SlideShare a Scribd company logo
*************************************************************




                                     CLOUD COMPUTING



1. Cloud Computing for Agent-Based Urban Transportation Systems

2. Secure and Practical Outsourcing of Linear Programming in Cloud
   Computing

3. Enabling Public Auditability and Data Dynamics for Storage Security in
   Cloud Computing
*************************************************************




                                             MOBILE COMPUTING



1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc
   Networks




                                              NETWORKING

1. ProgME: Towards Programmable Network Measurement

2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop
   Wireless Networks

3. Buffer Sizing for 802.11 Based Networks

4. Caching Strategies Based on Information Density

5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
*************************************************************

6. A Unified Approach to Optimizing Performance in Networks Serving
   Heterogeneous Flows

7. Denial of Service Attacks in Wireless Networks: The Case of Jammers




                                       SECURE COMPUTING

1. SAT: A Security Architecture Achieving Anonymity and Traceability in
   Wireless Mesh Networks

2. Nymble- Blocking Misbehaving Users in Anonymizing Networks

3. Modeling and Detection of Camouflaging Worm.

4. Online Intrusion Alert Aggregation with Generative Data Stream
   Modeling.

5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks.

6. Towards Situational Awareness of Large-Scale Botnet Probing Events

7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING
   AND SELECTIVE EMBEDDING

8. Competitive Study of Cryptography Techniques over Block Cipher.

9. Analysis on Credit Card Fraud Detection Methods.
*************************************************************




                                        IMAGE PROCESSING

1. Additive Distortion in Steganography Using Syndrome-Trellis Codes

2. Subspace-Based Striping Noise Reduction in Hyperspectral Images.

3. Sketch4Match – Content-based Image Retrieval System Using Sketches.

4. Embedded Extended Visual Cryptography Schemes




                          KNOWLEDGE AND DATA ENGINEERING

1. Extended XML Tree Pattern Matching: Theories and Algorithms.

2. Ranking Spatial Data by Quality Preferences

3. Discovering Conditional Functional Dependencies
*************************************************************

4. Effective Navigation of Query Results Based on Concept Hierarchies.

5. Clustering with Multi-Viewpoint based Similarity Measure.




                                        WEB SERIVCE

1. Ontology Based Business Process Customization for Composite Web
   Services
*************************************************************




                                     CLOUD COMPUTING

1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud
   Data.

2. Data integrity proofs in cloud storage.

3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data
   Processing in the Cloud.

4. Optimal service pricing for a cloud cache.
*************************************************************




                                              NETWORKING

1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System
   Lifetime of Query-Based Wireless Sensor Networks

2. Distributed Adaptation of Quantized Feedback for Downlink Network
   MIMO Systems

3. Network Coding Based Privacy Preservation against Traffic Analysis in
   Multi-hop Wireless Networks

4. Continuous Neighbor Discovery in Asynchronous Sensor Networks

5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using
   Portfolio Selection

6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop
   Wireless Networks

7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless
   Sensor Networks
*************************************************************




                                       SECURE COMPUTING

1. Integration of Sound Signature in Graphical Password Authentication
  System

2. The Geometric Efficient Matching Algorithm for Firewalls

3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones
   by Flow Watermarking.

4. NABS Novel Approaches for Biometric Systems

5. Improving Offline Handwritten Text Recognition with Hybrid
   HMM/ANN Models
*************************************************************




                                        IMAGE PROCESSING

1. Minimizing Additive Distortion in Steganography Using Syndrome-
   Trellis Codes

2. A User-Oriented Image Retrieval System Based on Interactive Genetic
   Algorithm

3. Blind Image Watermarking Using a Sample Projection Approach

4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process
   Experts

5. Adaptive Spectral Transform for Wavelet-Based Color Image
   Compression

6. Facial Expression Recognition Using Facial Movement Features

7. Histogram Specification: A fast and flexible Method to process digital
   images
*************************************************************




                          KNOWLEDGE AND DATA ENGINEERING

1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining
   Analysis.

2. Bridging Socially-Enhanced Virtual Communities.

3. DATA LEAGAGE DETECTION.

4. Personalized Ontology Model for Web Information Gathering.

5. Efficient Computation of Range Aggregates against uncertain location
   based queries.

6. Scalable Learning of Collective Behavior.

7. The World in a Nutshell Concise Range Queries.

8. The Awareness Network, To Whom Should I Display My Actions And,
   Whose Actions.

9. Publishing Search Logs – A Comparative Study of Privacy Guarantees.

10.     One Size Does Not Fit All Towards User- and Query-Dependent
   Ranking For Web Databases.

11.      Monitoring Service Systems from a Language-Action Perspective.
*************************************************************

12.     Improving Aggregate Recommendation Diversity Using Ranking-
   Based Techniques.

13.   Exploring Application-Level Semantics for Data Compression.

14.   A Web Search Engine-Based Approach to Measure Semantic Similarity
      between Words.




                                           WEB SERIVCE

1. Adaptive Provisioning of Human Expertise in Service-oriented Systems.

2. Vulnerability Analysis in SOA-based Business Processes.

3.    Detecting Kernel-Level Root kits Using Data Structure Invariants

More Related Content

What's hot

2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
Focuz Technologies
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
xlncinfotech
 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
xtreamtechnologies
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
Mumbai Academisc
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
Mumbai Academisc
 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
java projects IEEE
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
Mumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
Mumbai Academisc
 
Android titles
Android titlesAndroid titles
Android titles
tema_solution
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
Mumbai Academisc
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titles
Pvrtechnologies Nellore
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEEGLOBALSOFTSTUDENTPROJECTS
 

What's hot (14)

2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Android titles
Android titlesAndroid titles
Android titles
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titles
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
 

Viewers also liked

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
JPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
JPINFOTECH JAYAPRAKASH
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
JPINFOTECH JAYAPRAKASH
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
JPINFOTECH JAYAPRAKASH
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...
JPINFOTECH JAYAPRAKASH
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
JPINFOTECH JAYAPRAKASH
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
JPINFOTECH JAYAPRAKASH
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
JPINFOTECH JAYAPRAKASH
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
JPINFOTECH JAYAPRAKASH
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighbors
JPINFOTECH JAYAPRAKASH
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
JPINFOTECH JAYAPRAKASH
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
JPINFOTECH JAYAPRAKASH
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
JPINFOTECH JAYAPRAKASH
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
JPINFOTECH JAYAPRAKASH
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
JPINFOTECH JAYAPRAKASH
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
JPINFOTECH JAYAPRAKASH
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service composition
JPINFOTECH JAYAPRAKASH
 

Viewers also liked (18)

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighbors
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service composition
 

Similar to Bulk ieee projects

Software project list
Software project listSoftware project list
Software project list
Itcdp Technofist
 
2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titles
Mukundhan Elumalai
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles
Mukundhan Elumalai
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
S3 Infotech IEEE Projects
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
Elakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
Elakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
Elakkiya Triplen
 

Similar to Bulk ieee projects (20)

Software project list
Software project listSoftware project list
Software project list
 
2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titles
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 

Recently uploaded

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 

Recently uploaded (20)

clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 

Bulk ieee projects

  • 1. ************************************************************* CLOUD COMPUTING 1. Cloud Computing for Agent-Based Urban Transportation Systems 2. Secure and Practical Outsourcing of Linear Programming in Cloud Computing 3. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  • 2. ************************************************************* MOBILE COMPUTING 1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks NETWORKING 1. ProgME: Towards Programmable Network Measurement 2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks 3. Buffer Sizing for 802.11 Based Networks 4. Caching Strategies Based on Information Density 5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
  • 3. ************************************************************* 6. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows 7. Denial of Service Attacks in Wireless Networks: The Case of Jammers SECURE COMPUTING 1. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks 2. Nymble- Blocking Misbehaving Users in Anonymizing Networks 3. Modeling and Detection of Camouflaging Worm. 4. Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks. 6. Towards Situational Awareness of Large-Scale Botnet Probing Events 7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING 8. Competitive Study of Cryptography Techniques over Block Cipher. 9. Analysis on Credit Card Fraud Detection Methods.
  • 4. ************************************************************* IMAGE PROCESSING 1. Additive Distortion in Steganography Using Syndrome-Trellis Codes 2. Subspace-Based Striping Noise Reduction in Hyperspectral Images. 3. Sketch4Match – Content-based Image Retrieval System Using Sketches. 4. Embedded Extended Visual Cryptography Schemes KNOWLEDGE AND DATA ENGINEERING 1. Extended XML Tree Pattern Matching: Theories and Algorithms. 2. Ranking Spatial Data by Quality Preferences 3. Discovering Conditional Functional Dependencies
  • 5. ************************************************************* 4. Effective Navigation of Query Results Based on Concept Hierarchies. 5. Clustering with Multi-Viewpoint based Similarity Measure. WEB SERIVCE 1. Ontology Based Business Process Customization for Composite Web Services
  • 6. ************************************************************* CLOUD COMPUTING 1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. 2. Data integrity proofs in cloud storage. 3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. 4. Optimal service pricing for a cloud cache.
  • 7. ************************************************************* NETWORKING 1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks 2. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems 3. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks 4. Continuous Neighbor Discovery in Asynchronous Sensor Networks 5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection 6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks 7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
  • 8. ************************************************************* SECURE COMPUTING 1. Integration of Sound Signature in Graphical Password Authentication System 2. The Geometric Efficient Matching Algorithm for Firewalls 3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. 4. NABS Novel Approaches for Biometric Systems 5. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models
  • 9. ************************************************************* IMAGE PROCESSING 1. Minimizing Additive Distortion in Steganography Using Syndrome- Trellis Codes 2. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm 3. Blind Image Watermarking Using a Sample Projection Approach 4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts 5. Adaptive Spectral Transform for Wavelet-Based Color Image Compression 6. Facial Expression Recognition Using Facial Movement Features 7. Histogram Specification: A fast and flexible Method to process digital images
  • 10. ************************************************************* KNOWLEDGE AND DATA ENGINEERING 1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis. 2. Bridging Socially-Enhanced Virtual Communities. 3. DATA LEAGAGE DETECTION. 4. Personalized Ontology Model for Web Information Gathering. 5. Efficient Computation of Range Aggregates against uncertain location based queries. 6. Scalable Learning of Collective Behavior. 7. The World in a Nutshell Concise Range Queries. 8. The Awareness Network, To Whom Should I Display My Actions And, Whose Actions. 9. Publishing Search Logs – A Comparative Study of Privacy Guarantees. 10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases. 11. Monitoring Service Systems from a Language-Action Perspective.
  • 11. ************************************************************* 12. Improving Aggregate Recommendation Diversity Using Ranking- Based Techniques. 13. Exploring Application-Level Semantics for Data Compression. 14. A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. WEB SERIVCE 1. Adaptive Provisioning of Human Expertise in Service-oriented Systems. 2. Vulnerability Analysis in SOA-based Business Processes. 3. Detecting Kernel-Level Root kits Using Data Structure Invariants