Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

2013 2014 ieee project titles


Published on

2013-2014 IEEE PROJECT TITLES, 2013 ieee projects, 2013 ieee java projects, 2013 ieee dotnet projects, 2013 ieee android projects, 2013 ieee matlab projects, 2013 ieee embedded projects, 2013 ieee robotics projects, 2013 IEEE EEE PROJECTS, 2013 IEEE POWER ELECTRONICS PROJECTS, ieee 2013 android projects, ieee 2013 java projects, ieee 2013 dotnet projects, 2013 ieee mtech projects, 2013 ieee btech projects, 2013 ieee be projects, ieee 2013 projects for cse, 2013 ieee cse projects, 2013 ieee it projects, 2013 ieee ece projects, 2013 ieee mca projects, 2013 ieee mphil projects, pondicherry ieee projects, best project centre in pondicherry, bulk ieee projects, jpinfotech ieee projects, jp infotech pondicherry, latest ieee projects, ieee projects for mtech, ieee projects for btech, ieee projects for mphil, ieee projects for be, ieee projects, student projects, students ieee projects, ieee proejcts india, ms projects, bits pilani ms projects, uk ms projects, ms ieee projects, ieee android real time projects, 2013 mtech projects, 2013 mphil projects, 2013 ieee projects with source code, pondicherry mtech projects, jpinfotech ieee projects, ieee projects, 2013 ieee project source code, journal paper publication guidance, conference paper publication guidance, ieee project, free ieee project, ieee projects for students., 2013 ieee omnet++ projects, ieee 2013 oment++ project, innovative ieee projects, latest ieee projects, 2013 latest ieee projects, ieee cloud computing projects, 2013 ieee cloud computing projects, 2013 ieee networking projects, ieee networking projects, 2013 ieee data mining projects, ieee data mining projects, 2013 ieee network security projects, ieee network security projects, 2013 ieee image processing projects, ieee image processing projects, ieee parallel and distributed system projects, ieee information security projects, 2013 wireless networking projects ieee, 2013 ieee web service projects, 2013 ieee soa projects, ieee 2013 vlsi projects

Published in: Education, Technology
  • Be the first to comment

2013 2014 ieee project titles

  1. 1. 2013 - 2014 IEEE Projects @ JP iNFOTeCHJAVACLOUD COMPUTINGA Stochastic Model to Investigate Data Center Performance and QoS in IaaS CloudComputing SystemsCloudMoV: Cloud-based Mobile Social TVDynamic Resource Allocation Using Virtual Machines for Cloud Computing EnvironmentError-Tolerant Resource Allocation and Payment Minimization for Cloud SystemHarnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear EquationsMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudPACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPrivacy-Preserving Public Auditing for Secure Cloud StorageScalable and Secure Sharing of Personal Health Records in Cloud Computing UsingAttribute-Based EncryptionSimple and Effective Dynamic Provisioning for Power-Proportional Data CentersKNOWLEDGE AND DATA ENGINEERINGA Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional DataA New Algorithm for Inferring User Search Goals with Feedback SessionsAnnotating Search Results from Web Databases
  2. 2. Anomaly Detection via Online Over-Sampling Principal Component AnalysisDistributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networksm-Privacy for Collaborative Data PublishingProtecting Sensitive Labels in Social Network Data AnonymizationTweet Analysis for Real-Time Event Detection and Earthquake Reporting SystemDevelopmentSECURE COMPUTINGEAACK—A Secure Intrusion-Detection System for MANETsIdentity-Based Secure Distributed Data Storage SchemesModeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable LinksNICE: Network Intrusion Detection and Countermeasure Selection in Virtual NetworkSystemsPrivacy Preserving Data Sharing With Anonymous ID AssignmentSecuring Class Initialization in Java-like LanguagesSecurity Analysis of a Single Sign-On Mechanism for Distributed Computer NetworksSORT: A Self-ORganizing Trust Model for Peer-to-Peer SystemsWARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in TwitterStream
  3. 3. NETWORKINGA Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor NetworksDelay-Based Network Utility MaximizationDynamic Control of Coding for Progressive Packet Arrivals in DTNsPARALLEL AND DISTRIBUTED SYSTEMSA Secure Protocol for Spontaneous Wireless Ad Hoc Networks CreationEnabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage SystemsIP-Geolocation Mapping for Moderately Connected Internet RegionsOptimal Client-Server Assignment for Internet Distributed SystemsMOBILE COMPUTINGContent Sharing over Smartphone-Based Delay-Tolerant NetworksDCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency inWireless Mobile NetworksDiscovery and Verification of Neighbor Positions in Mobile Ad Hoc NetworksEfficient Rekeying Framework for Secure Multicast with Diverse-Subscription-PeriodMobile Users
  4. 4. PATTERN ANALYSIS AND MACHINE INTELLIGENCEA Framework for Mining Signatures from Event Sequences and Its Applications inHealthcare DataSERVICES COMPUTINGA Decentralized Service Discovery Approach on Peer-to-Peer NetworksPersonalized QoS-Aware Web Service Recommendation and VisualizationPrivacy-Enhanced Web Service CompositionSOFTWARE ENGINEERINGWhole Test Suite Generation
  5. 5. 2013 - 2014 IEEE Projects @ JP iNFOTeCHDOT NETCLOUD COMPUTINGA Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective PrivacyPreserving of Intermediate Data Sets in CloudAn Adaptive Cloud Downloading ServiceEnabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage SystemsMona: Secure Multi-Owner Data Sharing for Dynamic Groups in the CloudOn Data Staging Algorithms for Shared Data Accesses in CloudsOptimal Multiserver Configuration for Profit Maximization in Cloud ComputingPrivacy-Preserving Public Auditing for Secure Cloud StorageQoS Ranking Prediction for Cloud ServicesScalable and Secure Sharing of Personal Health Records in Cloud Computing UsingAttribute-Based EncryptionToward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production CloudComputing SystemsTowards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
  6. 6. KNOWLEDGE AND DATA ENGINEERINGA New Algorithm for Inferring User Search Goals with Feedback SessionsA Survey of XML Tree PatternsDynamic Personalized Recommendation on Sparse DataMining User Queries with Markov Chains: Application to Online Image RetrievalTrustedDB: A Trusted Hardware based Database with Privacy and Data ConfidentialitySECURE COMPUTINGA Rank Correlation Based Detection against Distributed Reflection DoS Attacks.EAACK—A Secure Intrusion-Detection System for MANETsEnforcing Secure and Privacy-Preserving Information Brokering in Distributed InformationSharingModeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable LinksPrivacy Preserving Data Sharing With Anonymous ID AssignmentSORT: A Self-ORganizing Trust Model for Peer-to-Peer SystemsNETWORKINGA Distributed Control Law for Load Balancing in Content Delivery NetworksA Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor NetworksAn Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad HocNetworks
  7. 7. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City EnvironmentsEfficient Algorithms for Neighbor Discovery in Wireless NetworksLocalization of Wireless Sensor Networks in the Wild: Pursuit of Ranging QualityResource Allocation for QoS Support in Wireless Mesh NetworksPARALLEL AND DISTRIBUTED SYSTEMSA Secure Payment Scheme with Low Communication and Processing Overhead forMultihop Wireless NetworksMulticast Capacity in MANET with Infrastructure SupportSPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare EmergencyMOBILE COMPUTINGAdaptive Position Update for Geographic Routing in Mobile Ad Hoc NetworksCooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional GameApproachEMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc NetworksOptimal Multicast Capacity and Delay Tradeoffs in MANETsRelay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless SensorNetworks
  8. 8. IMAGE PROCESSINGQuery-Adaptive Image Search With Hash CodesReversible Data Hiding With Optimal Value TransferReversible Watermarking Based on Invariant Image Classification and Dynamic HistogramShiftingLocal Directional Number Pattern for Face Analysis: Face and Expression RecognitionNoise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet TransformShrinkage