SlideShare a Scribd company logo
1 of 8
2014 and 2015 Completed IEEE Projects List
Sl.No Project Title Year
Cloud Computing
1 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014
2 NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds 2014
3 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory
and Implementation
2014
4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014
5 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data 2014
6 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014
7 Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
2014
8 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. 2014
9 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
2014
10 Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability 2014
11 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2014
12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core
Server Processors across Clouds and Data Centers
2014
13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014
14 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
2014
15 Towards Differential Query Services in Cost Efficient Clouds 2014
16 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud
Computing
2014
17 A Hybrid Cloud Approach for Secure Authorized De duplication 2014
18 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014
19 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in
Multi cloud Storage
2014
20 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage 2014
21 Consistency as a Service Auditing :Cloud Consistency 2014
22 A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social
Networks
2014
23 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 2014
24 Expressive, Efficient, and Revocable Data Access Controlfor Multi-Authority Cloud
Storage
2014
25 Secure kNN Query Processing in Un trusted Cloud Environments 2014
26 A Mechanism Design Approach to Resource Procurement in Cloud Computing 2014
27 A Secure Client Side De duplication Scheme in Cloud Storage Environments 2014
28 Balancing Performance Accuracy and Precision for Secure Cloud Transactions 2014
29 Performance and cost evaluation of an adaptive encryption architecture for cloud
databases
2014
30 Securing the cloud storage audit service: defending against frame and collude attacks of third party
auditor
2014
31 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013
32 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 2013
33 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
34 NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
35 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 2013
36 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud
Computing Systems
2013
37 Collaboration in Multi cloud Environments Framework and Security Issues 2013
38 SeDas A Self Destructing Data System Based on Active Storage Framework 2013
39 Winds of Change from Vendor Lock In to the Meta Cloud 2013
40 Fault Tolerance Management in Cloud Computing: A System-Level Perspective 2013
41 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 2013
42 On the Optimal Allocation of Virtual Resources in Cloud Computing Networks 2013
Network Security
1 Behavioral Malware Detection in Delay Tolerant Networks 2014
2 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
2014
3 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014
4 Building a Scalable System for Stealthy P2P-Botnet Detection 2014
5 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
6 Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption 2014
7 Bandwidth Distributed Denial of Service: Attacks and Defenses 2014
8 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. 2014
9 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
10 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014
11 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
12 PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes 2014
13 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
14 EAACK—A Secure Intrusion-Detection System for MANETs 2013
15 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Sharing
2013
16 Vampire Attacks Draining life from wireless ad-hoc sensor networks 2013
17 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013
18 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013
19 SORT A Self-Organizing Trust Model for Peer-to-Peer Systems 2013
Ad hoc Networks & VANET & MANET
1 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2014
2 STARS: A Statistical Traffic Pattern Discovery System for MANETs 2014
3 Trajectory Improves Data Delivery in Urban Vehicular Networks 2014
4 Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc
Networks
2014
5 VSPN: VANET-Based Secure and Privacy-Preserving Navigation 2014
6 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 2014
7 Multicast Capacity in MANET with Infrastructure Support 2014
8 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected
MANETs
2014
9 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in
Adversarial Environment
2014
10 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2014
11 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A
Cooperative Bait Detection Approach
2014
12 Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks 2014
13 Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs 2013
14 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks (MANET) 2013
15 Efficient Algorithms for Neighbor Discovery in Wireless Networks (Adhoc) 2013
16 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation (Adhoc) 2013
17 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile
Ad Hoc Networks (MANET)
2013
18 Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks 2013
(Mobile Computing)
19 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc
Networks(MANET)
Mobile Computing
1 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
2 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
3 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014
4 Efficient Authentication for Mobile and Pervasive Computing 2014
5 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
6 Preserving Location Privacy in Geo Social Applications 2014
7 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
8 Video Dissemination over Hybrid Cellular and Ad Hoc Networks 2014
9 Network Assisted Mobile Computing with Optimal Uplink Query Processing 2013
Wireless Sensor Networks
1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014
2 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014
3 A Survey of Intrusion Detection Systems in Wireless Sensor Networks 2014
4 QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks 2014
5 Link Quality Aware Code Dissemination in Wireless Sensor Networks 2014
6 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2014
7 ALBAR Load-Balancing Geographic Routing Around Connectivity Holes in Wireless
Sensor Networks
2014
8 Secure Continuous Aggregation in Wireless Sensor Networks 2014
9 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. 2014
10 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014
11 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using
Compressive Sensing
2014
12 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014
13 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless
Sensor Networks
2014
14 Collaborative Scheduling in Dynamic Environments Using Error Inference 2014
15 Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker’s
Impact
2014
16 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013
17 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
2013
18 Mobile Relay Configuration in Data Intensive Wireless Sensor Network 2013
19 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless
Sensor Networks.
2013
20 Participatory Privacy: Enabling Privacy in Participatory Sensing 2013
21 Fault Node Recovery Algorithm for a Wireless Sensor Network 2013
Android Projects
1 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014
2 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
2014
3 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014
4 Efficient Authentication for Mobile and Pervasive Computing 2014
5 Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location
Monitoring
2014
6 LocaWard A Security and Privacy Aware Location-Based Rewarding System 2014
7 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
8 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
9 Green Droid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications 2014
10 MOSES: Supporting and Enforcing Security Profiles on Smart phones 2014
11 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area
Networks
2014
12 SOS A Distributed Mobile Q&A System Based on Social Networks 2014
13 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access
Networks
2014
14 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014
15 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming
With Festive
2014
16 Android College Campus 2014
17 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
2013
18 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013
19 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013
20 Cloud MoV Cloud-based Mobile Social TV 2013
21 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
Sharing in the Clouds
2013
Data Mining
1 Fast Nearest Neighbor Search with Keywords 2014
2 An Empirical Performance Evaluation of Relational Keyword Search Systems 2014
3 Facilitating Document Annotation using Content and Querying Value 2014
4 Supporting Privacy Protection in Personalized Web Search 2014
5 Secure Mining of Association Rules in Horizontally Distributed Databases 2014
6 Efficient Ranking on Entity Graphs with Personalized Relationships 2014
7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
8 Privacy-Preserving and Content-Protecting Location Based Queries 2014
9 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014
10 An Empirical Performance Evaluation of Relational Keyword Search Techniques. 2014
11 LARS An Efficient and Scalable Location-Aware Recommender System 2014
12 Privacy-Preserving Authenticated Key-Exchange Over Internet. 2014
13 Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2014
14 Efficient Instant-Fuzzy Search with Proximity Ranking 2014
15 Efficient Prediction of Difficult Keyword Queries over Databases 2014
16 Temporal Workload-Aware Replicated Partitioning for Social Networks 2014
17 Best Peer++:A Peer-to-Peer Based Large-Scale Data Processing Platform 2014
18 Security Evaluation of Pattern Classifiers under Attack 2014
19 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 2014
20 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2014
21 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2013
22 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 2013
23 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 2013
24 Facilitating Effective User Navigation through Website Structure Improvement 2013
25 m-Privacy for Collaborative Data Publishing 2013
26 System to Filter Unwanted Messages fromOSN User Walls 2013
Networking and Wireless Communication
1 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in
Delay-Tolerant Networks
2014
2 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014
3 Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay
Networks
2014
4 Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks 2014
5 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014
6 Automatic Test Packet Generation 2014
7 HALO: Hop-by-Hop Adaptive Link-State Optimal Routing 2014
8 A Two stage Deanonymization Attack Against Anonymized Social Networks 2014
9 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2014
Image Processing and Multimedia
1 Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014
2 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding 2014
3 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014
4 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images 2014
5 Personalized Geo-Specific Tag Recommendation for Photos on Social Websites 2014
6 Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object
Detection for Intelligent Service Robotics (Dot Net)
2014
7 Sharing Visual Secrets in Single Image Random Dot Stereograms (Dot Net) 2014
8 FeatureMatch: A General ANNF Estimation Technique and its Applications (Dot Net) 2014
9 3D Face Recognition Under Expressions, Occlusions and Pose Variations 2013
10 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features 2013
11 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. 2013
12 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013
13 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 2013
14 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor
Networks
2013
J2ME Mobile Based Projects
1 Adaptation of a virtual campus for mobile learning devices 2014
2 Bluetooth Mobile Based College Campus 2014
3 ECops via Handheld Mobile Devices 2014
4 Privacy-Conscious Location-Based Queries in Mobile Environments 2014
5 Ranking Model Adaptation for Domain-Specific Search 2014
6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For
Mobile-Healthcare Emergency
2014
7 The Word in a nut shell : CONCISE RANGE QUERIES 2014
Parallel and Distributed System
1 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014
2 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014
3 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014
4 On False Data-Injection Attacks against Power System State Estimation: Modeling and
Countermeasures
2014
5 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 2014
6 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014
7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
8 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area
Networks
2014
9 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014
10 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014

More Related Content

What's hot

4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
ncct
 

What's hot (9)

2014 and 2015 ieee projects list @ TMKS Infotech
2014 and 2015 ieee projects list @ TMKS Infotech2014 and 2015 ieee projects list @ TMKS Infotech
2014 and 2015 ieee projects list @ TMKS Infotech
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
Final year project titles 2013 2014, Kalek Solutions
Final year project titles 2013 2014, Kalek Solutions Final year project titles 2013 2014, Kalek Solutions
Final year project titles 2013 2014, Kalek Solutions
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
 
2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014
 

Viewers also liked

J&J Thesis Presentation July 2016
J&J Thesis Presentation July 2016J&J Thesis Presentation July 2016
J&J Thesis Presentation July 2016
Michalis Avgoulis
 

Viewers also liked (6)

2016 and 2017 IEEE Titles
2016 and 2017 IEEE Titles2016 and 2017 IEEE Titles
2016 and 2017 IEEE Titles
 
2016 and 2017 IEEE For BE & MTech @ TMKS Infotech
2016 and 2017 IEEE For BE & MTech @ TMKS Infotech2016 and 2017 IEEE For BE & MTech @ TMKS Infotech
2016 and 2017 IEEE For BE & MTech @ TMKS Infotech
 
J&J Thesis Presentation July 2016
J&J Thesis Presentation July 2016J&J Thesis Presentation July 2016
J&J Thesis Presentation July 2016
 
Project titles 2016-2017
Project titles 2016-2017Project titles 2016-2017
Project titles 2016-2017
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 

Similar to 2014 and 2015 ieee final list

2014 and 2015 ieee projects list
2014 and 2015 ieee projects list2014 and 2015 ieee projects list
2014 and 2015 ieee projects list
Manju Nath
 

Similar to 2014 and 2015 ieee final list (20)

Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects
 
2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE
 
2014 and 2015 ieee projects for MTech
2014 and 2015 ieee  projects for MTech2014 and 2015 ieee  projects for MTech
2014 and 2015 ieee projects for MTech
 
2014 and 2015 ieee projects for cse
2014 and 2015 ieee  projects for cse2014 and 2015 ieee  projects for cse
2014 and 2015 ieee projects for cse
 
2014 and 2015 ieee projects for CNE
2014 and 2015 ieee  projects for CNE2014 and 2015 ieee  projects for CNE
2014 and 2015 ieee projects for CNE
 
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechBulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
 
Android,2014 and 2015 ieee projects list @ TMKS Infotech
Android,2014 and 2015 ieee projects list @ TMKS InfotechAndroid,2014 and 2015 ieee projects list @ TMKS Infotech
Android,2014 and 2015 ieee projects list @ TMKS Infotech
 
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
Mobile Computing,2014 and 2015 ieee projects @ TMKS InfotechMobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
Mobile Computing,2014 and 2015 ieee projects @ TMKS Infotech
 
Parallel and Distributed Systems,2014 and 2015 ieee projects @TMKS Infotech
Parallel and Distributed Systems,2014 and 2015 ieee projects @TMKS InfotechParallel and Distributed Systems,2014 and 2015 ieee projects @TMKS Infotech
Parallel and Distributed Systems,2014 and 2015 ieee projects @TMKS Infotech
 
2014 and 2015 ieee projects list
2014 and 2015 ieee projects list2014 and 2015 ieee projects list
2014 and 2015 ieee projects list
 
2014 and 2015 ieee projects list
2014 and 2015 ieee projects list2014 and 2015 ieee projects list
2014 and 2015 ieee projects list
 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennai
 
best ieee project centre in chennai
best ieee project centre in chennaibest ieee project centre in chennai
best ieee project centre in chennai
 
ece project centre in chennai titles 2014
ece project centre in chennai titles 2014ece project centre in chennai titles 2014
ece project centre in chennai titles 2014
 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennai
 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennai
 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennai
 
java project centre in chennai
java project centre in chennaijava project centre in chennai
java project centre in chennai
 
cse project centre in chennai
cse project centre in chennai cse project centre in chennai
cse project centre in chennai
 
2014-15 Dotnet IEEE Titles List
2014-15 Dotnet IEEE Titles List2014-15 Dotnet IEEE Titles List
2014-15 Dotnet IEEE Titles List
 

More from Manju Nath

More from Manju Nath (20)

2017 and 2018 Dependable Computing
2017 and 2018 Dependable Computing2017 and 2018 Dependable Computing
2017 and 2018 Dependable Computing
 
2017 and 2018 Service Computing
2017 and 2018 Service Computing2017 and 2018 Service Computing
2017 and 2018 Service Computing
 
2017 and 2018 Networking and Service Computing
2017 and 2018 Networking and Service Computing2017 and 2018 Networking and Service Computing
2017 and 2018 Networking and Service Computing
 
2017 and 2018 Networking
2017 and 2018 Networking2017 and 2018 Networking
2017 and 2018 Networking
 
2017 and 2018 Multimedia
2017 and 2018 Multimedia2017 and 2018 Multimedia
2017 and 2018 Multimedia
 
2017 and 2018 Artificial Intelligent
2017 and 2018 Artificial Intelligent2017 and 2018 Artificial Intelligent
2017 and 2018 Artificial Intelligent
 
2017 and 2018 Neural Networks
2017 and 2018 Neural Networks2017 and 2018 Neural Networks
2017 and 2018 Neural Networks
 
2017 and 2018 Big data
2017 and 2018 Big data2017 and 2018 Big data
2017 and 2018 Big data
 
2017 and 2018 Image Processing
2017 and 2018 Image Processing2017 and 2018 Image Processing
2017 and 2018 Image Processing
 
2017 and 2018 Parallel and Distributed Systems
2017 and 2018 Parallel and Distributed Systems2017 and 2018 Parallel and Distributed Systems
2017 and 2018 Parallel and Distributed Systems
 
2017 and 2018 Software Engineering
2017 and 2018 Software Engineering2017 and 2018 Software Engineering
2017 and 2018 Software Engineering
 
2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc Networks2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc Networks
 
2017 and 2018 Android Projects
2017 and 2018 Android Projects2017 and 2018 Android Projects
2017 and 2018 Android Projects
 
2017 and 2018 Secure and Dependable Computing
2017 and 2018 Secure and Dependable Computing2017 and 2018 Secure and Dependable Computing
2017 and 2018 Secure and Dependable Computing
 
2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor Networks2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor Networks
 
2017 and 2018 Secure Computing
2017 and 2018 Secure Computing2017 and 2018 Secure Computing
2017 and 2018 Secure Computing
 
2017 and 2018 Network Security
2017 and 2018 Network Security2017 and 2018 Network Security
2017 and 2018 Network Security
 
2017 and 2018 Data Mining
2017 and 2018 Data Mining2017 and 2018 Data Mining
2017 and 2018 Data Mining
 
2017 and 2018 Cloud Computing
2017 and 2018 Cloud Computing2017 and 2018 Cloud Computing
2017 and 2018 Cloud Computing
 
2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 

2014 and 2015 ieee final list

  • 1. 2014 and 2015 Completed IEEE Projects List Sl.No Project Title Year Cloud Computing 1 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud 2014 2 NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds 2014 3 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation 2014 4 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage 2014 5 Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data 2014 6 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds 2014 7 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 2014 8 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. 2014 9 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014 10 Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability 2014 11 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2014 12 Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers 2014 13 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 2014 14 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2014 15 Towards Differential Query Services in Cost Efficient Clouds 2014 16 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 2014 17 A Hybrid Cloud Approach for Secure Authorized De duplication 2014 18 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases 2014 19 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage 2014 20 Identity Based Distributed Provable Data Possession in Multi-Cloud Storage 2014 21 Consistency as a Service Auditing :Cloud Consistency 2014 22 A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks 2014 23 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. 2014 24 Expressive, Efficient, and Revocable Data Access Controlfor Multi-Authority Cloud Storage 2014 25 Secure kNN Query Processing in Un trusted Cloud Environments 2014 26 A Mechanism Design Approach to Resource Procurement in Cloud Computing 2014 27 A Secure Client Side De duplication Scheme in Cloud Storage Environments 2014
  • 2. 28 Balancing Performance Accuracy and Precision for Secure Cloud Transactions 2014 29 Performance and cost evaluation of an adaptive encryption architecture for cloud databases 2014 30 Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor 2014 31 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013 32 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 2013 33 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013 34 NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013 35 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 2013 36 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud Computing Systems 2013 37 Collaboration in Multi cloud Environments Framework and Security Issues 2013 38 SeDas A Self Destructing Data System Based on Active Storage Framework 2013 39 Winds of Change from Vendor Lock In to the Meta Cloud 2013 40 Fault Tolerance Management in Cloud Computing: A System-Level Perspective 2013 41 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 2013 42 On the Optimal Allocation of Virtual Resources in Cloud Computing Networks 2013 Network Security 1 Behavioral Malware Detection in Delay Tolerant Networks 2014 2 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis 2014 3 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014 4 Building a Scalable System for Stealthy P2P-Botnet Detection 2014 5 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014 6 Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption 2014 7 Bandwidth Distributed Denial of Service: Attacks and Defenses 2014 8 E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. 2014 9 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014 10 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014 11 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014 12 PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes 2014 13 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014 14 EAACK—A Secure Intrusion-Detection System for MANETs 2013
  • 3. 15 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 2013 16 Vampire Attacks Draining life from wireless ad-hoc sensor networks 2013 17 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013 18 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013 19 SORT A Self-Organizing Trust Model for Peer-to-Peer Systems 2013 Ad hoc Networks & VANET & MANET 1 Optimal Multicast Capacity and Delay Tradeoffs in MANETs 2014 2 STARS: A Statistical Traffic Pattern Discovery System for MANETs 2014 3 Trajectory Improves Data Delivery in Urban Vehicular Networks 2014 4 Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks 2014 5 VSPN: VANET-Based Secure and Privacy-Preserving Navigation 2014 6 Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks 2014 7 Multicast Capacity in MANET with Infrastructure Support 2014 8 Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs 2014 9 AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment 2014 10 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks 2014 11 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2014 12 Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks 2014 13 Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs 2013 14 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks (MANET) 2013 15 Efficient Algorithms for Neighbor Discovery in Wireless Networks (Adhoc) 2013 16 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation (Adhoc) 2013 17 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks (MANET) 2013 18 Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks 2013
  • 4. (Mobile Computing) 19 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks(MANET) Mobile Computing 1 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014 2 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014 3 A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks 2014 4 Efficient Authentication for Mobile and Pervasive Computing 2014 5 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014 6 Preserving Location Privacy in Geo Social Applications 2014 7 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014 8 Video Dissemination over Hybrid Cellular and Ad Hoc Networks 2014 9 Network Assisted Mobile Computing with Optimal Uplink Query Processing 2013 Wireless Sensor Networks 1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014 2 An Error Minimizing Framework for Localizing Jammers in Wireless Networks 2014 3 A Survey of Intrusion Detection Systems in Wireless Sensor Networks 2014 4 QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks 2014 5 Link Quality Aware Code Dissemination in Wireless Sensor Networks 2014 6 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2014 7 ALBAR Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks 2014 8 Secure Continuous Aggregation in Wireless Sensor Networks 2014 9 Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. 2014 10 Top-k Query Result Completeness Verification in Tiered Sensor Networks 2014 11 Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing 2014 12 Data Density Correlation Degree Clustering Method for Data Aggregation in WSN 2014 13 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks 2014 14 Collaborative Scheduling in Dynamic Environments Using Error Inference 2014
  • 5. 15 Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker’s Impact 2014 16 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013 17 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 2013 18 Mobile Relay Configuration in Data Intensive Wireless Sensor Network 2013 19 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. 2013 20 Participatory Privacy: Enabling Privacy in Participatory Sensing 2013 21 Fault Node Recovery Algorithm for a Wireless Sensor Network 2013 Android Projects 1 Friend book: A Semantic-based Friend Recommendation System for Social Networks 2014 2 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2014 3 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices 2014 4 Efficient Authentication for Mobile and Pervasive Computing 2014 5 Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring 2014 6 LocaWard A Security and Privacy Aware Location-Based Rewarding System 2014 7 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014 8 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014 9 Green Droid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications 2014 10 MOSES: Supporting and Enforcing Security Profiles on Smart phones 2014 11 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014 12 SOS A Distributed Mobile Q&A System Based on Social Networks 2014 13 A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks 2014 14 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2014 15 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive 2014 16 Android College Campus 2014 17 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 2013
  • 6. 18 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013 19 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013 20 Cloud MoV Cloud-based Mobile Social TV 2013 21 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 2013 Data Mining 1 Fast Nearest Neighbor Search with Keywords 2014 2 An Empirical Performance Evaluation of Relational Keyword Search Systems 2014 3 Facilitating Document Annotation using Content and Querying Value 2014 4 Supporting Privacy Protection in Personalized Web Search 2014 5 Secure Mining of Association Rules in Horizontally Distributed Databases 2014 6 Efficient Ranking on Entity Graphs with Personalized Relationships 2014 7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014 8 Privacy-Preserving and Content-Protecting Location Based Queries 2014 9 Discovering Emerging Topics in Social Streams via Link-Anomaly 2014 10 An Empirical Performance Evaluation of Relational Keyword Search Techniques. 2014 11 LARS An Efficient and Scalable Location-Aware Recommender System 2014 12 Privacy-Preserving Authenticated Key-Exchange Over Internet. 2014 13 Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data 2014 14 Efficient Instant-Fuzzy Search with Proximity Ranking 2014 15 Efficient Prediction of Difficult Keyword Queries over Databases 2014 16 Temporal Workload-Aware Replicated Partitioning for Social Networks 2014 17 Best Peer++:A Peer-to-Peer Based Large-Scale Data Processing Platform 2014 18 Security Evaluation of Pattern Classifiers under Attack 2014 19 Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality 2014 20 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2014 21 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2013 22 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 2013 23 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 2013 24 Facilitating Effective User Navigation through Website Structure Improvement 2013 25 m-Privacy for Collaborative Data Publishing 2013 26 System to Filter Unwanted Messages fromOSN User Walls 2013
  • 7. Networking and Wireless Communication 1 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks 2014 2 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014 3 Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks 2014 4 Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks 2014 5 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes 2014 6 Automatic Test Packet Generation 2014 7 HALO: Hop-by-Hop Adaptive Link-State Optimal Routing 2014 8 A Two stage Deanonymization Attack Against Anonymized Social Networks 2014 9 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2014 Image Processing and Multimedia 1 Web Image Re-Ranking Using Query-Specific Semantic Signatures 2014 2 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding 2014 3 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014 4 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images 2014 5 Personalized Geo-Specific Tag Recommendation for Photos on Social Websites 2014 6 Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics (Dot Net) 2014 7 Sharing Visual Secrets in Single Image Random Dot Stereograms (Dot Net) 2014 8 FeatureMatch: A General ANNF Estimation Technique and its Applications (Dot Net) 2014 9 3D Face Recognition Under Expressions, Occlusions and Pose Variations 2013 10 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features 2013 11 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. 2013 12 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013 13 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 2013 14 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 2013 J2ME Mobile Based Projects
  • 8. 1 Adaptation of a virtual campus for mobile learning devices 2014 2 Bluetooth Mobile Based College Campus 2014 3 ECops via Handheld Mobile Devices 2014 4 Privacy-Conscious Location-Based Queries in Mobile Environments 2014 5 Ranking Model Adaptation for Domain-Specific Search 2014 6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency 2014 7 The Word in a nut shell : CONCISE RANGE QUERIES 2014 Parallel and Distributed System 1 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014 2 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014 3 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014 4 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures 2014 5 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 2014 6 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014 7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014 8 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks 2014 9 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014 10 Secure Deduplication with Efficient and Reliable Convergent Key Management 2014