Tuesday 23 December 2014

2014 IEEE PROJECTS Total IEEE Projects

2014  IEEE PROJECTS
Total IEEE Projects
Java

S.No
DATA MINING PROJECTS & KNOWLEDGE   ENGINEERING
Year
1
M-Privacy For Collaborative Data Publishing
2014
2
Privacy Preserving Delegated Access Control In  Public Clouds
2014
3
Fast Nearest Neighbor Search With Keywords,*(2013 – Maintaining privacy preserving)
2014
4
Hiding In The Mobile Crowd Location Privacy Through Collaboration
2014
5
Bin Rank Scaling Dynamic Authority Based Search Using Materialized Sub Graphs
2014
6
A Frequent Term Based Text Clustering Approach Using Novel Similarity Measure
2014
7
Similarity Preserving Snippet-Based Visualization Of Web Search Results
2014
8
Building Confidential And Efficient Query Services In The Cloud
2014
9
Supporting Privacy Protection In Personalized Web Search
2014
10
Dealing With Concept Drift In Process Mining
2014
11
Secure Out sourced Attribute Based Signatures
2014
12
Hardware Based Enhancing
2014
13
Infrequent Weighted Item Set Mining Using Frequent Pattern Growth
2014
14
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
2014
15
Robust Module Based Data Management
2014

S.No
CLOUD COMPUTING
Year
16
Key aggregate cryptosystem for scalable data sharing in the cloud storage
2014
17
Privacy Preserving Public Auditing for shared data in the Cloud
2014
S.No
NETWORK SECURITY
Year
18
Provably  secured  two server  hash  password authentication
2014








DOTNET IEEE PROJECTS
Sl.No
DATA MINING PROJECTS & KNOWLEDGE   ENGINEERING
Year
19
An Empirical Performance Evaluation of Relational Keyword Search Systems
2014
20
Efficient Instant Fuzzy Search with Proximity Ranking
2014
21
Dynamic Query forms  for Database Queries
2014
22
Genetic Optimization
2014
23
Antipishing using Visual Cryptography
2014

S.No
CLOUD  COMPUTING
Year
24
Scalable and secure sharing of personal health records in using attribute-based encryption
2014

S.No
NETWORKING
Year
25
Design and implementation of an Approximate communication system for wireless media application
2014
26
Fast Rerout Method
2014
27
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
2014
28
A tracker for spanning the WSN and defeating the blockers in casting mechanism
2014
29
TO Lie or to comply Defending against Flood Attacksin Disruption Torent Networks
2014
30
SPREAD- Improving Network Security By Multipath Routing In Mobile Ad Hoc Networks
2014




MATLAB IEEE PROJECTS

S.No
Image Processing
Year
31
Speech enhancement using adaptive filters and beam forming techniques.
2014
32
Face identification using large feature sets.
2014
33
Content based image retrieval.
2014
34
*Object detection and Matching.
2014
35
*Object detection filling holes and applying color histogram.
2014
36
Visual Cryptography.
2014
37
Computational perceptual features for texture representation and retrieval
2014
38
Fast Visual Tracking via Dense Spatial-Temporal Context Learning.
2014
39
Gradient Histogram Estimation and Preservation for Texture Enhanced Image De noising
2014
40
Image Set based Collaborative Representation for Face Recognition
2014
41
Mixed Noise Removal by Weighted Encoding with Sparse Non-local Regularization.
2014
42
Robust Principal Component Analysis with Complex Noise.
2014

Monday 8 September 2014

IEEE 2012 DotNET projects list


IEEE DOTNET PROJECTS TITLES
YEAR--2012
PROJECT TITLE
DOMAIN


1.       
A New Cell-Counting-Based Attack Against Tor
Networking

2.       
Defenses Against Large Scale Online Password Guessing Attacks By Using
Persuasive Click Points
Data Mining

3.       
A Novel Anti Phishing Framework Based On Visual Cryptography
Distributed And Parallel Systems

4.       
A Probabilistic Model Of Visual Cryptography Scheme With Dynamic Group
Information Forensics And Security

5.       
A Query Formulation Language For The Data Web
Data Mining

6.       
A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding
Parallel And Distributed Systems

7.       
Ample: An Adaptive Traffic Engineering System Based On Virtual Routing Topologies
Networking

8.       
Automatic Reconfiguration For Large-Scale Reliable Storage Systems
Dependable And Secure Computing

9.       
Automatic Reconfiguration For Large-Scale Reliable Storage Systems
Dependable And Secure Computing

10.   
Catching Packet Droppers And Modifiers In Wireless Sensor Networks
Parallel And Distributed Systems

11.   
Cloud Computing Security: From Single To Multi-Clouds
System Sciences

12.   
Cooperative Download In Vehicular Environments
Mobile Computing

13.   
Design And Implementation Of Tarf: A Trust-Aware Routing Framework For Wsns
Dependable And Secure Computing

14.   
Distributed Throughput Maximization In Wireless Networks Via Random Power Allocation
Mobile Computing

15.   
Efficient Audit Service Outsourcing For Data Integrity In Clouds
Cloud Computing

16.   
Enhanced Data Security Model For Cloud Computing
Cloud And Mobile Computing

17.   
Ensuring Distributed Accountability For Data Sharing In The Cloud
Dependable And Secure Computing

18.   
Es-Mpich2: A Message Passing Interface With Enhanced Security
Dependable And Secure Computing

19.   
Efficient Multidimensional Fuzzy Search For Personal Information Management Systems
Data Mining

20.   
Fairtorrent: A Deficit-Based Distributed Algorithm To Ensure Fairness In Peer-To-Peer Systems
Networking

21.   
Grouping-Enhanced Resilient Probabilistic En-Route Filtering Of Injected
False Data In Wsns
Parallel And Distributed Systems,

22.   
Hasbe: A Hierarchical Attribute-Based Solution For Flexible And Scalable Access Control In Cloud Computing
Information Forensics And Security

23.   
Horizontal Aggregations In Sql To Prepare Data Sets For Data Mining Analysis
Data Mining

24.   
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
Data Mining

25.   
Mining Web Graphs For Recommendations
Data Mining

26.   
Multiple Exposure Fusion For High Dynamic Range Image Acquisition
Image Processing

27.   
On The Security And Efficiency Of Content Distribution Via Network Coding
Dependable And Secure Computing

28.   
Optimal Power Allocation In Multi-Relay Mimo Cooperative Networks: Theory And Algorithms
Selected Areas In Communications

29.   
Optimal Source-Based Filtering Of Malicious Traffic
Networking

30.   
Organizing User Search Histories
Data Mining

31.   
Outsourced Similarity Search On Metric Data Assets
Data Mining

32.   
Protecting Location Privacy In Sensor Networks Against A Global Eavesdropper
Mobile Computing,

33.   
Query Planning For Continuous Aggregation Queries Over A Network Of Data Aggregators
Data Mining

34.   
Revisiting Defenses Against Large-Scale Online Password Guessing Attacks
Dependable And Secure Computing

35.   
Scalable Learning Of Collective Behavior
Data Mining

36.   
Secure And Efficient Handover Authentication Based On Bilinear Pairing Functions
Wireless Communications

37.   
Semi Supervised Biased Maximum Margin Analysis For Interactive Image Retrieval
Image Processing,

38.   
Smile Detection By Boosting Pixel Differences
Image Processing

39.   
Spoc: A Secure And Privacy-Preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency
Parallel And Distributed Systems

40.   
The Three-Tier Security Scheme In Wireless Sensor Networks With Mobile Sinks
Parallel And Distributed Systems

41.   
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications
Wireless Networking

42.   
Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks
Mobile Computing

43.   
Towards Secure And Dependable Storage Services In Cloud Computing
Cloud Computing

44.   
Tree-Based Mining For Discovering Patterns Of Human Interaction In Meetings
Data Mining

45.   
Becan: A Bandwidth-Efficient Cooperative Authentication Scheme For Filtering Injected False Data In Wireless Sensor Networks
Parallel And Distributed Systems

46.   
Compressed-Sensing-Enabled Video Streaming For Wireless Multimedia Sensor Networks
Multimedia

47.   
Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption
Cloud Computing

48.   
Robust Face-Name Graph Matching For Movie Character Identification
Multimedia

49.   
Securing Node Capture Attacks For Hierarchical Data Aggregation In Wireless Sensor Networks
Wireless Networking