Full Source Code,
Abstract, IEEE Basepaper,review ppt slides,video,complete documentation
OLD IEEE BULK PROJECTS BEST PRICE
S.NO
|
2011 IEEE PROJECT TITLES
|
YEAR
|
DOMAIN
|
1
|
DOTNET- A Web Search Engine-Based Approach to Measure
Semantic Similarity between Words
|
2011
|
WEB MINING
|
2
|
DOTNET- Adaptive Fault Tolerant QoS Control Algorithms for
Maximizing System Lifetime of Query-Based Wireless Sensor Networks
|
2011
|
NETWORK SECURITY
|
3
|
DOTNET- Adaptive Provisioning of Human Expertise in
Service-oriented Systems
|
2011
|
DATA MINING
|
4
|
DOTNET- An Approach to Detect and Prevent SQL Injection
Attacks in Database Using Web Service
|
2011
|
NETWORK SECURITY
|
5
|
DOTNET- Bridging Socially-Enhanced Virtual Communities
|
2011
|
DATA MINING
|
6
|
DOTNET- Combining Haar Feature And Skin Color Based
Classifiers For Face
|
2011
|
IMAGE PROCESSING
|
7
|
DOTNET- Continuous Neighbor Discovery in Asynchronous Sensor
Networks
|
2011
|
NETWORKING
|
8
|
DOTNET- Data integrity proofs in cloud storage
|
2011
|
CLOUD COMPUTING
|
9
|
DOTNET- Data Leakage Detection
|
2011
|
DATA MINING
|
10
|
DOTNET- Delay Analysis and Optimality of Scheduling Policies
for Multi-Hop Wireless Networks
|
2011
|
NETWORKING
|
11
|
DOTNET- Distributed Adaptation of Quantized Feedback for
Downlink Network MIMO Systems
|
2011
|
WIRELESS NETWORKING
|
12
|
DOTNET- Efficient Computation of Range Aggregates against
uncertain location based queries
|
2011
|
DATA MINING
|
13
|
DOTNET- Efficient Multi-dimensional Fuzzy Search for Personal
Information Management Systems
|
2011
|
DATA MINING
|
14
|
DOTNET- Exploiting Dynamic Resource Allocation for Efficient
Parallel Data Processing in the Cloud
|
2011
|
PARALLEL COMPUTING
|
15
|
DOTNET- Exploring Application-Level Semantics for Data
Compression
|
2011
|
DATA MINING
|
16
|
DOTNET- Improving Aggregate Recommendation Diversity Using
Ranking-Based Techniques
|
2011
|
DATA MINING
|
17
|
DOTNET- Integration of Sound Signature in Graphical Password
Authentication System
|
2011
|
DATA MINING
|
18
|
DOTNET- Jamming-Aware Traffic Allocation for Multiple-Path
Routing Using Portfolio Selection
|
2011
|
NETWORKING
|
19
|
DOTNET- Monitoring Service Systems from a Language-Action
Perspective
|
2011
|
DATA MINING
|
20
|
DOTNET- NABS Novel Approaches for Biometric Systems
|
2011
|
NETWORK SECURITY
|
21
|
DOTNET- Network Coding Based Privacy Preservation against
Traffic Analysis in Multi-Hop Wireless Networks
|
2011
|
WIRELESS NETWORKING
|
23
|
DOTNET- One Size Does Not Fit All Towards User- And
Query-Dependent Ranking For Web Databases
|
2011
|
DATA MINING
|
24
|
DOTNET -Optimal service pricing for a cloud cache
|
2011
|
CLOUD COMPUTING
|
25
|
DOTNET- Personalized Ontology Model for Web Information
Gathering
|
2011
|
DATA MINING
|
26
|
DOTNET- Privacy-Preserving Multi-keyword Ranked Search over
Encrypted Cloud Data
|
2011
|
CLOUD COMPUTING
|
27
|
DOTNET- Publishing Search Logs – A Comparative Study of
Privacy Guarantees
|
2011
|
DATA MINING
|
28
|
DOTNET- Robust Correlation of Encrypted Attack Traffic
Through Stepping Stones by Flow Watermarking
|
2011
|
NETWORK SECURITY
|
29
|
DOTNET- Scalable Learning of Collective Behavior
|
2011
|
DATA MINING
|
30
|
DOTNET- Self-Reconfigurable Wireless Mesh Networks
|
2011
|
WIRELESS NETWORKING
|
31
|
DOTNET- The Awareness Network, To Whom Should I Display My
Actions And, Whose Actions
|
2011
|
DATA MINING
|
32
|
DOTNET- The Geometric Efficient Matching Algorithm for
Firewalls
|
2011
|
NETWORK SECURITY
|
33
|
DOTNET- The World in a Nutshell Concise Range Queries
|
2011
|
DATA MINING
|
34
|
JAVA-- A Competitive Study of Cryptography Techniques over
Block Cipher
|
2011
|
CYPTOGRAPHY
|
35
|
JAVA-- A Dual Framework and Algorithms for Targeted Online Data
Delivery
|
2011
|
DATA MINING
|
36
|
JAVA-- A Fuzzy Self-Constructing Feature Clustering Algorithm
For Text Classification
|
2011
|
DATA MINING
|
37
|
JAVA-- A Link-Analysis Extension Of Correspondence Analysis For
Mining Relational Databases
|
2011
|
DATA MINING
|
38
|
JAVA-- A Machine Learning Approach for Identifying
Disease-Treatment Relations in Short Texts
|
2011
|
DATA MINING
|
39
|
JAVA-- A New Approach for FEC Decoding Based on the BP
Algorithm in LTE and WiMAX Systems
|
2011
|
WIRELESS NETWORKING
|
40
|
JAVA-- A Novel 3-D Color Histogram Equalization Method With
Uniform 1-D Gray Scale Histogram
|
2011
|
IMAGE PROCESSING
|
41
|
JAVA-- A Privacy-Preserving Location Monitoring System for
Wireless Sensor Networks
|
2011
|
MOBILE COMPUTING
|
42
|
JAVA-- Adaptive Cluster Distance Bounding for High-Dimensional
Indexing
|
2011
|
DATA MINING
|
43
|
JAVA-- Analysis on Credit Card Fraud Detection Methods
|
2011
|
DATA MINING
|
44
|
JAVA-- Anti-Forensics of Digital Image Compression
|
2011
|
IMAGE PROCESSING
|
45
|
JAVA-- Buffer Sizing for 802.11 Based Networks
|
2011
|
WIRELESS NETWORKING
|
46
|
JAVA-- Caching Strategies Based on Information Density
Estimation in Wireless Ad Hoc Networks
|
2011
|
WIRELESS NETWORKING
|
47
|
JAVA-- Delay Analysis and Optimality of Scheduling Policies for
Multi-Hop Wireless Networks
|
2011
|
WIRELESS NETWORKING
|
48
|
JAVA-- Digital Image hiding using curvelet transform
|
2011
|
IMAGE PROCESSING
|
49
|
JAVA-- Discovering Conditional Functional Dependencies
|
2011
|
DATA MINING
|
50
|
JAVA-- Dynamic Channel Allocation for Wireless Zone-Based Multicast
and Broadcast Service
|
2011
|
WIRELESS NETWORKING
|
51
|
JAVA-- Dynamics of Malware Spread in Decentralized Peer-to-Peer
Networks
|
2011
|
NETWORK SECURITY
|
52
|
JAVA-- Effective Navigation of Query Results Based on Concept
Hierarchies
|
2011
|
DATA MINING
|
53
|
JAVA-- Embedded Extended Visual Cryptography Schemes
|
2011
|
CRYPTOGRAPHY
|
54
|
JAVA-- Enabling Public Auditability and Data Dynamics for
Storage Security in Cloud Computing
|
2011
|
CLOUD COMPUTING
|
55
|
JAVA-- Extended XML Tree Pattern Matching Theories and
Algorithms
|
2011
|
DATA MINING
|
56
|
JAVA-- Fast Simulation of services avalibility in mesh network
with dynamic path restoration
|
2011
|
NETWORKING
|
57
|
JAVA-- Going Back and Forth Efficient Multi deployment and
Multi snapshotting on Clouds
|
2011
|
CLOUD COMPUTING
|
58
|
JAVA-- Improving the Performance of Wireless Ad Hoc Networks
Through MAC Layer Design
|
2011
|
WIRELESS NETWORKING
|
59
|
JAVA-- Intrusion detection An Energy efficient approach in
Heterogeneous WSN
|
2011
|
NETWORK SECURITY
|
60
|
JAVA-- Live Streaming With Receiver-Based Peer-Division
Multiplexing
|
2011
|
NETWORKING
|
61
|
JAVA-- Modeling and Detection of Camouflaging Worm
|
2011
|
NETWORK SECURITY
|
62
|
JAVA-- More Secure Steganography Method in Spatial Domain
|
2011
|
STEGANOGRAPHY
|
63
|
JAVA-- Nymble Blocking Misbehaving Users in Anonymizing
Networks
|
2011
|
NETWORK SECURITY
|
64
|
JAVA-- Online Intrusion Alert Aggregation with Generative Data
Stream Modeling
|
2011
|
NETWORK SECURITY
|
65
|
JAVA-- Optimal Bandwidth Assignment for Multiple Description
Coded Video
|
2011
|
WIRELESS NETWORKING
|
66
|
JAVA-- Optimal Stochastic Location Updatees in Mobile Ad Hoc
Network
|
2011
|
WIRELESS NETWORKING
|
67
|
JAVA-- Ranking Spatial Data by Quality Preferences
|
2011
|
DATA MINING
|
68
|
JAVA-- Robust Video Data Hiding Using Forbidden Zone Data
Hiding And Selective Embedding
|
2011
|
STEGANOGRAPHY
|
69
|
JAVA-- SAT A Security Architecture Achieving Anonymity and
Traceability in Wireless Mesh Networks
|
2011
|
MOBILE COMPUTING
|
70
|
JAVA-- Scalable and Cost-Effective Interconnection of
Data-Center Servers Using Dual Server Ports
|
2011
|
NETWORKING
|
71
|
JAVA-- Secure and Practical Outsourcing of Linear Programming
in Cloud Computing
|
2011
|
CLOUD COMPUTING
|
72
|
JAVA-- Secure High-Throughput Multicast Routing in Wireless
Mesh Networks
|
2011
|
WIRELESS NETWORKING
|
73
|
JAVA-- Sketch4Match – Content-based Image Retrieval System
Using Sketches
|
2011
|
IMAGE PROCESSING
|
74
|
JAVA-- The CoQUOS Approach to Continuous Queries in
Unstructured Overlays
|
2011
|
DATA MINING
|
75
|
JAVA-- Throughput Optimization in High Speed Downlink Packet
Access
|
2011
|
WIRELESS NETWORKING
|
76
|
JAVA-- Unified Approach to Optimizing Performance in Networks
Serving Heterogeneous Flows
|
2011
|
WIRELESS NETWORKING
|
77
|
JAVA-- Cloud Computing for Agent-Based Urban Transportation
Systems
|
2011
|
CLOUD COMPUTING
|
78
|
JAVA-- Clustering with Multi-Viewpoint based Similarity Measure
|
2011
|
DATA MINING
|
79
|
JAVA-- Decision Trees for Uncertain Data
|
2011
|
DATA MINING
|
80
|
JAVA-- A User Oriented Image Retrieval System Based On
Interactive Genetic Algorithm
|
2011
|
IMAGE PROCESSING
|
No comments:
Post a Comment