Final year M.E IEEE PROJECTS TITLES 2014-2015 Final year IEEE PROJECTS TITLES 2014-2015 Final year M.TECH IEEE PROJECTS TITLES 2014-2015 Final year B.E IEEE
1. PROJECT NAME DOMAIN
1. A Link-Based Cluster Ensemble Approach For Categorical Data Clustering Data Mining
2. A Semi-Automatic Approach for Extracting Software Product Lines Software
Engineering
3. 1 Ensuring Distributed Accountability for Data Sharing in the Cloud Cloud Computing
4. Cooperative Provable Data Possession for Integrity Verification in Multi-
Cloud Storage
Cloud Computing
5. Cloud Data Protection for Masses Cloud Computing
6. Cloud Computing Security From Single to Multi-Clouds Cloud Computing
7. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable
Access Control in Cloud Computing
Cloud Computing
8. Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing
9. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks Cloud Computing
10. Slicing: A New Approach to Privacy Preserving Data Publishing Data Mining
11. Ranking Model Adaptation for Domain-Specific Search Data Mining
12. Confucius: A Tool Supporting Collaborative Scientific Workflow
Composition.
Data Mining
13. Multiparty Access Control for Online Social Networks: model and
mechanisms
Data Mining
14. Organizing User Search Histories Data Mining
15. Clustering With Multi View Point – Based Similarity Measure Data Mining
16. Outsourced Similarity Search on Metric Data Assets Data Mining
17. Efficient Fuzzy Type – A Head Search In Xml Data Data Mining
18. Statistical Entity Extraction from Web Data Mining
19. Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks Image Processing
20. Game-Theoretic Pricing for Video Streaming in Mobile Networks Mobile Computing
21. Self Adaptive Contention Aware Routing Protocol For Intermittently
Connected Mobile Networks
Mobile Computing
2. 22. Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Mobile Computing
23. On Optimizing Overlay Topologies For Search In Unstructured Peer To Peer
Networks
Mobile Computing
24. Fast Data Collection in Tree-Based Wireless Sensor Networks Mobile Computing
25. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Mobile Computing
26. Learn to Personalized Image Search from the Photo Sharing Websites Multimedia
27. Packet Loss Control Using Tokens at the Network Edge Networking
28. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P
System
Networking
29. Catching Packet Droppers and Modifiers in Wireless Sensor Networks Networking
30. Distributed Packet Buffers For High Band Width Switches & Routers Networking
31. Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Networking
32. Foot Print Detecting Sybil Attacks In Urban Vehicular Networks Networking
33. Latency Equalization as a New Network Service
Primitive
Networking
34. Scalable and Cost-Effective Interconnection of Data-Center Servers Using
Dual Server Ports
Networking
35. A Network Coding Equivalent Content Distribution Scheme For Efficient Peer
To Peer Interactive Vod Streaming
Parallel &
Distributed Systems
36. Risk-Aware Mitigation for MANET Routing Attacks Secure Computing
37. Packet-Hiding Methods for Preventing Selective Jamming Attacks Secure Computing
38. Online Modeling of Proactive Moderation System for Auction Fraud Detection Secure Computing
39. Energy-Efficient Cooperative Distribution with Statistical QoS Provisions
Video Over Wireless Networks
Secure Computing
40. Modeling and Detection of Camouflaging Worm Secure Computing
41. Cut detection in wireless sensor networks Wireless Networks
42. Self-Interested Routing In Online Environment Wireless Networks
43. Secure And Practical Outsourcing Of Linear Programming In Cloud
Computing
Cloud Computing
3. 44. Client-side Load Balancer using Cloud Cloud Computing
45. A Fuzzy Self-Constructing Feature Clustering Algorithm For Text
Classification
Data Mining
46. Decision Trees for Uncertain Data Data Mining
47. Analysis on credit card fraud detection methods E-Commerce
48. Embedded Extended Visual Cryptography Schemes Secure Computing
49. Staying Connected in Mobile Healthcare System Mobile Computing
50. Design and Implementation of TARF: A Trust-Aware Routing Framework for
WSNs
Networking
51. Live Streaming With Receiver-Based Peer-Division Multiplexing Networking
52. Buffer Sizing in IEEE 802.11 networks Networking
53. Wireless Sensor Networks A Study on Congestion Wireless Networks
54. A Semi-Automatic Approach for Extracting Software Product Lines Software
Engineering
55. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks Cloud Computing
56. Statistical Entity Extraction from Web Data Mining
57. A Study on Certificate Revocation in Mobile Ad Hoc Networks Mobile Computing
58. An Efficient Density based Improved K- Medoids Clustering algorithm Data Mining
59. An Efficient Paging Scheme for Terminal Mobility using Personal Mobility
Management Information in Interworked Fixed and Mobile Networks
Data Mining
60. Caching Strategies Based on Information Density Estimation in Wireless Ad
Hoc Networks
Mobile Computing
61. Effective Navigation of Query Results Based on Concept Hierarchies Data Mining
62. Fast Simulation of Service Availability in Mesh Networks With Dynamic Path
Restoration
Networking
63. Improving Aggregate Recommendation Diversity Using Ranking-Based
Techniques
Data Mining
64. Integration of Sound Signature in Graphical Password Authentication System Networking
65. Online Intrusion Alert Aggregation with Generative Data Stream Modeling Secure Computing
66. A Privacy-Preserving Location Monitoring System for Wireless Sensor
Networks
Mobile Computing
4. 67. Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective
Embedding
Data Mining
68. The CoQUOS Approach to Continuous Queries in Unstructured Overlays Data Mining
69. Temporal Data Clustering via Weighted Clustering Ensemble with Different
Representations
Data Mining
70. Sketch4Match – Content-based Image Retrieval System Using Sketches Image Processing
71. Efficient Similarity Search over Encrypted Data
72.