You are on page 1of 5

IEEE C# PROJECT TITLE SNO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 TITLE Artificial intelligence network load balancing using Ant Colony Optimization Convolution

Filters Data Hiding additional files in a ZIP archive Database Schema Comparison Utility C# Edge Detection Filters Edge Detection in Images with Wavelet Transform Image Processing Image Processing for Bilinear Filters and Resizing Image Processing for Displacement filters, including swirl Class Scheduling and Time Tabling System - C# Image Processing for The HSL color space Image Recognition with Neural Networks Mobile Phone File Transferring Steganography for Data Hiding Messages in MIDI Songs Steganography for Data Reading and Writing AVI files Steganography for Hiding Data in Wave Audio Files Steganography for Indexed Images and their Palettes Steganography for multiple key and carrier files Steganography for Regions with different data density TCPIP Chat client server Using C# Text To Text Steganography

IEEE ASP.NET PROJECT

SNO 1 2 3 4

TITLE Advertisement Posting Website Auto Mechanism System(AMC) Web Provider System Web Traffic Management

IEEE PROJECT DOT.NET SNO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 NAME Bridging Socially-Enhanced Virtual Communities Data integrity proofs in cloud storage Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Continuous Neighbor Discovery in Asynchronous Sensor Networks Efficient Computation of Range Aggregates against uncertain location based queries Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud Exploring Application-Level Semantics for Data Compression Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Monitoring Service Systems from a Language-Action Perspective Personalized Ontology Model for Web Information Gathering Publishing Search Logs A Comparative Study of Privacy Guarantees Scalable Learning of Collective Behavior The Awareness Network, To Whom Should I Display My Actions And, Whose Actions The World in a Nutshell Concise Range Queries Adaptive Provisioning of Human Expertise in Service-oriented Systems One Size Does Not Fit All Towards User- And Query-Dependent Ranking For Web Databases

IEEE PROJECT JAVA

SNO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19

NAME A Competitive Study of Cryptography Techniques over Block Cipher A Dual Framework and Algorithms for Targeted Online Data Delivery A Foundation for Stochastic Bandwidth Estimation of Networks with Random Service A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification A Link-Analysis Extension Of Correspondence Analysis For Mining Relational Databases A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts A New Approach for FEC Decoding Based on the BP Algorithm in LTE and WiMAX Systems Analysis on Credit Card Fraud Detection Methods Caching Strategies Based on Information Density Estimation in Wireless Ad Hoc Networks Clustering with Multi-Viewpoint based Similarity Measure Dynamic Channel Allocation for Wireless Zone-Based Multicast and Broadcast Service Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Effective Navigation of Query Results Based on Concept Hierarchies Embedded Extended Visual Cryptography Schemes Fast Simulation of services availability in mesh network with dynamic path restoration Going Back and Forth Efficient Multi deployment and Multi snapshotting on Clouds Intrusion detection An Energy efficient approach in Heterogeneous WSN Live Streaming With Receiver-Based Peer-Division Multiplexing Modeling and Detection of Camouflaging Worm

20 21 22 23 24 25 26 27 28 29 30

More Secure Steganography Method in Spatial Domain Nymble Blocking Misbehaving Users in Anonymizing Networks Online Intrusion Alert Aggregation with Generative Data Stream Modeling Optimal Bandwidth Assignment for Multiple Description Coded Video Optimal Stochastic Location Updates in Mobile Ad Hoc Network Robust Video Data Hiding Using Forbidden Zone Data Hiding And Selective Embedding SAT A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Scalable and Cost-Effective Interconnection of Data-Center Servers Using Dual Server Ports Secure and Practical Outsourcing of Linear Programming in Cloud Computing Secure High-Throughput Multicast Routing in Wireless Mesh Networks Sketch4Match Content-based Image Retrieval System Using Sketches

You might also like