Apidays New York 2024 - The value of a flexible API Management solution for O...
Global tech project list
1. IEEE Projects Final List
No Project Name Domain
1 Jamming-Aware Traffic Allocation For Multiple-Path Routing
Using Portfolio Selection
Networking
2 A New Cell-Counting-Based Attack Against Tor Networking
3 Cooperative Download In Vehicular Environments Networking
4 Data Delivery Properties Of Human Contact Networks Networking
5 Self-Reconfigurable Wireless Mesh Networks Networking
6 Reliability In Layered Networks With Random Link Failures Networking
7 Load-Balancing Multipath Switching System with Flow Slice Networking
8 Achieving Secure, Scalable, And Fine-Grained Data Access
Control In Cloud Computing
Cloud Computing
9 Privacy-Preserving Public Auditing For Data Storage Security In
Cloud Computing
Cloud Computing
10 Fuzzy Keyword Search Over Encrypted Data In Cloud Computing Cloud Computing
11 Cloud Computing Security: From Single To Multi-Clouds Cloud Computing
12 Automatic protocol blocker for privacy preserving public auditing
in cloud computing
Cloud Computing
13 Dynamic Audit Services for Integrity Verification of Outsourced
Storages in Clouds
Cloud Computing
14 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
Cloud Computing
15 Publishing Search Logs – A Comparative Study Of Privacy
Guarantees
Data Engineering
16 Horizontal Aggregations In SQL To Prepare Data Sets For Data
Mining Analysis
Data Engineering
2. 17 Closing The Loop In Webpage Understanding Data Engineering
18 Automatic Discovery Of Personal Name Aliases From The Web Data Engineering
19 A Personalized Ontology Model For Web Information Gathering Data Engineering
20 Scalable And Secure Sharing Of Personal Health Records In Cloud
Computing Using Attribute-Based Encryption
Data Engineering
21 Efficient Computation of Range Aggregates against Uncertain
Location Based Queries
Data Engineering
22 Hiding Sensitive Association Rule For Privacy Preservation Security
23 Authentication Schemes For Session Passwords Using Color And
Images
Security
24 Separable Reversible Data Hiding In Encrypted Image Security
25 Implicit Password Authentication System Security
26 Data Hiding In Motion Vectors Of Compressed Video Based On
Their Associated Prediction Error
Security
27 Defenses Against Large Scale Online Password Guessing Attacks
By Using Persuasive Click Points
Security
28 A Probabilistic Model Of (T, N) Visual Cryptography Scheme
With Dynamic Group
Security
3.
4.
5. 29 Robust Correlation Of Encrypted Attack Traffic Through Stepping
Stones By Flow Watermarking
Image Processing
30 On the Selection of Optimal Feature Region Set for Robust Digital
Image Watermarking
Image Processing
31 Semi supervised Biased Maximum Margin Analysis For
Interactive Image Retrieval
Image Processing
32 Three-Dimensional Password For More Secure Authentication Image Processing
33 Optimal Stochastic Location Updates In Mobile Ad Hoc Networks Mobile Computing
34 Mabs: Multicast Authentication Based On Batch Signature Mobile Computing
35 Random Cast: An Energy Efficient Communication Scheme For
Mobile Ad Hoc Networks
Mobile Computing
36 Monitoring Service Systems From A Language-Action
Perspective
Service Computing
37 Online Intrusion Alert Aggregation With Generative Data Stream
Modeling
Service Computing
38 Dynamic Authentication For Cross-Realm SOA-Based Business
Processes
Service Computing
39 Identifying Content For Planned Events Across Social Media Sites Service Computing
40 Bridging Socially-Enhanced Virtual Communities Service Computing
41 Automated Certification For Compliant Cloud-Based Business
Processes
Data Mining
42 Slow Adaptive OFDMA Systems Through Chance Constrained
Programming
Signal Processing
43 Exploiting Dynamic Resource Allocation For Efficient Parallel
Data Processing In The Cloud
Parallel &
Distributed
44 Anonymous Query Processing In Road Network Parallel &
Distributed
45 Throughput Optimization In High Speed Downlink Packet Access
(HSDPA)
Wireless
Communications
46 Analysis of P2P File Sharing Network Wireless
Communications
47 Digital Image Watermarking Image Processing
48 Load-Balancing Multipath Switching System with Flow Slice Data Mining
49 Vulnerability Analysis in SOA-based Business Processes Data Mining
50 A Fast Clustering-Based Feature Subset
51 A Load Balancing Model Based on Cloud Partitioningfor the
Public Cloud