Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
2013 2014 ieee project titles
1. 2013 - 2014 IEEE Projects @ JP iNFOTeCH
JAVA
CLOUD COMPUTING
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
CloudMoV: Cloud-based Mobile Social TV
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Privacy-Preserving Public Auditing for Secure Cloud Storage
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers
KNOWLEDGE AND DATA ENGINEERING
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
A New Algorithm for Inferring User Search Goals with Feedback Sessions
Annotating Search Results from Web Databases
2. Anomaly Detection via Online Over-Sampling Principal Component Analysis
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
m-Privacy for Collaborative Data Publishing
Protecting Sensitive Labels in Social Network Data Anonymization
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System
Development
SECURE COMPUTING
EAACK—A Secure Intrusion-Detection System for MANETs
Identity-Based Secure Distributed Data Storage Schemes
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network
Systems
Privacy Preserving Data Sharing With Anonymous ID Assignment
Securing Class Initialization in Java-like Languages
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter
Stream
3. NETWORKING
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
Delay-Based Network Utility Maximization
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
IP-Geolocation Mapping for Moderately Connected Internet Regions
Optimal Client-Server Assignment for Internet Distributed Systems
MOBILE COMPUTING
Content Sharing over Smartphone-Based Delay-Tolerant Networks
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in
Wireless Mobile Networks
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period
Mobile Users
4. PATTERN ANALYSIS AND MACHINE INTELLIGENCE
A Framework for Mining Signatures from Event Sequences and Its Applications in
Healthcare Data
SERVICES COMPUTING
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Personalized QoS-Aware Web Service Recommendation and Visualization
Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERING
Whole Test Suite Generation
5. 2013 - 2014 IEEE Projects @ JP iNFOTeCH
DOT NET
CLOUD COMPUTING
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
An Adaptive Cloud Downloading Service
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
On Data Staging Algorithms for Shared Data Accesses in Clouds
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
Privacy-Preserving Public Auditing for Secure Cloud Storage
QoS Ranking Prediction for Cloud Services
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud
Computing Systems
Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
6. KNOWLEDGE AND DATA ENGINEERING
A New Algorithm for Inferring User Search Goals with Feedback Sessions
A Survey of XML Tree Patterns
Dynamic Personalized Recommendation on Sparse Data
Mining User Queries with Markov Chains: Application to Online Image Retrieval
TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
SECURE COMPUTING
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
EAACK—A Secure Intrusion-Detection System for MANETs
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Sharing
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
Privacy Preserving Data Sharing With Anonymous ID Assignment
SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
NETWORKING
A Distributed Control Law for Load Balancing in Content Delivery Networks
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc
Networks
7. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
Efficient Algorithms for Neighbor Discovery in Wireless Networks
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
Resource Allocation for QoS Support in Wireless Mesh Networks
PARALLEL AND DISTRIBUTED SYSTEMS
A Secure Payment Scheme with Low Communication and Processing Overhead for
Multihop Wireless Networks
Multicast Capacity in MANET with Infrastructure Support
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
MOBILE COMPUTING
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game
Approach
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor
Networks
8. IMAGE PROCESSING
Query-Adaptive Image Search With Hash Codes
Reversible Data Hiding With Optimal Value Transfer
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram
Shifting
Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform
Shrinkage