Tuesday, 23 December 2014

2014 IEEE PROJECTS Total IEEE Projects Java

2014  IEEE PROJECTS
Total IEEE Projects
Java

S.No
DATA MINING PROJECTS & KNOWLEDGE   ENGINEERING
Year
1
M-Privacy For Collaborative Data Publishing
2014
2
Privacy Preserving Delegated Access Control In  Public Clouds
2014
3
Fast Nearest Neighbor Search With Keywords,*(2013 – Maintaining privacy preserving)
2014
4
Hiding In The Mobile Crowd Location Privacy Through Collaboration
2014
5
Bin Rank Scaling Dynamic Authority Based Search Using Materialized Sub Graphs
2014
6
A Frequent Term Based Text Clustering Approach Using Novel Similarity Measure
2014
7
Similarity Preserving Snippet-Based Visualization Of Web Search Results
2014
8
Building Confidential And Efficient Query Services In The Cloud
2014
9
Supporting Privacy Protection In Personalized Web Search
2014
10
Dealing With Concept Drift In Process Mining
2014
11
Secure Out sourced Attribute Based Signatures
2014
12
Hardware Based Enhancing
2014
13
Infrequent Weighted Item Set Mining Using Frequent Pattern Growth
2014
14
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
2014
15
Robust Module Based Data Management
2014

S.No
CLOUD COMPUTING
Year
16
Key aggregate cryptosystem for scalable data sharing in the cloud storage
2014
17
Privacy Preserving Public Auditing for shared data in the Cloud
2014
S.No
NETWORK SECURITY
Year
18
Provably  secured  two server  hash  password authentication
2014








DOTNET IEEE PROJECTS
Sl.No
DATA MINING PROJECTS & KNOWLEDGE   ENGINEERING
Year
19
An Empirical Performance Evaluation of Relational Keyword Search Systems
2014
20
Efficient Instant Fuzzy Search with Proximity Ranking
2014
21
Dynamic Query forms  for Database Queries
2014
22
Genetic Optimization
2014
23
Antipishing using Visual Cryptography
2014

S.No
CLOUD  COMPUTING
Year
24
Scalable and secure sharing of personal health records in using attribute-based encryption
2014

S.No
NETWORKING
Year
25
Design and implementation of an Approximate communication system for wireless media application
2014
26
Fast Rerout Method
2014
27
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
2014
28
A tracker for spanning the WSN and defeating the blockers in casting mechanism
2014
29
TO Lie or to comply Defending against Flood Attacksin Disruption Torent Networks
2014
30
SPREAD- Improving Network Security By Multipath Routing In Mobile Ad Hoc Networks
2014



MATLAB IEEE PROJECTS

S.No
Image Processing
Year
31
Speech enhancement using adaptive filters and beam forming techniques.
2014
32
Face identification using large feature sets.
2014
33
Content based image retrieval.
2014
34
*Object detection and Matching.
2014
35
*Object detection filling holes and applying color histogram.
2014
36
Visual Cryptography.
2014
37
Computational perceptual features for texture representation and retrieval
2014
38
Fast Visual Tracking via Dense Spatial-Temporal Context Learning.
2014
39
Gradient Histogram Estimation and Preservation for Texture Enhanced Image De noising
2014
40
Image Set based Collaborative Representation for Face Recognition
2014
41
Mixed Noise Removal by Weighted Encoding with Sparse Non-local Regularization.
2014
42
Robust Principal Component Analysis with Complex Noise.
2014

Wednesday, 27 August 2014

TOP Android Projects are Here


TOP Android Projects are Here


  1. Cloud FTP A Case Study of Migrating Traditional Applications to the Cloud    IEEE Paper

  2. GPS Location Based Alarm System    Non-IEEE

  3. Meet You – Social Networking on Android    IEEE Paper

  4. Research in Progress- Defending Android Smart phones from Malware Attacks    IEEE Paper

  5. Safe Driving Using Mobile Phones    IEEE Paper

     

    For more info mail me your mail id @ ieeeprojectsinhyd@gmail.com

Thursday, 24 July 2014

IEEE 2013 Java Project Titles


IEEE JAVA PROJECTS TITLES
YEAR--2013
PROJECT TITLE
DOMAIN
1.   A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Development
Cloud Computing
2.   AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
Cloud Computing
3.   Collaboration in Multi Cloud Computing Environments Framework & Security Issues
Cloud Computing
4.   Mining Contracts for Business Events and Temporal Constraints in Service Engagements
Cloud Computing
5.   Privacy Preserving Delegated Access Control in Public Cloud
Cloud Computing
6.   Privacy Preserving Public Auditing for Secure Cloud Storage
Cloud Computing
7.   Winds of Change from Vendor Lock-In to the Meta Cloud
Cloud Computing
8.   Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
Cloud Computing
9.   Load Rebalancing for Distributed File Systems in Clouds
Cloud Computing
10.  Intelligent Lung Cancer Prediction System
Data Mining
11.  Fast nearest neighbor search with key words
Data Mining
12.  A Fast Clustering-Based Feature Subset   Selection Algorithm for High Dimensional Data
Data Mining
13.  A System to Filter Unwanted Messages from OSN User Walls
Data Mining
14.  Cloud MoV Cloud-based Mobile Social TV
Data Mining
15.  Comparable Entity Mining from Comparative Questions
Data Mining
16.  Crowd Sourcing Predictors of Behavioral Outcomes
Data Mining
17.  Facilitating effective user navigation through website structure improvement
Data Mining
18.  Focus Learning to Crawl Web Forums
Data Mining
19.  Incentive Compatible Privacy-Preserving Data Analysis
Data Mining
20.  PMSE : A Personalized Mobile Search Engine
Data Mining
21.  Robust Module Based Data Management
Data Mining
22.  Sensitive Label Privacy Protection on Social Network Data
Data Mining
23.  Spatial Approximate String Search
Data Mining
24.  Multiparty Access Control for Online Social Networks: Model and Mechanisms
Data Mining
25.  Annotating Search Results from Databases
Data Mining
26.  A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs
Data Mining
27.  m-Privacy for Collaborative Data Publishing
Data Mining
28.  Improving Various Reversible Data Hiding Schemes
Image Processing
29.  A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
Mobile Computing
30.  Distributed Cooperative Caching in Social Wireless Networks
Mobile Computing
31.  Mobile relay configuration in data-intensive wireless sensor networks
Mobile Computing
32.  Privacy Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
Mobile Computing
33.  Towards a statistical framework for source anonymity in sensor networks
Mobile Computing
34.  Vampire attacks: Draining life from wireless ad-hoc sensor networks
Mobile Computing
35.  Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
Mobile Computing
36.  Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
Mobile Computing
37.  Discovery and verification of neighbor positions in mobile adhoc  networks
Mobile Computing
38.  Access Policy Consolidation for Event Processing Systems
Networking
39.  Fully Anonymous Profile Matching in Mobile Social Networks
Networking
40.  Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
Networking
41.  Price Differentiation for Communication Networks
Networking
42.  Pack: Prediction based cloud bandwidth and cost reduction system
Networking
43.  Dynamic resource allocation using virtual machines for cloud computing environment
Parallel and Distribution
44.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
Parallel and distribution
45.  CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Secure Computing
46.  Extracting Spread-Spectrum Hidden Data from Digital Media
Secure Computing
47.  Two Tales of Privacy in Online Social Networks
Secure Computing
48.  Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
Secure Computing
49.  A secure protocol for spontaneous wireless ad-hoc network creation
Wireless Sensor Networks
50.  A highly scalable key pre distribution scheme for wireless sensor networks
Wireless Sensor Networks
51.  Attribute-Based Encryption With Verifiable Outsourced Decryption
Secure Computing
52.  Protecting Sensitive Labels in Social Network Data Anonymization
Data Mining