packet Inspection Using a 2010 Hierarchical Pattern Matching Algorithm 03 DSC 03 An Advanced Hybrid Peer-to-Peer Botnet 2010 04 DSC 04 Error Detection and Fault Tolerance in ECSM 2009 Using Input Randomization 05 DSC 05 Security Analysis of the SASI Protocol 2009 06 DSC 06 Flexible Rollback Recovery in Dynamic 2009 Heterogeneous Grid Computing 07 DSC 07 The Effectiveness of Checksums for Embedded 2009 Control Networks
  26. TECHNOLOGY : JAVA DOMAIN : IEEE Software Engineering S.NO CODE PROJECT TITLE YEAR 01 SW 01 Enhanced Modeling and Solution of Layered 2009 Queuing Networks 02 SW 02 COMOM: Efficient Class Oriented Evaluation 2009 of Multiclass Performance Models 03 SW 03 An Investigation Into the Functional Form of 2009 the Size-Defect Relationship For Software Modules 04 SW 04 Optimized Resource Allocation for Software 2009 Release Planning 05 SW 05 Automatic Extraction of Heap 2009 ReferenceProperties in Object-Oriented Programs 06 SW 06 CHARMY: A Framework for Designing 2009 andVerifying Architectural Specifications 07 SW 07 Synthesis of Partial Behavior Models from 2009 Properties and Scenarios 08 SW 08 Identification of Move Method Refactoring 2009 Opportunities 09 SW 09 A Hierarchical Model for Object-Oriented 2009 Design Quality Assessment 10 SW 10 Variability and Reproducibility in Software 2009 Engineering: A Study of Four Companies that Developed the same System

1 comment:

  1. It was really nice to study your post. I collect some good points here. I would like to be appreciative you with the hard work you have made.......Web Shopping Cart

    ReplyDelete

Show Related Post's

Related Posts Plugin for WordPress, Blogger...