Vous êtes sur la page 1sur 2

IEEE PROJECTS

19 S.N 20 O 21 1 22 2 23 24 3 25 4 26 5 27 6 28 7 29 8 30 9 31 10 32 11 33 12 34 13 35 14 36 15 37 16 38 17 39 18

Online Health Care System TITLES OF THE PROJECT Real Estate Portal College and Dynamic Routing Topology Inference From End-toEfficient Application End Measurements Mail management System using SMTP Server Provably Secure Nested One-Time Secret Mechanisms for Fast Design and Development of Equity Trading Portfolio Manager Mutual Authentication and Key Exchange in Mobile Communications Library Management System Record Matching over Query Results from Multiple Web Databases Online Mobile Recharge Incremental Test Generation for Software Product Lines Issue Management System Privacy Preserving in Web Services Using Hippocratic DataBase SRLG Failure Localization in Optical Networks Activity-Based Proactive Data Management in Valuable Detours: Least-Cost Anypath Routing Mobile Environments Rules of Designing Routing Metrics for Greedy, Face, and Combined Greedy-Face Routing Steganalysis of JPEG steganography with complementary embedding strategy Image Thumbnails That Represent Blur and Noise DATA LEAKAGE DETECTION A Bayesian Approach to Automated Creation of Tactile Facial Pareto-Based Dominant Graph: An Efficient Indexing Structure Images to Answer Top-K Queries A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Scalable Learning of Collective Behavior Optimization Camera Motion-Based Analysis of User Generated Video FOR BRIDGING DOMAINS USING WORLD WIDE KNOWLEDGE TRANSFER LEARNING Cross-Media Alignment of Names and Faces VEBEK: VIRTUAL ENERGY-BASED ENCRYPTION AND KEYING FOR The Effect of Information Technology Investments in WIRELESS SENSOR NETWORKS Healthcare: A Longitudinal Study of its Lag,Duration, and Economic Value LOCALIZED MULTICAST: EFFICIENT AND DISTRIBUTED REPLICA DETECTION IN LARGE-SCALE SENSOR NETWORKS On the Security of Route Discovery in MANETs A DWT BASED APPROACH FOR STEGANOGRAPHY USING MABS: Multicast Authentication Based on Batch Signature BIOMETRICS SPARSE BAYESIAN LEARNING OF FILTERS FOR EFFICIENT IMAGE Privacy-Preserving Updates to Anonymous and Confidential EXPANSION Databases INFERENCE FROM AGING INFORMATION The Impact of Lessons-Learned Sessions on Effort Estimation and Uncertainty Assessments Data Leakage Detection Interactive Correction and Recommendation for Computer Language Learning and Training

2011 year 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011 2011

IEEE PROJECTS

40 41 42 43 44 45 46 47 48

Usher: Improving Data Quality with Dynamic Forms Privacy-Preserving Updates to Anonymous and Confidential Databases Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Generalized Probabilistic Flooding in Unstructured Peer-to-Peer Networks Dynamic Conflict-Free Transmission Scheduling for Sensor Network Queries A Personalized Ontology Model for Web Information Gathering Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing Approaching Throughput-Optimality in Distributed CSMA Scheduling Algorithms with Collisions Towards Secure and Dependable Storage Services in Cloud Computing

2011 2011 2011 2011 2011 2011 2011 2011 2011

Vous aimerez peut-être aussi