Final year IEEE projects for 2013-14
Upcoming SlideShare
Loading in...5
×
 

Final year IEEE projects for 2013-14

on

  • 1,165 views

Embedpark Projects : BE, MTech, DIPLOMA Projects for Final Year IEEE Projects ...

Embedpark Projects : BE, MTech, DIPLOMA Projects for Final Year IEEE Projects

Dear IT Aspirants ,
Greetings from Embedpark , Bangalore!!!
Embedpark Innovations pvt ltd, Bangalore offers Total Developement solutions and Embedpark Innovations projects for freshers, working professionals and corporate in the below mentioned technologies:-
Final Year Projects Include:
1. Embedded Systems(Embedded / ARM / PIC/ MC/ MP)
2. Robotics
3. Linux Based Projects
4. Developement on FPGA / VLSI
5. Android
6. Mobile Applications
7. Website Developement
8. Database Design and Applicatios
9. MS ASP.Net, C# .Net, VB.Net, VC++ .net
10.JAVA / Advance - Java Projct
11.Big Data Hadoop
12.PHP
Embedpark Innovations pvt ltd, Bangalore has a dedicated total Developement & solutions in the Industry.
For further IEEE Projects details about Embedded System , VLSI, Android, Dot net, JAVA for IEEE 2013-14 Projects,
Feel free to contact the concerned person mentioned below:
Contact:Name: Kumar Amar
Address: Embedpark Innovations Pvt.Ltd, #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block Bangalore, India-560011
Contact: 9886733705 / 9886289694

Statistics

Views

Total Views
1,165
Views on SlideShare
1,165
Embed Views
0

Actions

Likes
0
Downloads
15
Comments
1

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Final year IEEE projects for 2013-14 Final year IEEE projects for 2013-14 Document Transcript

  • Embedpark IEEE Projects For 2013-14 PROJECT TITLE SL DOMAIN 1 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data 2 CloudMoV: Cloud-based Mobile Social TV 3 m-Privacy for Collaborative Data Publishing 4 Crowdsourcing Predictors of Behavioral Outcomes 5 Spatial Approximate String Search 6 Facilitating Document Annotation Using Content And Querying Value 7 Incentive Compatible Privacy-Preserving Data Analysis 8 FoCUS Learning to Crawl Web Forums 9 ROBUST MODULE BASED DATA MANAGEMENT 10 A Probabilistic Approach to String Transformation 11 Comparable Entity Mining from Comparative Questions 12 Facilitating Effective User Navigation through Website Structure Improvement 13 PMSE A Personalized Mobile Search Engine 14 Fast Nearest Neighbor Search with Keywords 15 Secure Mining of Association Rules in Horizontally Distributed Databases 16 A System to Filter Unwanted Messages from OSN User Walls 17 A New Algorithm for Inferring User Search Goals with Feedback Sessions 18 Annotating Search Results from Web Databases 19 Anomaly Detection via Online Over-Sampling Principal Component Analysis 20 Distributed Processing of Probabilistic Top-k Queries in TECHNOLOGY KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 Wireless Sensor Networks 21 Protecting Sensitive Labels in Social Network Data Anonymization 22 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development 23 Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection 24 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 25 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 26 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 27 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 28 Preventing Private Information Inference Attacks on Social Networks 29 Multiparty Access Control for Online Social Networks Model and Mechanisms 30 Ranking on Data Manifold with Sink Points 31 A Methodology for Direct and Indirect Discrimination Prevention in Data Mining 32 A New Algorithm for Inferring User Search Goals with Feedback Sessions 33 A Survey of XML Tree Patterns 34 Dynamic Personalized Recommendation on Sparse Data 35 Mining User Queries with Markov Chains: Application to Online Image Retrieval 36 TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality 37 A Proxy-Based Approach to Continuous LocationBased Spatial Queries in Mobile Environments 38 Supporting Search-As-You-Type Using SQL in Databases 39 Ginix Generalized Inverted Index for Keyword Search DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 40 Secure Mining of Association Rules in Horizontally Distributed Databases 41 Evaluation for Keyword Search on Probabilistic XML Data 42 Dynamic Query Forms for Database Queries 43 Sampling Online Social Networks 44 Mining Order-Preserving Submatrices from Data with Repeated Measurements 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Privacy-Preserving Public Auditing for Secure Cloud Storage Winds of Change From Vendor Lock-In to the Meta Cloud Cloud computing for mobile users can offloading compution save energy AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds Mining Contracts for Business Events and Temporal Constraints in Service Engagements Collaboration in Multicloud Computing Environments: Framework and Security Issues A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing LargeScale Systems of Linear Equations Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Load Rebalancing for Distributed File Systems in Clouds Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Privacy Preserving Delegated Access Control in Public Clouds Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud An Adaptive Cloud Downloading Service KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING DOTNET DOTNET DOTNET DOTNET DOTNET JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING DOTNET CLOUD COMPUTING DOTNET CLOUD COMPUTING DOTNET JAVA DOTNET #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 65 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 66 QoS Ranking Prediction for Cloud Services 67 68 69 70 71 72 73 74 75 76 77 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data Dynamic Audit Services for Outsourced Storages in Clouds Attribute-based Access to Scalable Media in Cloudassisted Content Sharing Networks Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Privacy Preserving Delegated Access Control in Public Clouds Super-Resolution-based Inpainting Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information Scalable Face Image Retrieval using AttributeEnhanced Sparse Codewords Understanding the External Links of Video Sharing Sites: Measurement and Analysis 78 Query-Adaptive Image Search With Hash Codes 79 Reversible Data Hiding With Optimal Value Transfer 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Noise Reduction Based on Partial-Reference, DualTree Complex Wavelet Transform Shrinkage Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization Local Linear SURE-Based Edge-Preserving Image Filtering Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs Two tales of privacy in online social networks Extracting Spread-Spectrum Hidden Data from Digital Media Utility-Privacy Tradeoff in Databases An Informationtheoretic Approach EAACK—A Secure Intrusion-Detection System for MANETs Identity-Based Secure Distributed Data Storage Schemes Modeling the Pairwise Key Predistribution Scheme in CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING CLOUD COMPUTING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING IMAGE PROCESSING MULTIMEDIA SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET JAVA JAVA JAVA JAVA DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 the Presence of Unreliable Links 94 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 95 Securing Class Initialization in Java-like Languages 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs Twitsper: Tweeting Privately Cross-Domain Privacy-Preserving Cooperative Firewall Optimization Privacy Preserving Data Sharing With Anonymous ID Assignment SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems Privacy Preserving Data Sharing With Anonymous ID Assignment Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Non-Cooperative Location Privacy Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption EAACK—A Secure Intrusion-Detection System for MANETs CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 111 Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems 112 A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud 113 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment 114 Towards Differential Query Services in Cost-Efficient Clouds 115 Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks 116 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 117 IP-Geolocation Mapping for Moderately Connected Internet Regions 118 SocialTube P2P-assisted Video Sharing in Online Social Networks COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 119 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 120 Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme 121 SybilDefender Defend Against Sybil Attacks in Large Social Networks 122 A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks 123 Multicast Capacity in MANET with Infrastructure Support 124 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 125 A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks 126 Attribute-Aware Data Aggregation Using PotentialBased Dynamic Routing n Wireless Sensor Networks 127 Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data 128 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 129 Secure and Efficient Data Transmission for Clusterbased Wireless Sensor Networks 130 Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks 131 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 132 Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks 133 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 134 135 136 137 138 139 140 Mobile Relay Configuration in Data-intensive Wireless Sensor Networks Vampire attacks:Draining life from wireless ad-hoc sensor networks Towards a Statistical Framework for Source Anonymity in Sensor Networks A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Distributed Cooperative Caching in Social Wireless Networks Community-Aware Opportunistic Routing in Mobile Social Networks Content Sharing over Smartphone-Based DelayTolerant Networks PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS WIRELESS COMMUNICATION S WIRELESS COMMUNICATION S MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING JAVA JAVA JAVA DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA JAVA #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System Optimal Content Downloading in Vehicular Networks Network-Assisted Mobile Computing with Optimal Uplink Query Processing Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach Relay Selection for Geographical Forwarding in SleepWake Cycling Wireless Sensor Networks A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Toward Accurate Mobile Sensor Network Localization in Noisy Environments Optimal Multicast Capacity and Delay Tradeoffs in MANETs On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks EMAP : Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Price Differentiation for Communication Networks Participatory Privacy Enabling Privacy in Participatory Sensing Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Access Policy Consolidation for Event Processing Systems SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks Delay-Based Network Utility Maximization Dynamic Control of Coding for Progressive Packet Arrivals in DTNs Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols On the Node Clone Detection in Wireless Sensor Networks Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Network MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING MOBILE COMPUTING NETWORKING JAVA JAVA JAVA JAVA DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET DOTNET JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA NETWORKING JAVA #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 170 171 172 173 174 175 176 177 178 179 180 181 182 A Distributed Control Law for Load Balancing in Content Delivery Networks An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments Efficient Algorithms for Neighbor Discovery in Wireless Networks Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality Resource Allocation for QoS Support in Wireless Mesh Networks A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With OrderOptimal Per-Flow Delay Transfer Reliability and Congestion Control Strategies in Opportunistic Networks A Survey The Target Tracking in Mobile Sensor Networks Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks A Decentralized Service Discovery Approach on Peerto-Peer Networks Personalized QoS-Aware Web Service Recommendation and Visualization 183 Privacy-Enhanced Web Service Composition 184 Cost-Based Optimization of Service Compositions 185 Evolution of Social Networks Based on Tagging Practices 186 Whole Test Suite Generation 187 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data 188 A Data-Mining Model for Protection of FACTS-Based Transmission Line 189 TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensing 190 Attribute-Based Encryption With Verifiable Outsourced Decryption 191 A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. 192 Fully Anonymous Profile Matching in Mobile Social Networks 193 Optimal Client-Server Assignment for Internet Distributed Systems NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET NETWORKING DOTNET SERVICE COMPUTING SERVICE COMPUTING SERVICE COMPUTING SERVICE COMPUTING SERVICE COMPUTING SOFTWARE ENGINEERING PATTERN ANALYSIS AND MACHINE INTELLIGENCE POWER DELIVERY INFORMATION FORENSICS AND SECURITY INFORMATION FORENSICS AND SECURITY INFORMATION FORENSICS AND SECURITY SELECTED AREAS IN COMMUNICATION CONFERENCE JAVA JAVA JAVA DOTNET DOTNET JAVA JAVA JAVA JAVA JAVA DOTNET JAVA JAVA #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 194 195 196 197 198 199 200 201 202 203 Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks Outsourcing Privacy-Preserving Social Networks to a Cloud Search Me If You Can Privacy-preserving Location Query Service Privacy against Aggregate Knowledge Attacks SUSIE Search using services and information extraction Gmatch Secure and Privacy-Preserving Group Matching in Social Networks A Log-based Approach to Make Digital Forensics Easier on Cloud Computing CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking 204 On the Role of Mobility for Multi-message Gossip 205 A Fast Re-Route Method 206 207 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks SeDas A Self-Destructing Data System Based on Active Storage Framework 208 Topological Conditions for In-Network Stabilization of Dynamical Systems 209 Secure Logging As a Service—Delegating Log Management to the Cloud 210 T-Drive: Enhancing Driving Directions with Taxi Driver Intelligence 211 Dynamic Personalized Recommendation on Sparse Data 212 Spatial Query Integrity with Voronoi Neighbors 213 MeetYou -- Social Networking on Android 214 A Proxy-Based Approach to Continuous LocationBased Spatial Queries in Mobile Environments 215 PMSE: A Personalized Mobile Search Engine 216 Crowdsourced Trace Similarity with Smartphones 217 Twitsper: Tweeting Privately CONFERENCE JAVA CONFERENCE JAVA CONFERENCE JAVA CONFERENCE JAVA CONFERENCE JAVA CONFERENCE DOTNET CONFERENCE DOTNET CONFERENCE DOTNET CONFERENCE DOTNET CONFERENCE DOTNET INFORMATION THEORY COMMUNICATION S LETTER JAVA JAVA COMMUNICATION S LETTER DOTNET MAGNETICS DOTNET SELECTED AREAS IN COMMUNICATION S SYSTEMS JOURNAL KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING (CONF) KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING KNOWLEDGE AND DATA ENGINEERING SECURE COMPUTING JAVA JAVA ANDROID ANDROID ANDROID ANDROID ANDROID ANDROID ANDROID ANDROID #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694
  • Embedpark IEEE Projects For 2013-14 218 219 220 221 222 223 224 225 Review of Behavior Malware Analysis for Android Research in Progress - Defending Android Smartphones from Malware Attacks Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud Collaborative Policy Administration SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Collaborative Learning Assistant for Android SECURE COMPUTING SECURE COMPUTING SECURE COMPUTING CLOUD COMPUTING PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS PARALLEL AND DISTRIBUTED SYSTEMS E LEARNING (CONF) ANDROID ANDROID ANDROID ANDROID ANDROID ANDROID ANDROID ANDROID #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block, Bangalore Email: embedpark@gmail.com www.embedpark.com Contact: 080-26630083/ 886733705/9886289694