2014 and 2015 Completed IEEE Projects List For Technical Details ::Contact @ K.Manjunath – 9535866270 TMKS Infotech,Bangalore,Karnataka Sl.No Project Title Year Cloud Computing 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications Low-Emissions Routing for Cloud Computing in IP-over-WDM Networks with Data Centers On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s Pricing Models Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core Server Processors across Clouds and Data Centers PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Towards Differential Query Services in Cost Efficient Clouds An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage Identity Based Distributed Provable Data Possession in Multi-Cloud Storage QoS Aware Data Replication for Data-Intensive Applications in Cloud Computing Systems Dynamic Cloud Pricing for Revenue Maximization Integrity for Join Queries in the Cloud Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 44 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Secure kNN Query Processing in Un trusted Cloud Environments A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud Compatibility aware Cloud Service Composition Under Fuzzy Preferences of Users Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for Mobile Streaming Applications Consistency as a Service Auditing :Cloud Consistency A Secure Client Side De duplication Scheme in Cloud Storage Environments Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability Balancing Performance Accuracy and Precision for Secure Cloud Transactions A Hybrid Cloud Approach for Secure Authorized De duplication Performance and cost evaluation of an adaptive encryption architecture for cloud databases A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multi cloud Storage From the Cloud to the Atmosphere Running Map Reduce across Data Centers Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users Cloud-Based Augmentation for Mobile Devices Motivation, Taxonomies, and Open Challenges Achieving Effective Cloud Search Services Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query A Mechanism Design Approach to Resource Procurement in Cloud Computing 45 --------------------------------PLACE TO ADD MORE TITLES ------------------------------- 2014 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 Network Security 1 2 3 4 5 6 7 8 9 Behavioral Malware Detection in Delay Tolerant Networks A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis An Optimal Distributed Malware Defense System for Mobile Networks with Heterogeneous Devices Building a Scalable System for Stealthy P2P-Botnet Detection An Error Minimizing Framework for Localizing Jammers in Wireless Networks A Scalable and Modular Architecture for High-Performance Packet Classification Bandwidth Distributed Denial of Service: Attacks and Defenses E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 2014 2014 2014 2014 2014 2014 2014 2014 2014 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Efficient and Privacy-Aware Data Aggregation in Mobile Sensing PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes A System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 Ad hoc Networks & VANET & MANET 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Optimal Multicast Capacity and Delay Tradeoffs in MANETs STARS: A Statistical Traffic Pattern Discovery System for MANETs Trajectory Improves Data Delivery in Urban Vehicular Networks Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks VSPN: VANET-Based Secure and Privacy-Preserving Navigation Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks Multicast Capacity in MANET with Infrastructure Support Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in Adversarial Environment PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 15 16 17 18 19 20 21 Mobile Computing 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Large Scale Synthetic Social Mobile Networks with SWIM Stochastic Bandwidth Estimation in Networks With Random Service Efficient Authentication for Mobile and Pervasive Computing Friend book: A Semantic-based Friend Recommendation System for Social Networks A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014 2014 2014 2014 2014 2014 2014 Wireless Sensor Networks 1 2 3 4 5 6 7 8 9 10 11 12 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks An Error Minimizing Framework for Localizing Jammers in Wireless Networks A Survey of Intrusion Detection Systems in Wireless Sensor Networks Impact of UPFC on Power Swing Characteristic and Distance Relay Behavior Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks Optimization Decomposition for Scheduling and System Configuration in Wireless Networks Secure Continuous Aggregation in Wireless Sensor Networks Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks. Top-k Query Result Completeness Verification in Tiered Sensor Networks Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 13 14 15 16 17 18 19 20 21 An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless Sensor Networks Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks Data Density Correlation Degree Clustering Method for Data Aggregation in WSN Collaborative Scheduling in Dynamic Environments Using Error Inference Link Quality Aware Code Dissemination in Wireless Sensor Networks 2014 2014 2014 2014 2014 2014 2014 2014 2014 Android Projects 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming With Festive Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications Mobility Prediction-based Smartphone Energy Optimization for Everyday Location Monitoring A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless Networks Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location Monitoring LocaWard A Security and Privacy Aware Location-Based Rewarding System Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Cooperative Positioning and Tracking in Disruption Tolerant Networks Green Droid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications MOSES: Supporting and Enforcing Security Profiles on Smart phones Security Threats to Mobile Multimedia Applications: Camera Based Attacks on Mobile Phones SOS A Distributed Mobile Q&A System Based on Social Networks A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks DELTA++ Reducing the Size of Android Application Updates Catch Me If You Can: Evaluating Android Anti-Malware against Transformation Attacks Data Mining 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 2014 1 2 3 4 5 6 Fast Nearest Neighbor Search with Keywords An Empirical Performance Evaluation of Relational Keyword Search Systems Facilitating Document Annotation using Content and Querying Value Supporting Privacy Protection in Personalized Web Search Secure Mining of Association Rules in Horizontally Distributed Databases Efficient Ranking on Entity Graphs with Personalized Relationships 2014 2014 2014 2014 2014 2014 7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014 8 9 10 Privacy-Preserving and Content-Protecting Location Based Queries 2014 2014 2014 11 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme. Privacy-Preserving Authenticated Key-Exchange Over Internet. Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data A generic framework for top k pairs and top k objects queries over sliding windows Efficient Prediction of Difficult Keyword Queries over Databases Discovering Emerging Topics in Social Streams via Link-Anomaly 2014 Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality Access Control in Decentralized Online Social Networks Applying a Policy Hiding Cryptograph Efficient Prediction of Difficult Keyword Queries over Databases Security Evaluation of Pattern Classifiers under Attack Temporal Workload-Aware Replicated Partitioning for Social Networks 2014 2014 2014 2014 12 13 14 15 16 17 18 19 20 21 22 23 Active Learning of Constraints for Semi-Supervised Clustering. An Empirical Performance Evaluation of Relational Keyword Search Techniques. 2014 2014 2014 2014 2014 2014 2014 2014 Networking and Wireless Communication 1 2 3 4 5 6 7 8 9 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast Environments Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Optimization Decomposition for Scheduling and System Configuration in Wireless Networks Adaptive Transmission for Delay-Constrained Wireless Video. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks 2014 2014 2014 2014 2014 2014 2014 2014 2014 Image Processing and Multimedia 1 2 3 Web Image Re-Ranking Using Query-Specific Semantic Signatures Click Prediction for Web Image Reranking Using Multimodal Sparse Coding Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems 2014 2014 2014 1 2 3 4 5 6 7 3D Face Recognition Under Expressions, Occlusions and Pose Variations Iris Recognition Using Possibilistic Fuzzy Matching on Local Features Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 2013 2013 2013 2013 2013 2013 2013 8 2013 J2ME Mobile Based Projects 1 2 3 4 5 6 7 Adaptation of a virtual campus for mobile learning devices Bluetooth Mobile Based College Campus ECops via Handheld Mobile Devices Privacy-Conscious Location-Based Queries in Mobile Environments Ranking Model Adaptation for Domain-Specific Search SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency The Word in a nut shell : CONCISE RANGE QUERIES 2014 2014 2014 2014 2014 2014 2014 Parallel and Distributed System 1 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 2014 2 Exploiting Service Similarity for Privacy in Location-Based Search Queries 2014 3 LocaWard: A Security and Privacy Aware Location-Based Rewarding System 2014 4 On False Data-Injection Attacks against Power System State Estimation: Modeling and 2014 Countermeasures 5 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks 2014 6 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks 2014 7 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014 8 Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area 2014 Networks 9 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks 2014