Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

952 views

Published on

Engineering students needs IEEE based projects for their final year submissions. We provide these projects for BE, ME, PHD, MCS, MCA Students.

Published in: Engineering, Technology
  • Be the first to comment

  • Be the first to like this

IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

  1. 1. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 2013 - 2014 IEEE Projects ANDROID 1) OSA1301 - T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence 2) OSA1302 - Dynamic Personalized Recommendation on Sparse Data 3) OSA1303 - Spatial Query Integrity with Voronoi Neighbours 4) OSA1304 - MeetYou -- Social Networking on Android 5) OSA1305 -A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 6) OSA1306 - PMSE: A Personalized Mobile Search Engine 7) OSA1307 – Crowd-sourced Trace Similarity with Smartphones 8) OSA1308 - Twitsper: Tweeting Privately 9) OSA1309 - Review of Behaviour Malware Analysis for Android 10) OSA1310 - Research in Progress - Defending Android Smartphones from Malware Attacks 11) OSA1311 - Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs 12) OSA1312 - CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 13) OSA1313 - Collaborative Policy Administration 14) OSA1314 - SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 15) OSA1315- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 16) OSA1316 - Collaborative Learning Assistant for Android
  2. 2. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 2013 - 2014 IEEE Projects JAVA CLOUD COMPUTING 1) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2) CloudMoV: Cloud-based Mobile Social TV 3) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 4) Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 5) Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 6) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 7) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 8) Privacy-Preserving Public Auditing for Secure Cloud Storage 9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 10) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 11) A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 12) Load Rebalancing for Distributed File Systems in Clouds 13) Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 14) Privacy Preserving Delegated Access Control in Public Clouds 15) Attribute-Based Encryption with Verifiable Outsourced Decryption
  3. 3. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 KNOWLEDGE AND DATA ENGINEERING: 16) A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data 17) A New Algorithm for Inferring User Search Goals with Feedback Sessions 18) Annotating Search Results from Web Databases 19) Anomaly Detection via Online Over-Sampling Principal Component Analysis 20) Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 21) m-Privacy for Collaborative Data Publishing 22) Protecting Sensitive Labels in Social Network Data Anonymization 23) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development 24) Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection 25) A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 26) Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 27) Crowdsourcing Predictors of Behavioural Outcomes 28) Facilitating Document Annotation using Content and Querying Value 29) A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 30) A System to Filter Unwanted Messages from OSN User Walls 31) Anonymization of Centralized and Distributed Social Networks by Sequential Clustering. 32) Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers 33) Spatial Approximate String Search 34) Preventing Private Information Inference Attacks on Social Networks
  4. 4. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 35) Multiparty Access Control for Online Social Networks Model and Mechanisms 36) Incentive Compatible Privacy-Preserving Data Analysis SECURE COMPUTING: 37) EAACK—A Secure Intrusion-Detection System for MANETs 38) Identity-Based Secure Distributed Data Storage Schemes 39) Modelling the Pairwise Key Redistribution Scheme in the Presence of Unreliable Links 40) NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 41) Privacy Preserving Data Sharing With Anonymous ID Assignment 42) Securing Class Initialization in Java-like Languages 43) Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 44) SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems 45) WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream 46) Two tales of privacy in online social networks 47) Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs 48) Twitsper: Tweeting Privately 49) Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks 50) Cross-Domain Privacy-Preserving Cooperative Firewall Optimization NETWORKING: 51) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 52) Delay-Based Network Utility Maximization 53) Dynamic Control of Coding for Progressive Packet Arrivals in DTNs 54) Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
  5. 5. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 55) On the Node Clone Detection in Wireless Sensor Networks 56) Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power 57) Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 58) Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm 59) Participatory Privacy: Enabling Privacy in Participatory Sensing 60) Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks PARALLEL AND DISTRIBUTED SYSTEMS 61) A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 62) Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme 63) IP-Geolocation Mapping for Moderately Connected Internet Regions 64) Optimal Client-Server Assignment for Internet Distributed Systems 65) SocialTube P2P-assisted Video Sharing in Online Social Networks 66) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis MOBILE COMPUTING: 67) Content Sharing over Smartphone-Based Delay-Tolerant Networks 68) DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks 69) Discovery and Verification of Neighbour Positions in Mobile Ad Hoc Networks
  6. 6. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 70) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users 71) Toward a Statistical Framework for Source Anonymity in Sensor Networks 72) Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 73) Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 74) Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System PATTERN ANALYSIS AND MACHINE INTELLIGENCE: 75) A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data SERVICES COMPUTING: 76) A Decentralized Service Discovery Approach on Peer-to-Peer Networks 77) Personalized QoS-Aware Web Service Recommendation and Visualization 78) Privacy-Enhanced Web Service Composition SOFTWARE ENGINEERING: 79) Whole Test Suite Generation MULTIMEDIA: 80) Understanding the External Links of Video Sharing Sites: Measurement and Analysis
  7. 7. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 ****************** DOT NET CLOUD COMPUTING: 1) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud 2) An Adaptive Cloud Downloading Service 3) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 4) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 5) On Data Staging Algorithms for Shared Data Accesses in Clouds 6) Optimal Multi-server Configuration for Profit Maximization in Cloud Computing 7) Privacy-Preserving Public Auditing for Secure Cloud Storage 8) QoS Ranking Prediction for Cloud Services 9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 10) Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems 11) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data 12) A Log-based Approach to Make Digital Forensics Easier on Cloud Computing 13) Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks 14) CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 15) Privacy Preserving Delegated Access Control in Public Clouds 16) Dynamic Audit Services for Outsourced Storages in Clouds
  8. 8. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 KNOWLEDGE AND DATA ENGINEERING: 17) A New Algorithm for Inferring User Search Goals with Feedback Sessions 18) A Survey of XML Tree Patterns 19) Dynamic Personalized Recommendation on Sparse Data 20) Mining User Queries with Markov Chains: Application to Online Image Retrieval 21) TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality 22) A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 23) Supporting Search-As-You-Type Using SQL in Databases 24) Secure Mining of Association Rules in Horizontally Distributed Databases SECURE COMPUTING: 25) A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. 26) EAACK—A Secure Intrusion-Detection System for MANETs 27) Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 28) Modelling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links 29) Privacy Preserving Data Sharing With Anonymous ID Assignment 30) SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems NETWORKING: 31) A Distributed Control Law for Load Balancing in Content Delivery Networks
  9. 9. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 32) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 33) An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks 34) BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments 35) Efficient Algorithms for Neighbour Discovery in Wireless Networks 36) Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 37) Resource Allocation for QoS Support in Wireless Mesh Networks 38) A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay PARALLEL AND DISTRIBUTED SYSTEMS: 39) A Secure Payment Scheme with Low Communication and Processing Overhead for Multi-hop Wireless Networks 40) Multicast Capacity in MANET with Infrastructure Support 41) SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 42) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 43) Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks 44) A Probabilistic Misbehaviour Detection Scheme towards Efficient Trust Establishment in Delay- tolerant Networks 45) Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor Networks MOBILE COMPUTING: 46) Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
  10. 10. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 47) Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach 48) EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 49) Optimal Multicast Capacity and Delay Trade-offs in MANETs 50) Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks 51) A Neighbour Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks 52) Network-Assisted Mobile Computing with Optimal Uplink Query Processing 53) Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 54) On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 55) Toward Accurate Mobile Sensor Network Localization in Noisy Environments IMAGE PROCESSING: 56) Query-Adaptive Image Search with Hash Codes 57) Reversible Data Hiding With Optimal Value Transfer 58) Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting 59) Local Directional Number Pattern for Face Analysis: Face and Expression Recognition 60) Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage SERVICE COMPUTING (WEB SERVICE): 61) Cost-Based Optimization of Service Compositions 62) Evolution of Social Networks Based on Tagging Practices MULTIMEDIA: 63) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.

×