IEEE Projects Final List
No Project Name Domain
1 Jamming-Aware Traffic Allocation For Multiple-Path Routing
Using Portfol...
17 Closing The Loop In Webpage Understanding Data Engineering
18 Automatic Discovery Of Personal Name Aliases From The Web...
29 Robust Correlation Of Encrypted Attack Traffic Through Stepping
Stones By Flow Watermarking
Image Processing
30 On the ...
Global tech project list
Global tech project list
Global tech project list
Global tech project list
Upcoming SlideShare
Loading in …5
×

Global tech project list

474 views

Published on

GlobaTech Solutions Call 09423222949 // 09823467071

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
474
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Global tech project list

  1. 1. IEEE Projects Final List No Project Name Domain 1 Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection Networking 2 A New Cell-Counting-Based Attack Against Tor Networking 3 Cooperative Download In Vehicular Environments Networking 4 Data Delivery Properties Of Human Contact Networks Networking 5 Self-Reconfigurable Wireless Mesh Networks Networking 6 Reliability In Layered Networks With Random Link Failures Networking 7 Load-Balancing Multipath Switching System with Flow Slice Networking 8 Achieving Secure, Scalable, And Fine-Grained Data Access Control In Cloud Computing Cloud Computing 9 Privacy-Preserving Public Auditing For Data Storage Security In Cloud Computing Cloud Computing 10 Fuzzy Keyword Search Over Encrypted Data In Cloud Computing Cloud Computing 11 Cloud Computing Security: From Single To Multi-Clouds Cloud Computing 12 Automatic protocol blocker for privacy preserving public auditing in cloud computing Cloud Computing 13 Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Cloud Computing 14 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Cloud Computing 15 Publishing Search Logs – A Comparative Study Of Privacy Guarantees Data Engineering 16 Horizontal Aggregations In SQL To Prepare Data Sets For Data Mining Analysis Data Engineering
  2. 2. 17 Closing The Loop In Webpage Understanding Data Engineering 18 Automatic Discovery Of Personal Name Aliases From The Web Data Engineering 19 A Personalized Ontology Model For Web Information Gathering Data Engineering 20 Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption Data Engineering 21 Efficient Computation of Range Aggregates against Uncertain Location Based Queries Data Engineering 22 Hiding Sensitive Association Rule For Privacy Preservation Security 23 Authentication Schemes For Session Passwords Using Color And Images Security 24 Separable Reversible Data Hiding In Encrypted Image Security 25 Implicit Password Authentication System Security 26 Data Hiding In Motion Vectors Of Compressed Video Based On Their Associated Prediction Error Security 27 Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points Security 28 A Probabilistic Model Of (T, N) Visual Cryptography Scheme With Dynamic Group Security
  3. 3. 29 Robust Correlation Of Encrypted Attack Traffic Through Stepping Stones By Flow Watermarking Image Processing 30 On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking Image Processing 31 Semi supervised Biased Maximum Margin Analysis For Interactive Image Retrieval Image Processing 32 Three-Dimensional Password For More Secure Authentication Image Processing 33 Optimal Stochastic Location Updates In Mobile Ad Hoc Networks Mobile Computing 34 Mabs: Multicast Authentication Based On Batch Signature Mobile Computing 35 Random Cast: An Energy Efficient Communication Scheme For Mobile Ad Hoc Networks Mobile Computing 36 Monitoring Service Systems From A Language-Action Perspective Service Computing 37 Online Intrusion Alert Aggregation With Generative Data Stream Modeling Service Computing 38 Dynamic Authentication For Cross-Realm SOA-Based Business Processes Service Computing 39 Identifying Content For Planned Events Across Social Media Sites Service Computing 40 Bridging Socially-Enhanced Virtual Communities Service Computing 41 Automated Certification For Compliant Cloud-Based Business Processes Data Mining 42 Slow Adaptive OFDMA Systems Through Chance Constrained Programming Signal Processing 43 Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud Parallel & Distributed 44 Anonymous Query Processing In Road Network Parallel & Distributed 45 Throughput Optimization In High Speed Downlink Packet Access (HSDPA) Wireless Communications 46 Analysis of P2P File Sharing Network Wireless Communications 47 Digital Image Watermarking Image Processing 48 Load-Balancing Multipath Switching System with Flow Slice Data Mining 49 Vulnerability Analysis in SOA-based Business Processes Data Mining 50 A Fast Clustering-Based Feature Subset 51 A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud

×