IEEE 2012 Projects
Titles are listed
below:
1. Novel
Data Embedding Method Using Adaptive Pixel Pair Matching
2. A
Probabilistic Model of Visual Cryptography Scheme With Dynamic Group
3. A Secure
Intrusion detection system against DDOS attack in Wireless Mobile Ad1
4. Active
Visual Segmentation
5. AMPLE An
Adaptive Traffic Engineering System Based on Virtual Routing Topologies
6. An
Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks
7. Characterizing
the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
8. Co-operative
download in vehicular environments
9. Defenses
Against Large Scale Online Password Guessing Attacks by using Persuasive click
Points
10. Design and
Implementation of TARF A Trust-Aware Routing Framework for WSNs
11. Discovering
Characterizations of the Behavior of Anomalous Sub-populations
12. Efficient
Audit Service Outsourcing for Data Integrity in Clouds
13. Ensuring
Distributed Accountability for Data Sharing in the Cloud
14. Fast
Matrix Embedding by Matrix Extending
15. FireCol A
Collaborative Protection Network for the Detection of Flooding DDoS Attacks
16. Learn to
Personalized Image Search from the Photo Sharing Websites
17. Load
Balancing Multipath Switching System with Flow Slice
18. Network
Assisted Mobile Computing with Optimal Uplink Query Processing
19. Outsourced
Similarity Search on Metric Data Assets
20. Privacy-
and Integrity-Preserving Range Queries in Sensor Networks
21. Query
Planning for Continuous Aggregation Queries over a Network of Data Aggregators
22. Ranking
Model Adaptation for Domain-Specific Search
23. Risk-Aware
Mitigation for MANET Routing Attacks
24. Scalable
and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute- based Encryption
25. Semi
supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
26. SPOC A
Secure and Privacy preserving Opportunistic Computing Framework for Mobile
Healthcare Emergency
27. The
Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
28. Topology
Control in Mobile Ad Hoc Networks with Cooperative Communications
29. Towards
Accurate Mobile Sensor Network Localization in Noisy Environments
30. View-invariant
action recognition based on Artificial Neural Networks
31. Fast Data
Collection in Tree-Based Wireless Sensor Networks
32. Packet-Hiding
Methods for Preventing Selective Jamming Attacks