SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
*************************************************************




                                     CLOUD COMPUTING



1. Cloud Computing for Agent-Based Urban Transportation Systems

2. Secure and Practical Outsourcing of Linear Programming in Cloud
   Computing

3. Enabling Public Auditability and Data Dynamics for Storage Security in
   Cloud Computing
*************************************************************




                                             MOBILE COMPUTING



1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc
   Networks




                                              NETWORKING

1. ProgME: Towards Programmable Network Measurement

2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop
   Wireless Networks

3. Buffer Sizing for 802.11 Based Networks

4. Caching Strategies Based on Information Density

5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
*************************************************************

6. A Unified Approach to Optimizing Performance in Networks Serving
   Heterogeneous Flows

7. Denial of Service Attacks in Wireless Networks: The Case of Jammers




                                       SECURE COMPUTING

1. SAT: A Security Architecture Achieving Anonymity and Traceability in
   Wireless Mesh Networks

2. Nymble- Blocking Misbehaving Users in Anonymizing Networks

3. Modeling and Detection of Camouflaging Worm.

4. Online Intrusion Alert Aggregation with Generative Data Stream
   Modeling.

5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks.

6. Towards Situational Awareness of Large-Scale Botnet Probing Events

7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING
   AND SELECTIVE EMBEDDING

8. Competitive Study of Cryptography Techniques over Block Cipher.

9. Analysis on Credit Card Fraud Detection Methods.
*************************************************************




                                        IMAGE PROCESSING

1. Additive Distortion in Steganography Using Syndrome-Trellis Codes

2. Subspace-Based Striping Noise Reduction in Hyperspectral Images.

3. Sketch4Match – Content-based Image Retrieval System Using Sketches.

4. Embedded Extended Visual Cryptography Schemes




                          KNOWLEDGE AND DATA ENGINEERING

1. Extended XML Tree Pattern Matching: Theories and Algorithms.

2. Ranking Spatial Data by Quality Preferences

3. Discovering Conditional Functional Dependencies
*************************************************************

4. Effective Navigation of Query Results Based on Concept Hierarchies.

5. Clustering with Multi-Viewpoint based Similarity Measure.




                                        WEB SERIVCE

1. Ontology Based Business Process Customization for Composite Web
   Services
*************************************************************




                                     CLOUD COMPUTING

1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud
   Data.

2. Data integrity proofs in cloud storage.

3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data
   Processing in the Cloud.

4. Optimal service pricing for a cloud cache.
*************************************************************




                                              NETWORKING

1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System
   Lifetime of Query-Based Wireless Sensor Networks

2. Distributed Adaptation of Quantized Feedback for Downlink Network
   MIMO Systems

3. Network Coding Based Privacy Preservation against Traffic Analysis in
   Multi-hop Wireless Networks

4. Continuous Neighbor Discovery in Asynchronous Sensor Networks

5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using
   Portfolio Selection

6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop
   Wireless Networks

7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless
   Sensor Networks
*************************************************************




                                       SECURE COMPUTING

1. Integration of Sound Signature in Graphical Password Authentication
  System

2. The Geometric Efficient Matching Algorithm for Firewalls

3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones
   by Flow Watermarking.

4. NABS Novel Approaches for Biometric Systems

5. Improving Offline Handwritten Text Recognition with Hybrid
   HMM/ANN Models
*************************************************************




                                        IMAGE PROCESSING

1. Minimizing Additive Distortion in Steganography Using Syndrome-
   Trellis Codes

2. A User-Oriented Image Retrieval System Based on Interactive Genetic
   Algorithm

3. Blind Image Watermarking Using a Sample Projection Approach

4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process
   Experts

5. Adaptive Spectral Transform for Wavelet-Based Color Image
   Compression

6. Facial Expression Recognition Using Facial Movement Features

7. Histogram Specification: A fast and flexible Method to process digital
   images
*************************************************************




                          KNOWLEDGE AND DATA ENGINEERING

1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining
   Analysis.

2. Bridging Socially-Enhanced Virtual Communities.

3. DATA LEAGAGE DETECTION.

4. Personalized Ontology Model for Web Information Gathering.

5. Efficient Computation of Range Aggregates against uncertain location
   based queries.

6. Scalable Learning of Collective Behavior.

7. The World in a Nutshell Concise Range Queries.

8. The Awareness Network, To Whom Should I Display My Actions And,
   Whose Actions.

9. Publishing Search Logs – A Comparative Study of Privacy Guarantees.

10.     One Size Does Not Fit All Towards User- and Query-Dependent
   Ranking For Web Databases.

11.      Monitoring Service Systems from a Language-Action Perspective.
*************************************************************

12.     Improving Aggregate Recommendation Diversity Using Ranking-
   Based Techniques.

13.   Exploring Application-Level Semantics for Data Compression.

14.   A Web Search Engine-Based Approach to Measure Semantic Similarity
      between Words.




                                           WEB SERIVCE

1. Adaptive Provisioning of Human Expertise in Service-oriented Systems.

2. Vulnerability Analysis in SOA-based Business Processes.

3.    Detecting Kernel-Level Root kits Using Data Structure Invariants

Contenu connexe

Tendances

Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Mumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects listMumbai Academisc
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvrtechnologies Nellore
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEEGLOBALSOFTSTUDENTPROJECTS
 

Tendances (14)

2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Android titles
Android titlesAndroid titles
Android titles
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titles
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
 

En vedette

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...JPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsJPINFOTECH JAYAPRAKASH
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...JPINFOTECH JAYAPRAKASH
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...JPINFOTECH JAYAPRAKASH
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationJPINFOTECH JAYAPRAKASH
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsJPINFOTECH JAYAPRAKASH
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...JPINFOTECH JAYAPRAKASH
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemJPINFOTECH JAYAPRAKASH
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesJPINFOTECH JAYAPRAKASH
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...JPINFOTECH JAYAPRAKASH
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...JPINFOTECH JAYAPRAKASH
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service compositionJPINFOTECH JAYAPRAKASH
 

En vedette (18)

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighbors
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service composition
 

Similaire à Bulk ieee projects

2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titlesMukundhan Elumalai
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titlesMukundhan Elumalai
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- itElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- itElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 

Similaire à Bulk ieee projects (20)

Software project list
Software project listSoftware project list
Software project list
 
2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titles
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 

Dernier

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 

Dernier (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 

Bulk ieee projects

  • 1. ************************************************************* CLOUD COMPUTING 1. Cloud Computing for Agent-Based Urban Transportation Systems 2. Secure and Practical Outsourcing of Linear Programming in Cloud Computing 3. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  • 2. ************************************************************* MOBILE COMPUTING 1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks NETWORKING 1. ProgME: Towards Programmable Network Measurement 2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks 3. Buffer Sizing for 802.11 Based Networks 4. Caching Strategies Based on Information Density 5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
  • 3. ************************************************************* 6. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows 7. Denial of Service Attacks in Wireless Networks: The Case of Jammers SECURE COMPUTING 1. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks 2. Nymble- Blocking Misbehaving Users in Anonymizing Networks 3. Modeling and Detection of Camouflaging Worm. 4. Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks. 6. Towards Situational Awareness of Large-Scale Botnet Probing Events 7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING 8. Competitive Study of Cryptography Techniques over Block Cipher. 9. Analysis on Credit Card Fraud Detection Methods.
  • 4. ************************************************************* IMAGE PROCESSING 1. Additive Distortion in Steganography Using Syndrome-Trellis Codes 2. Subspace-Based Striping Noise Reduction in Hyperspectral Images. 3. Sketch4Match – Content-based Image Retrieval System Using Sketches. 4. Embedded Extended Visual Cryptography Schemes KNOWLEDGE AND DATA ENGINEERING 1. Extended XML Tree Pattern Matching: Theories and Algorithms. 2. Ranking Spatial Data by Quality Preferences 3. Discovering Conditional Functional Dependencies
  • 5. ************************************************************* 4. Effective Navigation of Query Results Based on Concept Hierarchies. 5. Clustering with Multi-Viewpoint based Similarity Measure. WEB SERIVCE 1. Ontology Based Business Process Customization for Composite Web Services
  • 6. ************************************************************* CLOUD COMPUTING 1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. 2. Data integrity proofs in cloud storage. 3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. 4. Optimal service pricing for a cloud cache.
  • 7. ************************************************************* NETWORKING 1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks 2. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems 3. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks 4. Continuous Neighbor Discovery in Asynchronous Sensor Networks 5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection 6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks 7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
  • 8. ************************************************************* SECURE COMPUTING 1. Integration of Sound Signature in Graphical Password Authentication System 2. The Geometric Efficient Matching Algorithm for Firewalls 3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. 4. NABS Novel Approaches for Biometric Systems 5. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models
  • 9. ************************************************************* IMAGE PROCESSING 1. Minimizing Additive Distortion in Steganography Using Syndrome- Trellis Codes 2. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm 3. Blind Image Watermarking Using a Sample Projection Approach 4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts 5. Adaptive Spectral Transform for Wavelet-Based Color Image Compression 6. Facial Expression Recognition Using Facial Movement Features 7. Histogram Specification: A fast and flexible Method to process digital images
  • 10. ************************************************************* KNOWLEDGE AND DATA ENGINEERING 1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis. 2. Bridging Socially-Enhanced Virtual Communities. 3. DATA LEAGAGE DETECTION. 4. Personalized Ontology Model for Web Information Gathering. 5. Efficient Computation of Range Aggregates against uncertain location based queries. 6. Scalable Learning of Collective Behavior. 7. The World in a Nutshell Concise Range Queries. 8. The Awareness Network, To Whom Should I Display My Actions And, Whose Actions. 9. Publishing Search Logs – A Comparative Study of Privacy Guarantees. 10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases. 11. Monitoring Service Systems from a Language-Action Perspective.
  • 11. ************************************************************* 12. Improving Aggregate Recommendation Diversity Using Ranking- Based Techniques. 13. Exploring Application-Level Semantics for Data Compression. 14. A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. WEB SERIVCE 1. Adaptive Provisioning of Human Expertise in Service-oriented Systems. 2. Vulnerability Analysis in SOA-based Business Processes. 3. Detecting Kernel-Level Root kits Using Data Structure Invariants