2011 – 2012 IEEE Dot Net Project Titles
A More Secure Steganography Method in Spatial Domain
Problems and Solutions of Web Search Engines
Studies and Evaluation on Meta Search Engines
A Web Search Engine-Based Approach to Measure Semantic Similarity between Words.
A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm
Detecting Kernel-Level Rootkits Using Data Structure Invariants
NABS Novel Approaches for Biometric Systems.
Analysis on Credit Card Fraud Detection Methods
Proportionally Fair Rate Allocation in Regular Wireless Sensor Networks
Interference-Aware Routing in Wireless Multihop Networks
Multiple Exposure Fusion for High Dynamic Range Image Acquisition
Blind Image Watermarking Using a Sample Projection Approach
Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models
A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts
Fuzzy-Zoning-Based Classification for Handwritten Characters
Adaptive Spectral Transform for Wavelet-Based Color Image Compression
Facial Expression Recognition Using Facial Movement Features
A New Color Filter Array With Optimal Properties for Noiseless and Noisy Color Image Acquisition
Histogram Specification: A Fast and Flexible Method to Process Digital Images
On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks
Data integrity proofs in cloud storage
Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
Optimal service pricing for a cloud cache
Personalized Ontology Model for Web Information Gathering
Efficient Computation of Range Aggregates against uncertain location based queries
Scalable Learning of Collective Behavior
The World in a Nutshell Concise Range Queries
The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
Publishing Search Logs – A Comparative Study of Privacy Guarantees
One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases
Monitoring Service Systems from a Language-Action Perspective
Adaptive Provisioning of Human Expertise in Service-oriented Systems
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
Exploring Application-Level Semantics for Data Compression
Bridging Socially-Enhanced Virtual Communities
Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis
Vulnerability Analysis in SOA-based Business Processes
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking.
Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
Continuous Neighbor Discovery in Asynchronous Sensor Networks
The Geometric Efficient Matching Algorithm for Firewalls
Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
Integration of Sound Signature in Graphical Password Authentication System
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
Self-Reconfigurable Wireless Mesh Networks
Live Streaming with Receiver-based Peer-division Multiplexing
Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
Mining Group Movement Patterns for Tracking Moving Objects Efficiently