Sie sind auf Seite 1von 9

JAVA Projects

IEEE 2012ISO9001:2008CERTIFIEDOrganization

JAVA Projects
I. IEEE based on CLOUD COMPUTING
1. Optimization of Resource Provisioning Cost in Cloud Computing (IEEE 2012).
2. Practical Detection of Spammers and Content Promoters in Online Video Sharing
Systems (IEEE 2012).
3. An Analytical Performance Modeling Approach for Supply Chain Networks
(IEEE 2012).
4. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access
Control in Cloud Computing (IEEE 2012).
5. A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
(IEEE 2012).

II. IEEE based on GRID COMPUTING


1. Maintaining Data Consistency in Structured P2P Systems (IEEE 2012).
2. Traffic Scheduling Technique for Smart Grid Advanced Metering Applications
(IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization
III. IEEE based on MOBILE COMPUTING
1. Multi-Level Diskless Checkpointing (IEEE 2012).
2. On the Security of a Ticket-Based Anonymity System with Traceability property in
Wireless Mesh Networks (IEEE 2012).
3. A Dynamic Offloading Algorithm for Mobile Computing (IEEE 2012).
4. Design of Wireless Sensor Networks for Mobile Target Detection (IEEE 2012).
5. Stateless Multicast Protocol for Ad Hoc Networks (IEEE 2012).
6. Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
(IEEE 2012).

IV. IEEE based on DATA MINING


1. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
(IEEE 2012).
2. Efficient Computation of Range Aggregates against Uncertain Location-Based Queries
(IEEE 2012).
3. Clustering with Multiviewpoint-Based Similarity Measure (IEEE 2012).
4. Incremental Information Extraction Using Relational Databases (IEEE 2012).
5. Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
(IEEE 2012).
6. Scalable Scheduling of Updates in Streaming Data Warehouses (IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization

V. IEEE based on NETWORK SECURITY


1. Aiming at Higher Network Security through Extensive Penetration Application
(IEEE 2012).
2. Enhancing the Trust of Internet Routing With Lightweight Route Attestation
(IEEE 2012).
3. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS
Attacks (IEEE 2012).

VI. IEEE based on WEB MINING


1. An Investigation of the Impact of Consumer Feedback, Recommendation and Price
Bundling On Sales (IEEE 2012).
2. Performance Evaluation of Full Search Equivalent Pattern Matching Algorithms
(IEEE 2012).
3. An Ontology-Based Text-Mining Method to Cluster Proposals for Research Project
Selection (IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization
VII. IEEE based on REAL TIME SURVEILLANCE SECURITY
1. Accurate Motion Detection Using a Self-Adaptive Background Matching Framework
(IEEE 2012) [Device Based].
2. Iris Code Decompression Based on the Dependence between Its Bit Pairs (IEEE 2012).
3. Curved-Region-Based Ridge Frequency Estimation and Curved Gabor Filters for
Fingerprint Image Enhancement (IEEE 2012) [Device Based].

VIII. IEEE based on NETWORKS


1. Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management
(IEEE 2012).
2. Sliding Modes for Anomaly Observation in TCP Networks: From Theory to Practice
(IEEE 2012).
3. Complexity Analysis and Algorithm Design for Advance Bandwidth Scheduling in
Dedicated Networks (IEEE 2012).
4. Dual-Layer Adaptive Error Control for Network-on-Chip Links (IEEE 2012).
5. A Theory for the Connectivity Discovered by Routing Protocols (IEEE 2012).
6. Auditory

Feedback

and

Sensory

Substitution

during

Teleported

Navigation

(IEEE 2012).
7. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
(IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization

IX. IEEE based on IMAGE PROCESSING


1. Three-Dimensional Imaging Using Colocated MIMO Radar and ISAR Technique
(IEEE 2012).
2. Web and Personal Image Annotation by Mining Label Correlation With Relaxed Visual
Graph Embedding (IEEE 2012).
3. Digital Pathology: Data-Intensive Frontier in Medical Imaging (IEEE 2012).

X. IEEE based on SERVER PERFORMANCE


1. Interactivity-Constrained Server Provisioning in Large-Scale Distributed Virtual
Environments (IEEE 2012).
2. Concurrent round-robin-based dispatching schemes for Clos-network switches
(IEEE 2012).
3. Performance of PCN-Based Admission Control under Challenging Conditions
(IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization
XI. IEEE based on NEURAL NETWORKS

1. Face Feature Weighted Fusion Based on Fuzzy Membership Degree for Video Face
Recognition (IEEE 2012) [Device Based].
2. A Novel Word Spotting Method Based on Recurrent Neural Networks (IEEE 2012).

XII. IEEE based on DISTRIBUTED NETWORKS


1. A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer
Interactive VoD Streaming (IEEE 2012).
2. A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P
Networks (IEEE 2012).
3. Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks
(IEEE 2012).
4. Optimal Quarantining of Wireless Malware Through Reception Gain Control
(IEEE 2012).
5. Predictive Encoder and Buffer Control for Statistical Multiplexing of Multimedia
Contents (IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization

XIII. IEEE based on VISUAL CRYPTOGRAPHY

1. Efficient Construction for Region Incrementing Visual Cryptography (IEEE 2012).


2. A Shift-Tolerant Dissimilarity Measure for Surface Defect Detection (IEEE 2012).
3. Related-Key Boomerang and Rectangle Attacks: Theory and Experiment analysis
(IEEE 2012).

XIV. IEEE based on INFORMATION SECURITY


1. Fast Matrix Embedding by Matrix Extending (IEEE 2012).
2. Data Hiding in MPEG Video Files Using Multivariate Regression and Flexible
Macroblock Ordering (IEEE 2012).
3. Windowed Decoding of Protograph-Based LDPC Convolutional Codes over Erasure
Channels (IEEE 2012).

XV. IEEE based on WIRELESS SENSOR NETWORK


1. Robust Topology Engineering in Multiradio Multichannel Wireless Networks
(IEEE 2012).
2. Catching Packet Droppers and Modifiers in Wireless Sensor networks (IEEE 2012).
3. Classification and Experimental Analysis for Clone Detection Approaches in Wireless
Sensor Networks (IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization

4. Throughput Analysis of Cooperative Mobile Content Distribution in Vehicular Network


using Symbol Level Network Coding (IEEE 2012).
5. A Diversity Compression and Combining Technique Based on Channel Shortening for
Cooperative Networks (IEEE 2012).
6. Coverage Properties of the Target Area in Wireless Sensor Networks (IEEE 2012).

XVI. IEEE Based on ARTIFICIAL INTELLIGENCE


1. Effective Pattern Discovery for Text Mining (IEEE 2012).
2. Multibiometric Cryptosystems Based on Feature-Level Fusion

(IEEE 2012) [Device Based].

XVII. IEEE Based on INTRUSION DETECTION SYSTEMS


1. Effective Acquaintance Management based on Bayesian Learning for Distributed
Intrusion Detection Networks (IEEE 2012).
2. Data Dependencies for the Recovery of Concurrent Processes in a Service-Oriented
Environment (IEEE 2012).
3. Design and Implementation of Secure Networked Predictive Control Systems Under
Deception Attacks (IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

JAVA Projects
IEEE 2012ISO9001:2008CERTIFIEDOrganization

XVIII.

IEEE based on COMPUTATION & DATA SECURITY


1. Leveraging Social Networks to Combat Collusion in Reputation Systems for Peer-toPeer Networks (IEEE 2012).
2. Network-Wide Local Unambiguous Failure Localization (NWL-UFL) via Monitoring
Trails (IEEE 2012).
3. Fuzzy-Model-Based Robust Fault Detection with Stochastic Mixed Time Delays and
Successive Packet Dropouts (IEEE 2012).

st

#1ShifaArcade,BharathiNagar1 Street,NorthUsmanRoad,TNagar,Chennai600017
04442124943|9500088927|9600114466|info@uniqtechnologies.co.in
www.uniqtechnologies.co.in|www.ieeefinalyearprojects.org

Das könnte Ihnen auch gefallen