SlideShare une entreprise Scribd logo
1  sur  4
2015 IEEE PROJECTS
CLOUD COMPUTING (WITH REAL TIME CLOUD )
CT5CC01 A ProfitMaximizationScheme withGuaranteedQualityof Service inCloudComputing
CT5CC02 CombiningEfficiency,Fidelity,andFlexibilityinResource InformationServices
CT5CC03 Energy-aware LoadBalancingandApplicationScalingforthe CloudEcosystem
CT5CC04 Identity-basedEncryptionwithOutsourcedRevocationinCloudComputing
CT5CC05 Key-AggregateSearchable Encryption(KASE) forGroupData SharingviaCloudStorage
CT5CC06 Provable Multi copyDynamicData PossessioninCloudComputingSystems
CT5CC07 PublicIntegrityAuditingforSharedDynamicCloudDatawithGroup User Revocation
CT5CC07 Secure AuditingandDeduplicatingDatainCloud
CT5CC08 Space-efficientVerifiable SecretSharingUsingPolynomialInterpolation
CT5CC09 Smart CloudStorage Service SelectionBasedonFuzzyLogic,Theoryof Evidence andGame
Theory
CT5CC10 An efficientalgorithmforthe burstingof service-basedapplicationsinhybridClouds
CT5CC11 Cloud-basedMultimediaContentProtectionSystem
CT5CC12 OrchestratingBulkDataTransfersacross geo-distributeddatacenters
CT5CC13 StealthyDenial of Service StrategyinCloudComputing
CT5CC14 A Scalable andReliableMatchingService for Content-BasedPublish/SubscribeSystems
CT5CC15 Energy-EfficientFault-TolerantDataStorage and ProcessinginMobile Cloud
CT5CC16 SelCSP:A FrameworktoFacilitate Selectionof CloudService Providers
CT5CC17 A DynamicSecure GroupSharingFrameworkinPublicCloudComputing
CT5CC18 EnablingEfficientMulti-KeywordRankedSearchOverEncryptedMobileCloudData
ThroughBlindStorage
CT5CC19 EnablingFine-grainedMulti-keywordSearchSupportingClassifiedSub-dictionariesover
EncryptedCloudData
CT5CC20 Governance Model forCloudComputinginBuildingInformationManagement
CT5CC21 PerformingInitiative DataPrefetchinginDistributedFile SystemsforCloudComputing
CT5CC22 Proof of ownershipindeduplicatedcloudstorage withmobile device efficiency
CT5CC23 SharedAuthorityBasedPrivacy-PreservingAuthenticationProtocol inCloudComputing
CT5CC24 Cloud-Trust- a SecurityAssessmentModel forInfrastructure asaService (IaaS) Clouds
CT5CC25 Cost-Effective AuthenticandAnonymousData SharingwithForwardSecurity
CT5CC26 Secure OptimizationComputationOutsourcinginCloudComputingA Case Studyof Linear
Programming
CT5CC27 T-brokerA Trust-aware Service BrokeringSchemeforMultiple CloudCollaborative
Services
CT5CC28 PandaPublicAuditingforSharedDatawithEfficientUserRevocationinthe Cloud
CT5CC29 DecentralizedComputationOffloadingGame forMobile CloudComputing
DATA MINING & WEB MINING
CT5DM01 PAGE A PartitionAware Engine forParallel GraphComputation
CT5DM02 QueryAware Determinizationof UncertainObjects
CT5DM03 TowardsEffective BugTriage withSoftware DataReductionTechniques
CT5DM04 CAHR: A ContextuallyAdaptiveHome-BasedRehabilitationFramework
CT5DM05 PAGE: A PartitionAware Engine for Parallel GraphComputation
CT5DM06 EntityLinkingwithaKnowledge Base:Issues,Techniques,andSolutions
CT5DM07 Discoveryof RankingFraudfor Mobile Apps
CT5DM08 Rule-BasedMethodforEntityResolution
CT5DM09 SubgraphMatching withSetSimilarity inaLarge Graph Database
CT5DM10 Active LearningforRankingthroughExpectedLossOptimization
CT5DM11 ePeriodicity:MiningEventPeriodicityfromIncomplete Observations
CT5DM12 KeywordSearchOverProbabilisticRDFGraphs
CT5DM13 Aggregate EstimationinHiddenDatabaseswithCheckboxInterfaces
CT5DM14 EfficientReverse Top-kBooleanSpatial KeywordQueriesonRoadNetworks
CT5DM15 k-NearestNeighborClassificationoverSemanticallySecure EncryptedRelational Data
CT5DM16 Topological TransformationApproachestoDatabase QueryProcessing
CT5DM17 A RankingApproachonLarge-Scale GraphWith Multidimensional Heterogeneous
Information
CT5DM18 Rank-BasedSimilaritySearchReducingthe Dimensional Dependence
CT5DM19 Distributed Multi-AgentOnline LearningBasedonGlobal Feedback
CT5DM20 EfficientMotif DiscoveryforLarge-scaleTime SeriesinHealthcare
CT5DM21 TrustedPerformance AnalysisonSystemsWithaSharedMemory
CT5DM22 EfficientAlgorithmsforMiningthe Concise and LosslessRepresentationof HighUtility
Itemsets
CT5DM23 Relational Collaborative TopicRegressionforRecommenderSystems
CT5DM24 ConstructingQuery-DrivenDynamicMachine LearningModel WithApplicationtoProtein-
LigandBindingSitesPrediction
CT5DM25 ImprovingWebNavigationUsabilitybyComparingActual andAnticipatedUsage
CT5DM26 Network-BasedModelingandIntelligentDataMiningof Social MediaforImprovingCare
CT5DM27 Qualityof Experience User’sPerceptionaboutWebServices
CT5DM28 Real-Time Detectionof TrafficFromTwitterStreamAnalysis
IMAGE PROCESSING
CT5IP01 DetectionandRectificationof DistortedFingerprints
CT5IP02 Learningto RankImage Tags withLimitedTrainingExamples
CT5IP03 Single Image Super-ResolutionBasedon GradientProfileSharpness
INFORMATION FORENSICS AND SECURITY
CT5IS01 A Privacy-PreservingFrameworkforLarge-Scale Content-BasedInformationRetrieval
PARALLEL AND DISTRIBUTED
CT5PD01 A Secure andDynamicMulti-keywordRankedSearchScheme overEncryptedCloudData
CT5PD02 Cost-MinimizingDynamicMigrationof ContentDistributionServicesintoHybridClouds
CT5PD03 FRAppEDetectingMaliciousFacebookApplications
MOBILE COMPUTING
CT5MC01 Distortion-Aware ConcurrentMultipathTransfer forMobile VideoStreamingin
HeterogeneousWirelessNetworks
CT5MC02 Game-TheoreticTopologyControlforOpportunisticLocalizationinSparse Underwater
SensorNetworks
CT5MC03 JointOptimal DataRate andPowerAllocationinLossyMobile AdHocNetworkswith
Delay-ConstrainedTraffics
CT5MC04 FriendbookA Semantic-BasedFriendRecommendationSystemforSocial Networks
CT5MC05 Wormhole AttackDetectionAlgorithmsinWirelessNetworkCodingSystems
CT5MC06 Adaptive AlgorithmsforDiagnosingLarge-ScaleFailuresinComputerNetworks
CT5MC07 Aggregated-Proof BasedHierarchical AuthenticationScheme forthe Internetof Things
CT5MC08 AuthenticatedKeyExchange ProtocolsforParallel NetworkFile Systems
CT5MC09 Cost-Aware SEcure Routing(CASER) Protocol DesignforWirelessSensorNetworks
CT5MC10 DecentralizedComputationOffloadingGame forMobile CloudComputing
CT5MC11 Improvingthe NetworkLifetime of MANETsthroughCooperative MACProtocol Design
CT5MC12 Innovative SchemesforResource Allocation inthe CloudforMediaStreamingApplications
CT5MC13 RoutingPressure A Channel-RelatedandTraffic-Aware Metricof RoutingAlgorithm
CT5MC14 Secure andDistributedDataDiscoveryandDisseminationinWirelessSensorNetworks
CT5MC15 Secure andReliable RoutingProtocolsforHeterogeneousMultihopWirelessNetworks
CT5MC16 Interference-BasedTopologyControl AlgorithmforDelay-ConstrainedMobile AdHoc
Networks
CT5MC17 Self-OrganizingResource ManagementFrameworkinOFDMA Femtocells
CT5MC18 Max ContributionAnOnlineApproximationof OptimalResource AllocationinDelay
TolerantNetworks
WEB SERVICES
CT5WS01 ConstructingQuery-DrivenDynamicMachine LearningModel WithApplicationtoProtein-
LigandBindingSitesPrediction
CT5WS02 ImprovingWebNavigationUsabilitybyComparingActual andAnticipatedUsag
CT5WS03 Network-BasedModelingandIntelligentDataMiningof Social MediaforImprovingCare
CT5WS04 Qualityof Experience User’sPerceptionaboutWebServices
CT5WS05 AutomaticWeb Service CompositionBasedonUncertaintyExecutionEffects
CT5WS06 Constructinga Global Social Service NetworkforBetterQualityof WebService Discovery
CT5WS07 Data-DrivenCompositionforService-OrientedSituationalWebApplications
CT5WS08 DesigningHighPerformanceWeb-BasedComputingServicestoPromote Telemedicine
Database ManagementSystem
CT5WS09 DiversifyingWebServiceRecommendationResultsviaExploringService Usage History
NETWORKING
CT5NW01 A TopologyPotential-BasedMethodforIdentifyingEssentialProteinsfromPPINetworks
CT5NW02 ReceiverCooperationinTopologyControlforWirelessAd-HocNetworks
CT5NW03 DelayOptimizationandCross-LayerDesigninMultihopWirelessNetworksWithNetwork
CodingandSuccessive Interference Cancelation
CT5NW04 EnergyEfficientVirtual NetworkEmbeddingforCloudNetworks
CT5NW05 Statistical DisseminationControl inLarge Machine-to-Machine CommunicationNetworks
CT5NW06 DistributedDenialof Service AttacksinSoftware-DefinedNetworkingwithCloud
Computing
CT5NW07 NeighborSimilarityTrustagainstSybil AttackinP2PE-Commerce
CT5NW08 Passive IPTracebackDisclosingthe Locationsof IPSpoofersFromPathBackscatter
CT5NW09 SecurityOptimizationof DynamicNetworkswithProbabilisticGraphModelingandLinear
Programming
Security-Aware RelayingSchemeforCooperative NetworksWithUntrustedRelayNodes

Contenu connexe

En vedette

Мультимедійні технології
Мультимедійні технологіїМультимедійні технології
Мультимедійні технології
tarlykovapgf25
 

En vedette (7)

Sonu pawan
Sonu pawanSonu pawan
Sonu pawan
 
Social Media e strategie aziendali
Social Media e strategie aziendaliSocial Media e strategie aziendali
Social Media e strategie aziendali
 
Recce Photos
Recce Photos Recce Photos
Recce Photos
 
Social by Web Design
Social by Web DesignSocial by Web Design
Social by Web Design
 
Мультимедійні технології
Мультимедійні технологіїМультимедійні технології
Мультимедійні технології
 
Shot List
Shot List Shot List
Shot List
 
Query aware determinization of uncertain objects
Query aware determinization of uncertain objectsQuery aware determinization of uncertain objects
Query aware determinization of uncertain objects
 

Similaire à M-Tech IEEE 2015 Projects List

Cala workshop final chile
Cala workshop final   chileCala workshop final   chile
Cala workshop final chile
Rafael Junquera
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's list
gagnertechnologies
 

Similaire à M-Tech IEEE 2015 Projects List (20)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cala workshop final chile
Cala workshop final   chileCala workshop final   chile
Cala workshop final chile
 
PTC Product Lifecycle Management SaaS Bookings Double Over Last Four Quarters
PTC Product Lifecycle Management SaaS Bookings Double Over Last Four QuartersPTC Product Lifecycle Management SaaS Bookings Double Over Last Four Quarters
PTC Product Lifecycle Management SaaS Bookings Double Over Last Four Quarters
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
JAVA IEEE -2015
JAVA IEEE -2015JAVA IEEE -2015
JAVA IEEE -2015
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's list
 
3i techso project title
3i techso project title3i techso project title
3i techso project title
 
latest ieee project 2015-2016 | java projects 2015-2016 | dotnet projects 201...
latest ieee project 2015-2016 | java projects 2015-2016 | dotnet projects 201...latest ieee project 2015-2016 | java projects 2015-2016 | dotnet projects 201...
latest ieee project 2015-2016 | java projects 2015-2016 | dotnet projects 201...
 
2014 2015 ieee dotnet projects titles list globalsoft technologies
2014 2015 ieee dotnet projects titles list globalsoft technologies2014 2015 ieee dotnet projects titles list globalsoft technologies
2014 2015 ieee dotnet projects titles list globalsoft technologies
 
Ieee 2014 2015 dotnet projects titles list globalsoft technologies
Ieee 2014 2015 dotnet projects titles list globalsoft technologiesIeee 2014 2015 dotnet projects titles list globalsoft technologies
Ieee 2014 2015 dotnet projects titles list globalsoft technologies
 
2014 2015 ieee dotnet projects titles list globalsoft technologies
2014 2015 ieee dotnet projects titles list globalsoft technologies2014 2015 ieee dotnet projects titles list globalsoft technologies
2014 2015 ieee dotnet projects titles list globalsoft technologies
 
2014 2015 ieee dotnet projects titles list globalsoft technologies
2014 2015 ieee dotnet projects titles list globalsoft technologies2014 2015 ieee dotnet projects titles list globalsoft technologies
2014 2015 ieee dotnet projects titles list globalsoft technologies
 
Ieee 2014 2015 dotnet projects titles list globalsoft technologies
Ieee 2014 2015 dotnet projects titles list globalsoft technologiesIeee 2014 2015 dotnet projects titles list globalsoft technologies
Ieee 2014 2015 dotnet projects titles list globalsoft technologies
 
Winds of change from vendor lock-in to meta cloud review 1
Winds of change from  vendor lock-in to meta cloud review 1Winds of change from  vendor lock-in to meta cloud review 1
Winds of change from vendor lock-in to meta cloud review 1
 
Information technology in power sectors
Information technology in power sectorsInformation technology in power sectors
Information technology in power sectors
 
Seminar pasqualina potena
Seminar pasqualina potenaSeminar pasqualina potena
Seminar pasqualina potena
 
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...
 
Digital transformation in Manufacturing
Digital transformation in ManufacturingDigital transformation in Manufacturing
Digital transformation in Manufacturing
 
Cloud computing in Smart Grid applications.pptx
Cloud computing in Smart Grid applications.pptxCloud computing in Smart Grid applications.pptx
Cloud computing in Smart Grid applications.pptx
 

Plus de CloudTechnologies

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
CloudTechnologies
 

Plus de CloudTechnologies (20)

Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...Machine Learning Classification to predict water purity based on Viruses and ...
Machine Learning Classification to predict water purity based on Viruses and ...
 
iot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workersiot based safety and health monitoring for construction workers
iot based safety and health monitoring for construction workers
 
Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...Intelligent neonatal monitoring system based on android application using mul...
Intelligent neonatal monitoring system based on android application using mul...
 
An iot based smart garden with weather station system
An iot based smart garden with weather station systemAn iot based smart garden with weather station system
An iot based smart garden with weather station system
 
A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...A deep learning facial expression recognition based scoring system for restau...
A deep learning facial expression recognition based scoring system for restau...
 
Diabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approachesDiabetes prediction using different machine learning approaches
Diabetes prediction using different machine learning approaches
 
machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...machine learning based predictive analytics of student academic performance i...
machine learning based predictive analytics of student academic performance i...
 
Image based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimationImage based estimation of real food size for accurate food calorie estimation
Image based estimation of real food size for accurate food calorie estimation
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Io t projects
Io t projectsIo t projects
Io t projects
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 
Data mining projects
Data mining projectsData mining projects
Data mining projects
 
Python IEEE 2019 Projects List
Python IEEE 2019 Projects List Python IEEE 2019 Projects List
Python IEEE 2019 Projects List
 
Machine learning projects
Machine learning projectsMachine learning projects
Machine learning projects
 
Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)Raspberry Pi based voice-operated personal assistant (Neobot)
Raspberry Pi based voice-operated personal assistant (Neobot)
 
Automation in Agriculture and IoT
Automation in Agriculture and IoTAutomation in Agriculture and IoT
Automation in Agriculture and IoT
 
Gas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOTGas Leakage Detection Based on IOT
Gas Leakage Detection Based on IOT
 
The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...The Internet-of-Things based hand gestures using wearable sensors for human m...
The Internet-of-Things based hand gestures using wearable sensors for human m...
 
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOTMULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
MULTIVIEW GARBAGE COLLECTION ESTIMATION USING IOT
 
IoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction WorkersIoT Based Safety and Health Monitoring for Construction Workers
IoT Based Safety and Health Monitoring for Construction Workers
 

Dernier

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

M-Tech IEEE 2015 Projects List

  • 1. 2015 IEEE PROJECTS CLOUD COMPUTING (WITH REAL TIME CLOUD ) CT5CC01 A ProfitMaximizationScheme withGuaranteedQualityof Service inCloudComputing CT5CC02 CombiningEfficiency,Fidelity,andFlexibilityinResource InformationServices CT5CC03 Energy-aware LoadBalancingandApplicationScalingforthe CloudEcosystem CT5CC04 Identity-basedEncryptionwithOutsourcedRevocationinCloudComputing CT5CC05 Key-AggregateSearchable Encryption(KASE) forGroupData SharingviaCloudStorage CT5CC06 Provable Multi copyDynamicData PossessioninCloudComputingSystems CT5CC07 PublicIntegrityAuditingforSharedDynamicCloudDatawithGroup User Revocation CT5CC07 Secure AuditingandDeduplicatingDatainCloud CT5CC08 Space-efficientVerifiable SecretSharingUsingPolynomialInterpolation CT5CC09 Smart CloudStorage Service SelectionBasedonFuzzyLogic,Theoryof Evidence andGame Theory CT5CC10 An efficientalgorithmforthe burstingof service-basedapplicationsinhybridClouds CT5CC11 Cloud-basedMultimediaContentProtectionSystem CT5CC12 OrchestratingBulkDataTransfersacross geo-distributeddatacenters CT5CC13 StealthyDenial of Service StrategyinCloudComputing CT5CC14 A Scalable andReliableMatchingService for Content-BasedPublish/SubscribeSystems CT5CC15 Energy-EfficientFault-TolerantDataStorage and ProcessinginMobile Cloud CT5CC16 SelCSP:A FrameworktoFacilitate Selectionof CloudService Providers CT5CC17 A DynamicSecure GroupSharingFrameworkinPublicCloudComputing CT5CC18 EnablingEfficientMulti-KeywordRankedSearchOverEncryptedMobileCloudData ThroughBlindStorage CT5CC19 EnablingFine-grainedMulti-keywordSearchSupportingClassifiedSub-dictionariesover EncryptedCloudData CT5CC20 Governance Model forCloudComputinginBuildingInformationManagement CT5CC21 PerformingInitiative DataPrefetchinginDistributedFile SystemsforCloudComputing CT5CC22 Proof of ownershipindeduplicatedcloudstorage withmobile device efficiency CT5CC23 SharedAuthorityBasedPrivacy-PreservingAuthenticationProtocol inCloudComputing CT5CC24 Cloud-Trust- a SecurityAssessmentModel forInfrastructure asaService (IaaS) Clouds CT5CC25 Cost-Effective AuthenticandAnonymousData SharingwithForwardSecurity CT5CC26 Secure OptimizationComputationOutsourcinginCloudComputingA Case Studyof Linear Programming CT5CC27 T-brokerA Trust-aware Service BrokeringSchemeforMultiple CloudCollaborative Services CT5CC28 PandaPublicAuditingforSharedDatawithEfficientUserRevocationinthe Cloud CT5CC29 DecentralizedComputationOffloadingGame forMobile CloudComputing DATA MINING & WEB MINING CT5DM01 PAGE A PartitionAware Engine forParallel GraphComputation CT5DM02 QueryAware Determinizationof UncertainObjects CT5DM03 TowardsEffective BugTriage withSoftware DataReductionTechniques CT5DM04 CAHR: A ContextuallyAdaptiveHome-BasedRehabilitationFramework CT5DM05 PAGE: A PartitionAware Engine for Parallel GraphComputation
  • 2. CT5DM06 EntityLinkingwithaKnowledge Base:Issues,Techniques,andSolutions CT5DM07 Discoveryof RankingFraudfor Mobile Apps CT5DM08 Rule-BasedMethodforEntityResolution CT5DM09 SubgraphMatching withSetSimilarity inaLarge Graph Database CT5DM10 Active LearningforRankingthroughExpectedLossOptimization CT5DM11 ePeriodicity:MiningEventPeriodicityfromIncomplete Observations CT5DM12 KeywordSearchOverProbabilisticRDFGraphs CT5DM13 Aggregate EstimationinHiddenDatabaseswithCheckboxInterfaces CT5DM14 EfficientReverse Top-kBooleanSpatial KeywordQueriesonRoadNetworks CT5DM15 k-NearestNeighborClassificationoverSemanticallySecure EncryptedRelational Data CT5DM16 Topological TransformationApproachestoDatabase QueryProcessing CT5DM17 A RankingApproachonLarge-Scale GraphWith Multidimensional Heterogeneous Information CT5DM18 Rank-BasedSimilaritySearchReducingthe Dimensional Dependence CT5DM19 Distributed Multi-AgentOnline LearningBasedonGlobal Feedback CT5DM20 EfficientMotif DiscoveryforLarge-scaleTime SeriesinHealthcare CT5DM21 TrustedPerformance AnalysisonSystemsWithaSharedMemory CT5DM22 EfficientAlgorithmsforMiningthe Concise and LosslessRepresentationof HighUtility Itemsets CT5DM23 Relational Collaborative TopicRegressionforRecommenderSystems CT5DM24 ConstructingQuery-DrivenDynamicMachine LearningModel WithApplicationtoProtein- LigandBindingSitesPrediction CT5DM25 ImprovingWebNavigationUsabilitybyComparingActual andAnticipatedUsage CT5DM26 Network-BasedModelingandIntelligentDataMiningof Social MediaforImprovingCare CT5DM27 Qualityof Experience User’sPerceptionaboutWebServices CT5DM28 Real-Time Detectionof TrafficFromTwitterStreamAnalysis IMAGE PROCESSING CT5IP01 DetectionandRectificationof DistortedFingerprints CT5IP02 Learningto RankImage Tags withLimitedTrainingExamples CT5IP03 Single Image Super-ResolutionBasedon GradientProfileSharpness INFORMATION FORENSICS AND SECURITY CT5IS01 A Privacy-PreservingFrameworkforLarge-Scale Content-BasedInformationRetrieval PARALLEL AND DISTRIBUTED CT5PD01 A Secure andDynamicMulti-keywordRankedSearchScheme overEncryptedCloudData CT5PD02 Cost-MinimizingDynamicMigrationof ContentDistributionServicesintoHybridClouds CT5PD03 FRAppEDetectingMaliciousFacebookApplications MOBILE COMPUTING CT5MC01 Distortion-Aware ConcurrentMultipathTransfer forMobile VideoStreamingin HeterogeneousWirelessNetworks CT5MC02 Game-TheoreticTopologyControlforOpportunisticLocalizationinSparse Underwater SensorNetworks
  • 3. CT5MC03 JointOptimal DataRate andPowerAllocationinLossyMobile AdHocNetworkswith Delay-ConstrainedTraffics CT5MC04 FriendbookA Semantic-BasedFriendRecommendationSystemforSocial Networks CT5MC05 Wormhole AttackDetectionAlgorithmsinWirelessNetworkCodingSystems CT5MC06 Adaptive AlgorithmsforDiagnosingLarge-ScaleFailuresinComputerNetworks CT5MC07 Aggregated-Proof BasedHierarchical AuthenticationScheme forthe Internetof Things CT5MC08 AuthenticatedKeyExchange ProtocolsforParallel NetworkFile Systems CT5MC09 Cost-Aware SEcure Routing(CASER) Protocol DesignforWirelessSensorNetworks CT5MC10 DecentralizedComputationOffloadingGame forMobile CloudComputing CT5MC11 Improvingthe NetworkLifetime of MANETsthroughCooperative MACProtocol Design CT5MC12 Innovative SchemesforResource Allocation inthe CloudforMediaStreamingApplications CT5MC13 RoutingPressure A Channel-RelatedandTraffic-Aware Metricof RoutingAlgorithm CT5MC14 Secure andDistributedDataDiscoveryandDisseminationinWirelessSensorNetworks CT5MC15 Secure andReliable RoutingProtocolsforHeterogeneousMultihopWirelessNetworks CT5MC16 Interference-BasedTopologyControl AlgorithmforDelay-ConstrainedMobile AdHoc Networks CT5MC17 Self-OrganizingResource ManagementFrameworkinOFDMA Femtocells CT5MC18 Max ContributionAnOnlineApproximationof OptimalResource AllocationinDelay TolerantNetworks WEB SERVICES CT5WS01 ConstructingQuery-DrivenDynamicMachine LearningModel WithApplicationtoProtein- LigandBindingSitesPrediction CT5WS02 ImprovingWebNavigationUsabilitybyComparingActual andAnticipatedUsag CT5WS03 Network-BasedModelingandIntelligentDataMiningof Social MediaforImprovingCare CT5WS04 Qualityof Experience User’sPerceptionaboutWebServices CT5WS05 AutomaticWeb Service CompositionBasedonUncertaintyExecutionEffects CT5WS06 Constructinga Global Social Service NetworkforBetterQualityof WebService Discovery CT5WS07 Data-DrivenCompositionforService-OrientedSituationalWebApplications CT5WS08 DesigningHighPerformanceWeb-BasedComputingServicestoPromote Telemedicine Database ManagementSystem CT5WS09 DiversifyingWebServiceRecommendationResultsviaExploringService Usage History NETWORKING CT5NW01 A TopologyPotential-BasedMethodforIdentifyingEssentialProteinsfromPPINetworks CT5NW02 ReceiverCooperationinTopologyControlforWirelessAd-HocNetworks CT5NW03 DelayOptimizationandCross-LayerDesigninMultihopWirelessNetworksWithNetwork CodingandSuccessive Interference Cancelation CT5NW04 EnergyEfficientVirtual NetworkEmbeddingforCloudNetworks CT5NW05 Statistical DisseminationControl inLarge Machine-to-Machine CommunicationNetworks CT5NW06 DistributedDenialof Service AttacksinSoftware-DefinedNetworkingwithCloud Computing CT5NW07 NeighborSimilarityTrustagainstSybil AttackinP2PE-Commerce CT5NW08 Passive IPTracebackDisclosingthe Locationsof IPSpoofersFromPathBackscatter CT5NW09 SecurityOptimizationof DynamicNetworkswithProbabilisticGraphModelingandLinear