Bulk ieee projects

1,337 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,337
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bulk ieee projects

  1. 1. E-CRUITMENT SOLUTIONSIEEE 2013-14 BULKPROJECTSJAVAJ2EE*MATLAB*DOTNET*ANDROID*NS2Our Corporate Office#1, E-Cruitment Solutions,, IstCross, IstMain Road,Elango Nagar,Pondicherry-605 011.Mobile: 9751442511, 97506 101010Phone: 0413-3240330Mail :tech@ecruitments.com Web : www.ecruitments.com
  2. 2. E-CRUITMENT SOLUTIONSWe are offering IEEE & Non IEEE ProjectsIn various Domains includingIEEE Projects on Image ProcessingIEEE Projects on Knowledge and Data MiningIEEE Projects on NetworkingIEEE Projects on Artificial IntelligenceIEEE Projects on Audio and Video ProcessingIEEE Projects on Pattern Analysis & Machine IntelligenceIEEE Projects on MultimediaIEEE Projects on Parallel and Distributed SystemsIEEE Projects on Mobile ComputingIEEE Projects on Software EngineeringIEEE Projects on Information Forensics and SecurityIEEE Projects on Dependable and Secure ComputingIEEE Projects on Systems, Man & CyberneticsIEEE Projects on ComputersIEEE Projects on Learning Technologies
  3. 3. E-CRUITMENT SOLUTIONSPROJECT SUPPORTS & DELIVERABLES• Project Abstract• IEEE Paper• PPT / Review Details• Project Report• Working Procedure/ScreenShots• Materials & Books in CD• Project Certification
  4. 4. E-CRUITMENT SOLUTIONSIEEE 2013-14 JAVA PROJECTS ATECRUITMENTS SOLUTIONSCLOUD COMPUTING1. A Load Balancing Model Based on Cloud Partitioning for the PublicCloud2. Privacy-Preserving Public Auditing for Secure Cloud Storage3. Winds of Change From Vendor Lock-In to the Meta Cloud.4. Cloud computing for mobile users can offloading compution saveenergy.5. On Data Staging Algorithms for Shared Data Accesses in Clouds6. Enabling Dynamic Data and Indirect Mutual Trust for Cloud ComputingStorage Systems7. CloudMoV: Cloud-based Mobile Social TV8. QoS Ranking Prediction for Cloud Services9. Privacy-Preserving Public Auditing for Secure Cloud Storage10. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming andEfficient Social Video Sharing in the Clouds
  5. 5. E-CRUITMENT SOLUTIONSDATA MINING:1. A Fast Clustering-Based Feature Subset Selection Algorithm for HighDimensional Data2. A Framework for Mining Signatures from Event Sequences and ItsApplications in Healthcare Data3. A Novel Profit Maximizing Metric for Measuring ClassificationPerformance of Customer Churn Prediction Models4. A Survey of XML Tree Patterns5. Change Detection in Streaming Multivariate Data Using LikelihoodDetectors6. Dynamic Personalized Recommendation on Sparse Data7. Mining User Queries with Markov Chains: Application to Online ImageRetrieval8. Optimal Route Queries with Arbitrary Order Constraints9. Failure-Aware Cascaded Suppression in Wireless Sensor NetworksPARLLEL DISTRIBUTION1. IP-Geolocation Mapping for Moderately Connected Internet Regions
  6. 6. E-CRUITMENT SOLUTIONS2. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation3. Analysis of Distance-Based Location Management in WirelessCommunication Networks.4. Dynamic Resource Allocation Using Virtual Machines for CloudComputing Environment5. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds6. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s CityEnvironments7. Towards Differential Query Services in Cost-Efficient Clouds.8. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.9. Enabling Data Dynamic and Indirect Mutual Trust for Cloud ComputingStorage Systems.10. ASAP: An Adaptive Sampling Approach to Data Collection in SensorNetworks.
  7. 7. E-CRUITMENT SOLUTIONSMOBILE COMPUTING1. A Neighbor Coverage-Based Probabilistic Rebroadcast for ReducingRouting Overhead in Mobile Ad Hoc Networks2. EAACK—A Secure Intrusion-Detection System for MANETs3. Vampire attacks:Draining life from wireless ad-hoc sensor networks.4. Towards a Statistical Framework for Source Anonymity in SensorNetworks5. Relay Selection for Geographical Forwarding in Sleep-Wake CyclingWireless Sensor Networks6. Passive Duplicate Address-Detection Schemes for On-Demand RoutingProtocols in Mobile Ad Hoc Networks7. On Quality of Monitoring for Multi-channel Wireless InfrastructureNetworks8. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks9. IP-Geolocation Mapping for Moderately Connected Internet Regions10. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users11. EMAP: Expedite Message Authentication Protocol for Vehicular Ad HocNetworks
  8. 8. E-CRUITMENT SOLUTIONS12. Adaptive Position Update for Geographic Routing in Mobile Ad HocNetworksNETWORKING1. PACK: Prediction-Based Cloud Bandwidth and Cost ReductionSystem2. Novel Packet-Level Resource Allocation with Effective QoSProvisioning for Wireless Mesh Networks3. Localization of Wireless Sensor Networks in the Wild: Pursuit ofRanging Quality4. Exploring the Design Space of Multichannel Peer-to-Peer LiveVideo Streaming Systems5. Efficient Algorithms for Neighbor Discovery in Wireless Networks6. Diffusion Dynamics of Network Technologies With BoundedRational Users: Aspiration-Based Learning7. Answering “What-If” Deployment and Configuration QuestionsWith WISE: Techniques and Deployment Experience8. An Empirical Interference Modeling for Link ReliabilityAssessment in Wireless Networks9. An Efficient and Robust Addressing Protocol for NodeAutoconfiguration in Ad Hoc Networks
  9. 9. E-CRUITMENT SOLUTIONS10. A Rank Correlation Based Detection against DistributedReflection DoS Attacks11. Optimizing Cloud Resources for Delivering IPTV Servicesthrough Virtualization.12. Participatory Privacy Enabling Privacy in Participatory Sensing.SERVICE COMPUTING1. Privacy-Enhanced Web Service Composition2. Enforcing Secure and Privacy-Preserving Information Brokeringin Distributed Information Sharing3. NICE: Network Intrusion Detection and CountermeasureSelection in Virtual Network Systems4. Document Clustering for Forensic Analysis: An Approach forImproving Computer Inspection5. Enforcing Secure and Privacy-Preserving Information Brokeringin Distributed Information SharingSECURE COMPUTING
  10. 10. E-CRUITMENT SOLUTIONS1. CAM: Cloud-Assisted Privacy Preserving Mobile HealthMonitoring.2. Secure Encounter-based Mobile Social Networks RequirementsDesigns and Tradeoffs.3. Two tales of privacy in online social networks.IEEE 2013-14 DOTNET PROJECTS ATECRUITMENTS SOLUTIONSPARLLEL DISTRIBUTION1. Lightweight Location Verification Algorithms for Wireless SensorNetworks2. Heterogeneous Resource Allocation under Degree Constraints
  11. 11. E-CRUITMENT SOLUTIONS3. Harnessing the Cloud for Securely Outsourcing Large-ScaleSystems of Linear Equations4. GKAR: A Novel Geographic K-Anycast Routing for WirelessSensor Networks5. Error-Tolerant Resource Allocation and Payment Minimization forCloud System6. Dynamic Resource Allocation Using Virtual Machines for CloudComputing Environment7. Dynamic Optimization of Multiattribute Resource Allocation inSelf-Organizing Clouds8. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’sCity Environments9. ASAP: An Adaptive Sampling Approach to Data Collection inSensor Networks10. A New Progressive Algorithm for a Multiple Longest CommonSubsequences Problem and Its Efficient Parallelization11. A General Framework for Efficient Continuous MultidimensionalTop-k Query Processing in Sensor NetworksCLOUD COMPUITNG1. A Load Balancing Model Based on Cloud Partitioning for thePublic Cloud2. Privacy-Preserving Public Auditing for Secure Cloud Storage3. Scalable and Secure Sharing of Personal Health Records inCloud Computing Using Attribute-Based Encryption4. Enabling Dynamic Data and Indirect Mutual Trust for CloudComputing Storage Systems5. CloudMoV: Cloud-based Mobile Social TV6. Privacy Preserving Delegated Access Control in Public Clouds.7. Attribute-based Access to Scalable Media in Cloud-assistedContent Sharing Networks.
  12. 12. E-CRUITMENT SOLUTIONSDATA MINING1. A Fast Clustering-Based Feature Subset Selection Algorithm forHigh Dimensional Data2. Secure Mining of Association Rules in Horizontally DistributedDatabases.3. A Novel Profit Maximizing Metric for Measuring ClassificationPerformance of Customer Churn Prediction Models4. ELCA: Evaluation for Keyword Search on Probabilistic XML Data.5. Change Detection in Streaming Multivariate Data UsingLikelihood Detectors6. Evaluating Data Reliability An Evidential Answer with Applicationto a Web-Enabled Data Warehouse7. Clustering Sentence-Level Text Using a Novel Fuzzy RelationalClustering Algorithm8. Optimal Route Queries with Arbitrary Order Constraints9. Failure-Aware Cascaded Suppression in Wireless SensorNetworksMOBILE COMPUTING1. A Neighbor Coverage-Based Probabilistic Rebroadcast forReducing Routing Overhead in Mobile Ad Hoc Networks2. EAACK—A Secure Intrusion-Detection System for MANETs3. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users4. Toward Privacy Preserving and Collusion Resistance in aLocation Proof Updating System
  13. 13. E-CRUITMENT SOLUTIONS5. Passive Duplicate Address-Detection Schemes for On-DemandRouting Protocols in Mobile Ad Hoc Networks6. On Quality of Monitoring for Multi-channel Wireless InfrastructureNetworks7. Mobile Relay Configuration in Data-Intensive Wireless SensorNetworks8. IP-Geolocation Mapping for Moderately Connected InternetRegions9. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users10. EMAP: Expedite Message Authentication Protocol for VehicularAd Hoc NetworksNETWORKING1. PACK: Prediction-Based Cloud Bandwidth and Cost ReductionSystem2. Novel Packet-Level Resource Allocation with Effective QoSProvisioning for Wireless Mesh Networks3. Exploring the Design Space of Multichannel Peer-to-Peer LiveVideo Streaming Systems4. Diffusion Dynamics of Network Technologies With BoundedRational Users: Aspiration-Based Learning5. Delay-Based Network Utility Maximization6. Answering “What-If” Deployment and Configuration QuestionsWith WISE: Techniques and Deployment Experience
  14. 14. E-CRUITMENT SOLUTIONS7. An Empirical Interference Modeling for Link ReliabilityAssessment in Wireless Networks8. A Rank Correlation Based Detection against DistributedReflection DoS AttacksSERVICE COMPUTING1. Privacy-Enhanced Web Service Composition2. Enforcing Secure and Privacy-Preserving Information Brokering inDistributed Information Sharing3. NICE: Network Intrusion Detection and Countermeasure Selection inVirtual Network Systems4. Document Clustering for Forensic Analysis: An Approach for ImprovingComputer InspectionIEEE 2013-14 ANDROID PROJECTS ATECRUITMENTS SOLUTIONSPARLLEL DISTRIBUTION
  15. 15. E-CRUITMENT SOLUTIONS1. Distributed Web Systems Performance Forecasting Using TurningBands Method2. Scalable and Secure Sharing of Personal Health Records in CloudComputing Using Attribute-Based Encryption3. Security Analysis of a Single Sign-On Mechanism for DistributedComputer Networks4. Exploiting Ubiquitous Data Collection for Mobile Users in WirelessSensor Networks5. Analysis of Distance-Based Location Management in WirelessCommunication NetworksCLOUD COMPUITNG1. A Load Balancing Model Based on Cloud Partitioning for the PublicCloud2. Privacy-Preserving Public Auditing for Secure Cloud Storage3. Scalable and Secure Sharing of Personal Health Records in CloudComputing Using Attribute-Based Encryption4. Enabling Dynamic Data and Indirect Mutual Trust for Cloud ComputingStorage Systems5. CloudMoV: Cloud-based Mobile Social TV
  16. 16. E-CRUITMENT SOLUTIONSDATA MINING1. A Fast Clustering-Based Feature Subset Selection Algorithm for HighDimensional Data2. Finding Rare Classes Active Learning with Generative andDiscriminative Models3. A Generalized Flow-Based Method for Analysis of Implicit Relationshipson Wikipedia4. A Survey of XML Tree Patterns5. Anonymization of Centralized and Distributed Social Networks bySequential Clustering6. T-Drive Enhancing Driving Directions with Taxi Drivers� Intelligence7. Region-Based Foldings in Process Discovery8. Ranking on Data Manifold with Sink Points9. Evaluating Data Reliability An Evidential Answer with Application to aWeb-Enabled Data WarehouseMOBILE COMPUTING1. Discovery and Verification of Neighbor Positions in Mobile Ad HocNetworks
  17. 17. E-CRUITMENT SOLUTIONS2. Toward Privacy Preserving and Collusion Resistance in a LocationProof Updating System3. SSD A Robust RF Location Fingerprint Addressing Mobile Devices�Heterogeneity4. A Scalable Server Architecture for Mobile Presence Services in SocialNetwork Applications5. Target Tracking and Mobile Sensor Navigation in Wireless SensorNetworksSERVICE COMPUTING1. Enforcing Secure and Privacy-Preserving Information Brokering inDistributed Information Sharing2. Document Clustering for Forensic Analysis: An Approach for ImprovingComputer Inspection3. Enforcing Secure and Privacy-Preserving Information Brokering inDistributed Information SharingIEEE 2013-14 MATLAB PROJECTS ATECRUITMENTS SOLUTIONS
  18. 18. E-CRUITMENT SOLUTIONSIMAGE PROCESSING:1. A Hybrid Multiview Stereo Algorithm for Modeling Urban Scenes.2. Rich Intrinsic Image Decomposition of Outdoor Scenes from MultipleViews.3. Casual Stereoscopic Photo Authoring.4. Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images5. Estimating Information from Image Colors An Application to DigitalCameras and Natural Scenes.6. Airborne Vehicle Detection in Dense Urban Areas Using HoG Featuresand Disparity Maps.7. Automatic Detection and Reconstruction of Building Radar FootprintsFrom Single VHR SAR Images8. Estimating Information from Image Colors An Application to DigitalCameras and Natural Scenes.9. Hyperspectral Imagery Restoration Using Nonlocal Spectral-SpatialStructured Sparse Representation With Noise Estimation.10. Estimating Information from Image Colors An Application to DigitalCameras and Natural Scenes.
  19. 19. E-CRUITMENT SOLUTIONS11. Robust Face Recognition for Uncontrolled Pose and IlluminationChanges.12. Linear Distance Coding for Image Classi?cation.13. Reversible Watermarking Based on Invariant Image Classi?cation andDynamic Histogram Shifting14. Discrete Wavelet Transform and Data Expansion Reduction inHomomorphic Encrypted Domain.15. Secure Watermarkingfor Multimedia Content Protection.16. Extracting Spread-Spectrum Hidden Data from Digital Media.17. Image Size Invariant Visual Cryptography for General AccessStructures Subject to Display Quality Constraints.18. A Watermarking Based Medical Image Integrity Control System and anImage Moment Signature for Tampering Characterization19. Discrete Wavelet Transform and Data Expansion Reduction inHomomorphic Encrypted Domain.20. LDFT-Based Watermarking Resilient to Local DesynchronizationAttacks.21. Structured Output Layer Neural Network Language Models for SpeechRecognition.
  20. 20. E-CRUITMENT SOLUTIONSIEEE 2013-14 NS2 PROJECTS ATECRUITMENTS SOLUTIONS1. Toward Privacy Preserving and Collusion Resistance in a LocationProof Updating System2. Model-Based Analysis of Wireless System Architectures for Real-TimeApplications.3. Toward a Statistical Framework for Source Anonymity in SensorNetworks .4. On Exploiting Transient Social Contact Patterns for Data Forwarding inDelay-Tolerant Networks .5. Strategies for Energy-Efficient Resource Management of HybridProgramming Models.6. Capacity of Hybrid Wireless Mesh Networks with Random APs.7. EAACK � A Secure Intrusion-Detection System for MANETs.8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation .9. Distance Bounding A Practical Security Solution for Real-Time LocationSystems .10. Detection and Localization of Multiple Spoofing Attackers in WirelessNetworks.11. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks .12. Mobi-Sync Efficient Time Synchronization for Mobile UnderwaterSensor Networks .
  21. 21. E-CRUITMENT SOLUTIONS13. Discovery and Verification of Neighbor Positions in Mobile Ad HocNetworks .14. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network .15. In-Network Estimation with Delay Constraints in Wireless SensorNetwork .16. Harvesting-Aware Energy Management for Time-Critical WirelessSensor Networks With Joint Voltage and Modulation Scaling .17. Target Tracking and Mobile Sensor Navigation in Wireless SensorNetworks18. Network Traffic Classification Using Correlation Information .19.Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks .20. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body AreaNetworks21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body AreaNetworks.22. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks.23. Analysis of Distance-Based Location Management in WirelessCommunication Networks.24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAXRelay Networks.25. Quality-Differentiated Video Multicast in Multirate Wireless Networks

×