10

Click here to load reader

IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

Embed Size (px)

DESCRIPTION

Engineering students needs IEEE based projects for their final year submissions. We provide these projects for BE, ME, PHD, MCS, MCA Students.

Citation preview

Page 1: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

2013 - 2014 IEEE Projects

ANDROID

1) OSA1301 - T-Drive: Enhancing Driving Directions with Taxi Drivers’ Intelligence

2) OSA1302 - Dynamic Personalized Recommendation on Sparse Data

3) OSA1303 - Spatial Query Integrity with Voronoi Neighbours

4) OSA1304 - MeetYou -- Social Networking on Android

5) OSA1305 -A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile

Environments

6) OSA1306 - PMSE: A Personalized Mobile Search Engine

7) OSA1307 – Crowd-sourced Trace Similarity with Smartphones

8) OSA1308 - Twitsper: Tweeting Privately

9) OSA1309 - Review of Behaviour Malware Analysis for Android

10) OSA1310 - Research in Progress - Defending Android Smartphones from Malware Attacks

11) OSA1311 - Secure Encounter-based Mobile Social Networks: Requirements, Designs, and

Tradeoffs

12) OSA1312 - CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud

13) OSA1313 - Collaborative Policy Administration

14) OSA1314 - SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for

Mobile-Healthcare Emergency

15) OSA1315- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using

Attribute-Based Encryption

16) OSA1316 - Collaborative Learning Assistant for Android

Page 2: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

2013 - 2014 IEEE Projects

JAVA

CLOUD COMPUTING

1) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing

Systems

2) CloudMoV: Cloud-based Mobile Social TV

3) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment

4) Error-Tolerant Resource Allocation and Payment Minimization for Cloud System

5) Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

6) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

7) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

8) Privacy-Preserving Public Auditing for Secure Cloud Storage

9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-

Based Encryption

10) Enabling Dynamic Data and Indirect Mutual Trust for Cloud

Computing Storage Systems

11) A Load Balancing Model Based on Cloud Partitioning for the

Public Cloud

12) Load Rebalancing for Distributed File Systems in Clouds

13) Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

14) Privacy Preserving Delegated Access Control in Public Clouds

15) Attribute-Based Encryption with Verifiable Outsourced Decryption

Page 3: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

KNOWLEDGE AND DATA ENGINEERING:

16) A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

17) A New Algorithm for Inferring User Search Goals with Feedback Sessions

18) Annotating Search Results from Web Databases

19) Anomaly Detection via Online Over-Sampling Principal Component Analysis

20) Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

21) m-Privacy for Collaborative Data Publishing

22) Protecting Sensitive Labels in Social Network Data Anonymization

23) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development

24) Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection

25) A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse

Drug Reaction Signal Pairs

26) Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm

27) Crowdsourcing Predictors of Behavioural Outcomes

28) Facilitating Document Annotation using Content and Querying Value

29) A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

30) A System to Filter Unwanted Messages from OSN User Walls

31) Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.

32) Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers

33) Spatial Approximate String Search

34) Preventing Private Information Inference Attacks on Social Networks

Page 4: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

35) Multiparty Access Control for Online Social Networks Model and Mechanisms

36) Incentive Compatible Privacy-Preserving Data Analysis

SECURE COMPUTING:

37) EAACK—A Secure Intrusion-Detection System for MANETs

38) Identity-Based Secure Distributed Data Storage Schemes

39) Modelling the Pairwise Key Redistribution Scheme in the Presence of Unreliable Links

40) NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

41) Privacy Preserving Data Sharing With Anonymous ID Assignment

42) Securing Class Initialization in Java-like Languages

43) Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

44) SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems

45) WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream

46) Two tales of privacy in online social networks

47) Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

48) Twitsper: Tweeting Privately

49) Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks

50) Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

NETWORKING:

51) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

52) Delay-Based Network Utility Maximization

53) Dynamic Control of Coding for Progressive Packet Arrivals in DTNs

54) Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols

Page 5: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

55) On the Node Clone Detection in Wireless Sensor Networks

56) Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power

57) Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks

58) Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm

59) Participatory Privacy: Enabling Privacy in Participatory Sensing

60) Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed

Networks

PARALLEL AND DISTRIBUTED SYSTEMS

61) A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

62) Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Scheme

63) IP-Geolocation Mapping for Moderately Connected Internet Regions

64) Optimal Client-Server Assignment for Internet Distributed Systems

65) SocialTube P2P-assisted Video Sharing in Online Social Networks

66) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

MOBILE COMPUTING:

67) Content Sharing over Smartphone-Based Delay-Tolerant Networks

68) DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless

Mobile Networks

69) Discovery and Verification of Neighbour Positions in Mobile Ad Hoc Networks

Page 6: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

70) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile

Users

71) Toward a Statistical Framework for Source Anonymity in Sensor Networks

72) Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

73) Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

74) Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

PATTERN ANALYSIS AND MACHINE INTELLIGENCE:

75) A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare

Data

SERVICES COMPUTING:

76) A Decentralized Service Discovery Approach on Peer-to-Peer Networks

77) Personalized QoS-Aware Web Service Recommendation and Visualization

78) Privacy-Enhanced Web Service Composition

SOFTWARE ENGINEERING:

79) Whole Test Suite Generation

MULTIMEDIA:

80) Understanding the External Links of Video Sharing Sites: Measurement and Analysis

Page 7: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

******************

DOT NET

CLOUD COMPUTING:

1) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy

Preserving of Intermediate Data Sets in Cloud

2) An Adaptive Cloud Downloading Service

3) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

4) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

5) On Data Staging Algorithms for Shared Data Accesses in Clouds

6) Optimal Multi-server Configuration for Profit Maximization in Cloud Computing

7) Privacy-Preserving Public Auditing for Secure Cloud Storage

8) QoS Ranking Prediction for Cloud Services

9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-

Based Encryption

10) Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud

Computing Systems

11) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

12) A Log-based Approach to Make Digital Forensics Easier on Cloud Computing

13) Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks

14) CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud

15) Privacy Preserving Delegated Access Control in Public Clouds

16) Dynamic Audit Services for Outsourced Storages in Clouds

Page 8: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

KNOWLEDGE AND DATA ENGINEERING:

17) A New Algorithm for Inferring User Search Goals with Feedback Sessions

18) A Survey of XML Tree Patterns

19) Dynamic Personalized Recommendation on Sparse Data

20) Mining User Queries with Markov Chains: Application to Online Image Retrieval

21) TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality

22) A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile

Environments

23) Supporting Search-As-You-Type Using SQL in Databases

24) Secure Mining of Association Rules in Horizontally Distributed Databases

SECURE COMPUTING:

25) A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.

26) EAACK—A Secure Intrusion-Detection System for MANETs

27) Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information

Sharing

28) Modelling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links

29) Privacy Preserving Data Sharing With Anonymous ID Assignment

30) SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

NETWORKING:

31) A Distributed Control Law for Load Balancing in Content Delivery Networks

Page 9: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

32) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

33) An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks

34) BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments

35) Efficient Algorithms for Neighbour Discovery in Wireless Networks

36) Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality

37) Resource Allocation for QoS Support in Wireless Mesh Networks

38) A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless

Networks With Order-Optimal Per-Flow Delay

PARALLEL AND DISTRIBUTED SYSTEMS:

39) A Secure Payment Scheme with Low Communication and Processing Overhead for Multi-hop

Wireless Networks

40) Multicast Capacity in MANET with Infrastructure Support

41) SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-

Healthcare Emergency

42) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

43) Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks

44) A Probabilistic Misbehaviour Detection Scheme towards Efficient Trust Establishment in Delay-

tolerant Networks

45) Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor

Networks

MOBILE COMPUTING:

46) Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks

Page 10: IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

[email protected] www.ocularsystems.in +91 9970186685 +91-7385043047

47) Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game

Approach

48) EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

49) Optimal Multicast Capacity and Delay Trade-offs in MANETs

50) Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks

51) A Neighbour Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in

Mobile Ad Hoc Networks

52) Network-Assisted Mobile Computing with Optimal Uplink Query Processing

53) Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks

54) On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks

55) Toward Accurate Mobile Sensor Network Localization in Noisy Environments

IMAGE PROCESSING:

56) Query-Adaptive Image Search with Hash Codes

57) Reversible Data Hiding With Optimal Value Transfer

58) Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram

Shifting

59) Local Directional Number Pattern for Face Analysis: Face and Expression Recognition

60) Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage

SERVICE COMPUTING (WEB SERVICE):

61) Cost-Based Optimization of Service Compositions

62) Evolution of Social Networks Based on Tagging Practices

MULTIMEDIA:

63) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.