2014 and 2015 Completed IEEE Projects List For Technical Details

advertisement
2014 and 2015 Completed IEEE Projects List
For Technical Details ::Contact @ K.Manjunath – 9535866270
TMKS Infotech,Bangalore,Karnataka
Sl.No
Project Title
Year
Cloud Computing
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
NCCloud: A Network Coding Based Storage System in a Cloud-of-Clouds
Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory
and Implementation
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Privacy Preserving Multi keyword Ranked Search over Encrypted Cloud Data
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
Low-Emissions Routing for Cloud Computing in IP-over-WDM Networks with Data
Centers
On the Cost–QoE Tradeoff for Cloud-Based Video Streaming Under Amazon EC2’s
Pricing Models
Optimal Power Allocation and Load Distribution for Multiple Heterogeneous Multi core
Server Processors across Clouds and Data Centers
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
Towards Differential Query Services in Cost Efficient Clouds
An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud
Computing
A Decentralized Cloud Firewall Framework with Resources Provisioning Cost
Optimization
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in
Multi cloud Storage
Identity Based Distributed Provable Data Possession in Multi-Cloud Storage
QoS Aware Data Replication for Data-Intensive Applications in Cloud Computing
Systems
Dynamic Cloud Pricing for Revenue Maximization
Integrity for Join Queries in the Cloud
Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
44
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
Secure kNN Query Processing in Un trusted Cloud Environments
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization
Using Map Reduce on Cloud
Compatibility aware Cloud Service Composition Under Fuzzy Preferences of Users
Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for
Mobile Streaming Applications
Consistency as a Service Auditing :Cloud Consistency
A Secure Client Side De duplication Scheme in Cloud Storage Environments
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
Cloud Assisted Mobile Access of Health Data With Privacy and Audit ability
Balancing Performance Accuracy and Precision for Secure Cloud Transactions
A Hybrid Cloud Approach for Secure Authorized De duplication
Performance and cost evaluation of an adaptive encryption architecture for cloud
databases
A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social
Networks
On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in
Multi cloud Storage
From the Cloud to the Atmosphere Running Map Reduce across Data Centers
Compatibility-Aware Cloud Service Composition under Fuzzy Preferences of Users
Cloud-Based Augmentation for Mobile Devices Motivation, Taxonomies, and Open
Challenges
Achieving Effective Cloud Search Services Multi-keyword Ranked Search over
Encrypted Cloud Data Supporting Synonym Query
A Mechanism Design Approach to Resource Procurement in Cloud Computing
45
--------------------------------PLACE TO ADD MORE TITLES -------------------------------
2014
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
Network Security
1
2
3
4
5
6
7
8
9
Behavioral Malware Detection in Delay Tolerant Networks
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
An Optimal Distributed Malware Defense System for Mobile Networks with
Heterogeneous Devices
Building a Scalable System for Stealthy P2P-Botnet Detection
An Error Minimizing Framework for Localizing Jammers in Wireless Networks
A Scalable and Modular Architecture for High-Performance Packet Classification
Bandwidth Distributed Denial of Service: Attacks and Defenses
E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels.
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
2014
2014
2014
2014
2014
2014
2014
2014
2014
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
PROFILR: Toward Preserving Privacy and Functionality in Geo Social Networks Nodes
A System for Denial of Service Attack Detection Based on Multivariate Correlation
Analysis
Securing Broker Less Publish Subscribe Systems Using Identity-Based Encryption
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
Ad hoc Networks & VANET & MANET
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Optimal Multicast Capacity and Delay Tradeoffs in MANETs
STARS: A Statistical Traffic Pattern Discovery System for MANETs
Trajectory Improves Data Delivery in Urban Vehicular Networks
Energy Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc
Networks
VSPN: VANET-Based Secure and Privacy-Preserving Navigation
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
Multicast Capacity in MANET with Infrastructure Support
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected
MANETs
AASR: An Authenticated Anonymous Secure Routing Protocol for MANETs in
Adversarial Environment
PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A
Cooperative Bait Detection Approach
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
15
16
17
18
19
20
21
Mobile Computing
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Large Scale Synthetic Social Mobile Networks with SWIM
Stochastic Bandwidth Estimation in Networks With Random Service
Efficient Authentication for Mobile and Pervasive Computing
Friend book: A Semantic-based Friend Recommendation System for Social Networks
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
2014
2014
2014
2014
2014
2014
2014
Wireless Sensor Networks
1
2
3
4
5
6
7
8
9
10
11
12
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
An Error Minimizing Framework for Localizing Jammers in Wireless Networks
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
Impact of UPFC on Power Swing Characteristic and Distance Relay Behavior
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
Optimization Decomposition for Scheduling and System Configuration in Wireless
Networks
Secure Continuous Aggregation in Wireless Sensor Networks
Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks.
Top-k Query Result Completeness Verification in Tiered Sensor Networks
Transmission-Efficient Clustering Method for Wireless Sensor Networks Using
Compressive Sensing
DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater
Sensor Networks
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
13
14
15
16
17
18
19
20
21
An Energy-Balanced Routing Method Based on Forward-Aware Factor for Wireless
Sensor Networks
Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop
Networks
Data Density Correlation Degree Clustering Method for Data Aggregation in WSN
Collaborative Scheduling in Dynamic Environments Using Error Inference
Link Quality Aware Code Dissemination in Wireless Sensor Networks
2014
2014
2014
2014
2014
2014
2014
2014
2014
Android Projects
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Improving Fairness, Efficiency, and Stability in HTTP-Based Adaptive Video Streaming
With Festive
Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
Mobility Prediction-based Smartphone Energy Optimization for Everyday Location
Monitoring
A Scalable and Mobility-Resilient Data Search System for Large-Scale Mobile Wireless
Networks
Smart DC Mobility Prediction-based Adaptive Duty Cycling for Everyday Location
Monitoring
LocaWard A Security and Privacy Aware Location-Based Rewarding System
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
Cooperative Positioning and Tracking in Disruption Tolerant Networks
Green Droid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications
MOSES: Supporting and Enforcing Security Profiles on Smart phones
Security Threats to Mobile Multimedia Applications: Camera Based Attacks on Mobile
Phones
SOS A Distributed Mobile Q&A System Based on Social Networks
A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless
Access Networks
DELTA++ Reducing the Size of Android Application Updates
Catch Me If You Can: Evaluating Android Anti-Malware against Transformation
Attacks
Data Mining
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
1
2
3
4
5
6
Fast Nearest Neighbor Search with Keywords
An Empirical Performance Evaluation of Relational Keyword Search Systems
Facilitating Document Annotation using Content and Querying Value
Supporting Privacy Protection in Personalized Web Search
Secure Mining of Association Rules in Horizontally Distributed Databases
Efficient Ranking on Entity Graphs with Personalized Relationships
2014
2014
2014
2014
2014
2014
7
SOS: A Distributed Mobile Q&A System Based on Social Networks
2014
8
9
10
Privacy-Preserving and Content-Protecting Location Based Queries
2014
2014
2014
11
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark
Scheme.
Privacy-Preserving Authenticated Key-Exchange Over Internet.
Accuracy Constrained Privacy-Preserving Access Control Mechanism for Relational Data
A generic framework for top k pairs and top k objects queries over sliding windows
Efficient Prediction of Difficult Keyword Queries over Databases
Discovering Emerging Topics in Social Streams via Link-Anomaly
2014
Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
Access Control in Decentralized Online Social Networks Applying a Policy Hiding
Cryptograph
Efficient Prediction of Difficult Keyword Queries over Databases
Security Evaluation of Pattern Classifiers under Attack
Temporal Workload-Aware Replicated Partitioning for Social Networks
2014
2014
2014
2014
12
13
14
15
16
17
18
19
20
21
22
23
Active Learning of Constraints for Semi-Supervised Clustering.
An Empirical Performance Evaluation of Relational Keyword Search Techniques.
2014
2014
2014
2014
2014
2014
2014
2014
Networking and Wireless Communication
1
2
3
4
5
6
7
8
9
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in
Delay-Tolerant Networks
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast
Environments
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure
Routing
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
Optimization Decomposition for Scheduling and System Configuration in Wireless
Networks
Adaptive Transmission for Delay-Constrained Wireless Video.
Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay
Networks
2014
2014
2014
2014
2014
2014
2014
2014
2014
Image Processing and Multimedia
1
2
3
Web Image Re-Ranking Using Query-Specific Semantic Signatures
Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
2014
2014
2014
1
2
3
4
5
6
7
3D Face Recognition Under Expressions, Occlusions and Pose Variations
Iris Recognition Using Possibilistic Fuzzy Matching on Local Features
Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words.
A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs
Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over
Wireless Networks
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor
Networks
2013
2013
2013
2013
2013
2013
2013
8
2013
J2ME Mobile Based Projects
1
2
3
4
5
6
7
Adaptation of a virtual campus for mobile learning devices
Bluetooth Mobile Based College Campus
ECops via Handheld Mobile Devices
Privacy-Conscious Location-Based Queries in Mobile Environments
Ranking Model Adaptation for Domain-Specific Search
SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For
Mobile-Healthcare Emergency
The Word in a nut shell : CONCISE RANGE QUERIES
2014
2014
2014
2014
2014
2014
2014
Parallel and Distributed System
1
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
2014
2
Exploiting Service Similarity for Privacy in Location-Based Search Queries
2014
3
LocaWard: A Security and Privacy Aware Location-Based Rewarding System
2014
4
On False Data-Injection Attacks against Power System State Estimation: Modeling and
2014
Countermeasures
5
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
2014
6
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
2014
7
SOS: A Distributed Mobile Q&A System Based on Social Networks
2014
8
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area
2014
Networks
9
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
2014
Download