SlideShare a Scribd company logo
1 of 8
2013 - 2014 IEEE Projects @ JP iNFOTeCH
JAVA
CLOUD COMPUTING
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
CloudMoV: Cloud-based Mobile Social TV
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Privacy-Preserving Public Auditing for Secure Cloud Storage
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers
KNOWLEDGE AND DATA ENGINEERING
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
A New Algorithm for Inferring User Search Goals with Feedback Sessions
Annotating Search Results from Web Databases
Anomaly Detection via Online Over-Sampling Principal Component Analysis
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
m-Privacy for Collaborative Data Publishing
Protecting Sensitive Labels in Social Network Data Anonymization
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System
Development
SECURE COMPUTING
EAACK—A Secure Intrusion-Detection System for MANETs
Identity-Based Secure Distributed Data Storage Schemes
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems
Privacy Preserving Data Sharing With Anonymous ID Assignment
Securing Class Initialization in Java-like Languages
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter
Stream
NETWORKING
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
Delay-Based Network Utility Maximization
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
IP-Geolocation Mapping for Moderately Connected Internet Regions
Optimal Client-Server Assignment for Internet Distributed Systems
MOBILE COMPUTING
Content Sharing over Smartphone-Based Delay-Tolerant Networks
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in
Wireless Mobile Networks
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
A Framework for Mining Signatures from Event Sequences and Its Applications in
Healthcare Data
SERVICES COMPUTING
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Personalized QoS-Aware Web Service Recommendation and Visualization
Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERING
Whole Test Suite Generation
2013 - 2014 IEEE Projects @ JP iNFOTeCH
DOT NET
CLOUD COMPUTING
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
An Adaptive Cloud Downloading Service
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
On Data Staging Algorithms for Shared Data Accesses in Clouds
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
Privacy-Preserving Public Auditing for Secure Cloud Storage
QoS Ranking Prediction for Cloud Services
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud
Computing Systems
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
KNOWLEDGE AND DATA ENGINEERING
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A Survey of XML Tree Patterns
Dynamic Personalized Recommendation on Sparse Data
Mining User Queries with Markov Chains: Application to Online Image Retrieval
TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
SECURE COMPUTING
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
EAACK—A Secure Intrusion-Detection System for MANETs
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Sharing
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
Privacy Preserving Data Sharing With Anonymous ID Assignment
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
NETWORKING
A Distributed Control Law for Load Balancing in Content Delivery Networks
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc
Networks
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
Efficient Algorithms for Neighbor Discovery in Wireless Networks
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
Resource Allocation for QoS Support in Wireless Mesh Networks
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Payment Scheme with Low Communication and Processing Overhead for
Multihop Wireless Networks
Multicast Capacity in MANET with Infrastructure Support
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
MOBILE COMPUTING
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game
Approach
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor
Networks
IMAGE PROCESSING
Query-Adaptive Image Search With Hash Codes
Reversible Data Hiding With Optimal Value Transfer
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram
Shifting
Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform
Shrinkage

More Related Content

Viewers also liked

Meet you – social networking on android
Meet you – social networking on androidMeet you – social networking on android
Meet you – social networking on androidJPINFOTECH JAYAPRAKASH
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataJPINFOTECH JAYAPRAKASH
 
Collaborative learning assistant for android
Collaborative learning assistant for androidCollaborative learning assistant for android
Collaborative learning assistant for androidJPINFOTECH JAYAPRAKASH
 
Caching strategies based on information density estimation in wireless ad hoc...
Caching strategies based on information density estimation in wireless ad hoc...Caching strategies based on information density estimation in wireless ad hoc...
Caching strategies based on information density estimation in wireless ad hoc...JPINFOTECH JAYAPRAKASH
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...JPINFOTECH JAYAPRAKASH
 
final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013JPINFOTECH JAYAPRAKASH
 
Cloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloudCloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloudJPINFOTECH JAYAPRAKASH
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...JPINFOTECH JAYAPRAKASH
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksJPINFOTECH JAYAPRAKASH
 
2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotech2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotechJPINFOTECH JAYAPRAKASH
 
Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...JPINFOTECH JAYAPRAKASH
 
Supporting search as-you-type using sql in databases
Supporting search as-you-type using sql in databasesSupporting search as-you-type using sql in databases
Supporting search as-you-type using sql in databasesJPINFOTECH JAYAPRAKASH
 
Optimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computingOptimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computingJPINFOTECH JAYAPRAKASH
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksJPINFOTECH JAYAPRAKASH
 

Viewers also liked (17)

ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.ieee projects 2013 for m.tech.
ieee projects 2013 for m.tech.
 
Meet you – social networking on android
Meet you – social networking on androidMeet you – social networking on android
Meet you – social networking on android
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse data
 
Collaborative learning assistant for android
Collaborative learning assistant for androidCollaborative learning assistant for android
Collaborative learning assistant for android
 
Caching strategies based on information density estimation in wireless ad hoc...
Caching strategies based on information density estimation in wireless ad hoc...Caching strategies based on information density estimation in wireless ad hoc...
Caching strategies based on information density estimation in wireless ad hoc...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013
 
Cloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloudCloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloud
 
2015 2016 ieee matlab project titles
2015 2016 ieee matlab project titles2015 2016 ieee matlab project titles
2015 2016 ieee matlab project titles
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Resource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networksResource allocation for qo s support in wireless mesh networks
Resource allocation for qo s support in wireless mesh networks
 
2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotech2012 13 ece ieee projects - jp infotech
2012 13 ece ieee projects - jp infotech
 
2011 IEEE PROJECT TITLES
2011 IEEE PROJECT TITLES2011 IEEE PROJECT TITLES
2011 IEEE PROJECT TITLES
 
Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...Tweet analysis for real time event detection and earthquake reporting system ...
Tweet analysis for real time event detection and earthquake reporting system ...
 
Supporting search as-you-type using sql in databases
Supporting search as-you-type using sql in databasesSupporting search as-you-type using sql in databases
Supporting search as-you-type using sql in databases
 
Optimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computingOptimal multiserver configuration for profit maximization in cloud computing
Optimal multiserver configuration for profit maximization in cloud computing
 
Toward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networksToward a statistical framework for source anonymity in sensor networks
Toward a statistical framework for source anonymity in sensor networks
 

Similar to 2013 2014 ieee project titles

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcwaytechnoz
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titlesEcway2004
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titlesEcway2004
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwaytechnoz
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcway2004
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcwayt
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytechnoz
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titlesEcway2004
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titlesEcwaytech
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytech
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcway2004
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytechnoz
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titlesEcway2004
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwaytechnoz
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titlesEcwayt
 

Similar to 2013 2014 ieee project titles (20)

2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee java project titles
2013 ieee java project titles2013 ieee java project titles
2013 ieee java project titles
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2013 ieee .net project titles
2013 ieee .net project titles2013 ieee .net project titles
2013 ieee .net project titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2013 ieee project java titles
2013 ieee project java titles2013 ieee project java titles
2013 ieee project java titles
 
2014 ieee project java titles
2014 ieee project java titles2014 ieee project java titles
2014 ieee project java titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2014 ieee project dotnet titles
2014 ieee project dotnet titles2014 ieee project dotnet titles
2014 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 
2013 ieee project dotnet titles
2013 ieee project dotnet titles2013 ieee project dotnet titles
2013 ieee project dotnet titles
 

Recently uploaded

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

2013 2014 ieee project titles

  • 1. 2013 - 2014 IEEE Projects @ JP iNFOTeCH JAVA CLOUD COMPUTING A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems CloudMoV: Cloud-based Mobile Social TV Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Privacy-Preserving Public Auditing for Secure Cloud Storage Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers KNOWLEDGE AND DATA ENGINEERING A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data A New Algorithm for Inferring User Search Goals with Feedback Sessions Annotating Search Results from Web Databases
  • 2. Anomaly Detection via Online Over-Sampling Principal Component Analysis Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks m-Privacy for Collaborative Data Publishing Protecting Sensitive Labels in Social Network Data Anonymization Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development SECURE COMPUTING EAACK—A Secure Intrusion-Detection System for MANETs Identity-Based Secure Distributed Data Storage Schemes Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Privacy Preserving Data Sharing With Anonymous ID Assignment Securing Class Initialization in Java-like Languages Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
  • 3. NETWORKING A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Delay-Based Network Utility Maximization Dynamic Control of Coding for Progressive Packet Arrivals in DTNs PARALLEL AND DISTRIBUTED SYSTEMS A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems IP-Geolocation Mapping for Moderately Connected Internet Regions Optimal Client-Server Assignment for Internet Distributed Systems MOBILE COMPUTING Content Sharing over Smartphone-Based Delay-Tolerant Networks DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
  • 4. PATTERN ANALYSIS AND MACHINE INTELLIGENCE A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data SERVICES COMPUTING A Decentralized Service Discovery Approach on Peer-to-Peer Networks Personalized QoS-Aware Web Service Recommendation and Visualization Privacy-Enhanced Web Service Composition SOFTWARE ENGINEERING Whole Test Suite Generation
  • 5. 2013 - 2014 IEEE Projects @ JP iNFOTeCH DOT NET CLOUD COMPUTING A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud An Adaptive Cloud Downloading Service Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud On Data Staging Algorithms for Shared Data Accesses in Clouds Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Privacy-Preserving Public Auditing for Secure Cloud Storage QoS Ranking Prediction for Cloud Services Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
  • 6. KNOWLEDGE AND DATA ENGINEERING A New Algorithm for Inferring User Search Goals with Feedback Sessions A Survey of XML Tree Patterns Dynamic Personalized Recommendation on Sparse Data Mining User Queries with Markov Chains: Application to Online Image Retrieval TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality SECURE COMPUTING A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. EAACK—A Secure Intrusion-Detection System for MANETs Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Privacy Preserving Data Sharing With Anonymous ID Assignment SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems NETWORKING A Distributed Control Law for Load Balancing in Content Delivery Networks A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
  • 7. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments Efficient Algorithms for Neighbor Discovery in Wireless Networks Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality Resource Allocation for QoS Support in Wireless Mesh Networks PARALLEL AND DISTRIBUTED SYSTEMS A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Multicast Capacity in MANET with Infrastructure Support SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency MOBILE COMPUTING Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Optimal Multicast Capacity and Delay Tradeoffs in MANETs Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
  • 8. IMAGE PROCESSING Query-Adaptive Image Search With Hash Codes Reversible Data Hiding With Optimal Value Transfer Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Local Directional Number Pattern for Face Analysis: Face and Expression Recognition Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage