SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
*************************************************************




                                     CLOUD COMPUTING



1. Cloud Computing for Agent-Based Urban Transportation Systems

2. Secure and Practical Outsourcing of Linear Programming in Cloud
   Computing

3. Enabling Public Auditability and Data Dynamics for Storage Security in
   Cloud Computing
*************************************************************




                                             MOBILE COMPUTING



1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc
   Networks




                                              NETWORKING

1. ProgME: Towards Programmable Network Measurement

2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop
   Wireless Networks

3. Buffer Sizing for 802.11 Based Networks

4. Caching Strategies Based on Information Density

5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
*************************************************************

6. A Unified Approach to Optimizing Performance in Networks Serving
   Heterogeneous Flows

7. Denial of Service Attacks in Wireless Networks: The Case of Jammers




                                       SECURE COMPUTING

1. SAT: A Security Architecture Achieving Anonymity and Traceability in
   Wireless Mesh Networks

2. Nymble- Blocking Misbehaving Users in Anonymizing Networks

3. Modeling and Detection of Camouflaging Worm.

4. Online Intrusion Alert Aggregation with Generative Data Stream
   Modeling.

5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks.

6. Towards Situational Awareness of Large-Scale Botnet Probing Events

7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING
   AND SELECTIVE EMBEDDING

8. Competitive Study of Cryptography Techniques over Block Cipher.

9. Analysis on Credit Card Fraud Detection Methods.
*************************************************************




                                        IMAGE PROCESSING

1. Additive Distortion in Steganography Using Syndrome-Trellis Codes

2. Subspace-Based Striping Noise Reduction in Hyperspectral Images.

3. Sketch4Match – Content-based Image Retrieval System Using Sketches.

4. Embedded Extended Visual Cryptography Schemes




                          KNOWLEDGE AND DATA ENGINEERING

1. Extended XML Tree Pattern Matching: Theories and Algorithms.

2. Ranking Spatial Data by Quality Preferences

3. Discovering Conditional Functional Dependencies
*************************************************************

4. Effective Navigation of Query Results Based on Concept Hierarchies.

5. Clustering with Multi-Viewpoint based Similarity Measure.




                                        WEB SERIVCE

1. Ontology Based Business Process Customization for Composite Web
   Services
*************************************************************




                                     CLOUD COMPUTING

1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud
   Data.

2. Data integrity proofs in cloud storage.

3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data
   Processing in the Cloud.

4. Optimal service pricing for a cloud cache.
*************************************************************




                                              NETWORKING

1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System
   Lifetime of Query-Based Wireless Sensor Networks

2. Distributed Adaptation of Quantized Feedback for Downlink Network
   MIMO Systems

3. Network Coding Based Privacy Preservation against Traffic Analysis in
   Multi-hop Wireless Networks

4. Continuous Neighbor Discovery in Asynchronous Sensor Networks

5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using
   Portfolio Selection

6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop
   Wireless Networks

7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless
   Sensor Networks
*************************************************************




                                       SECURE COMPUTING

1. Integration of Sound Signature in Graphical Password Authentication
  System

2. The Geometric Efficient Matching Algorithm for Firewalls

3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones
   by Flow Watermarking.

4. NABS Novel Approaches for Biometric Systems

5. Improving Offline Handwritten Text Recognition with Hybrid
   HMM/ANN Models
*************************************************************




                                        IMAGE PROCESSING

1. Minimizing Additive Distortion in Steganography Using Syndrome-
   Trellis Codes

2. A User-Oriented Image Retrieval System Based on Interactive Genetic
   Algorithm

3. Blind Image Watermarking Using a Sample Projection Approach

4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process
   Experts

5. Adaptive Spectral Transform for Wavelet-Based Color Image
   Compression

6. Facial Expression Recognition Using Facial Movement Features

7. Histogram Specification: A fast and flexible Method to process digital
   images
*************************************************************




                          KNOWLEDGE AND DATA ENGINEERING

1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining
   Analysis.

2. Bridging Socially-Enhanced Virtual Communities.

3. DATA LEAGAGE DETECTION.

4. Personalized Ontology Model for Web Information Gathering.

5. Efficient Computation of Range Aggregates against uncertain location
   based queries.

6. Scalable Learning of Collective Behavior.

7. The World in a Nutshell Concise Range Queries.

8. The Awareness Network, To Whom Should I Display My Actions And,
   Whose Actions.

9. Publishing Search Logs – A Comparative Study of Privacy Guarantees.

10.     One Size Does Not Fit All Towards User- and Query-Dependent
   Ranking For Web Databases.

11.      Monitoring Service Systems from a Language-Action Perspective.
*************************************************************

12.     Improving Aggregate Recommendation Diversity Using Ranking-
   Based Techniques.

13.   Exploring Application-Level Semantics for Data Compression.

14.   A Web Search Engine-Based Approach to Measure Semantic Similarity
      between Words.




                                           WEB SERIVCE

1. Adaptive Provisioning of Human Expertise in Service-oriented Systems.

2. Vulnerability Analysis in SOA-based Business Processes.

3.    Detecting Kernel-Level Root kits Using Data Structure Invariants

Weitere ähnliche Inhalte

Was ist angesagt?

Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Mumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects listMumbai Academisc
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvrtechnologies Nellore
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEEGLOBALSOFTSTUDENTPROJECTS
 

Was ist angesagt? (14)

2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Android titles
Android titlesAndroid titles
Android titles
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titles
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
 

Andere mochten auch

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...JPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsJPINFOTECH JAYAPRAKASH
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...JPINFOTECH JAYAPRAKASH
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...JPINFOTECH JAYAPRAKASH
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationJPINFOTECH JAYAPRAKASH
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsJPINFOTECH JAYAPRAKASH
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...JPINFOTECH JAYAPRAKASH
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemJPINFOTECH JAYAPRAKASH
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesJPINFOTECH JAYAPRAKASH
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...JPINFOTECH JAYAPRAKASH
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...JPINFOTECH JAYAPRAKASH
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service compositionJPINFOTECH JAYAPRAKASH
 

Andere mochten auch (18)

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighbors
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service composition
 

Ähnlich wie Bulk ieee projects

2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titlesMukundhan Elumalai
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titlesMukundhan Elumalai
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- itElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- itElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 

Ähnlich wie Bulk ieee projects (20)

Software project list
Software project listSoftware project list
Software project list
 
2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titles
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 

Kürzlich hochgeladen

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Kürzlich hochgeladen (20)

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 

Bulk ieee projects

  • 1. ************************************************************* CLOUD COMPUTING 1. Cloud Computing for Agent-Based Urban Transportation Systems 2. Secure and Practical Outsourcing of Linear Programming in Cloud Computing 3. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  • 2. ************************************************************* MOBILE COMPUTING 1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks NETWORKING 1. ProgME: Towards Programmable Network Measurement 2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks 3. Buffer Sizing for 802.11 Based Networks 4. Caching Strategies Based on Information Density 5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
  • 3. ************************************************************* 6. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows 7. Denial of Service Attacks in Wireless Networks: The Case of Jammers SECURE COMPUTING 1. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks 2. Nymble- Blocking Misbehaving Users in Anonymizing Networks 3. Modeling and Detection of Camouflaging Worm. 4. Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks. 6. Towards Situational Awareness of Large-Scale Botnet Probing Events 7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING 8. Competitive Study of Cryptography Techniques over Block Cipher. 9. Analysis on Credit Card Fraud Detection Methods.
  • 4. ************************************************************* IMAGE PROCESSING 1. Additive Distortion in Steganography Using Syndrome-Trellis Codes 2. Subspace-Based Striping Noise Reduction in Hyperspectral Images. 3. Sketch4Match – Content-based Image Retrieval System Using Sketches. 4. Embedded Extended Visual Cryptography Schemes KNOWLEDGE AND DATA ENGINEERING 1. Extended XML Tree Pattern Matching: Theories and Algorithms. 2. Ranking Spatial Data by Quality Preferences 3. Discovering Conditional Functional Dependencies
  • 5. ************************************************************* 4. Effective Navigation of Query Results Based on Concept Hierarchies. 5. Clustering with Multi-Viewpoint based Similarity Measure. WEB SERIVCE 1. Ontology Based Business Process Customization for Composite Web Services
  • 6. ************************************************************* CLOUD COMPUTING 1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. 2. Data integrity proofs in cloud storage. 3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. 4. Optimal service pricing for a cloud cache.
  • 7. ************************************************************* NETWORKING 1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks 2. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems 3. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks 4. Continuous Neighbor Discovery in Asynchronous Sensor Networks 5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection 6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks 7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
  • 8. ************************************************************* SECURE COMPUTING 1. Integration of Sound Signature in Graphical Password Authentication System 2. The Geometric Efficient Matching Algorithm for Firewalls 3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. 4. NABS Novel Approaches for Biometric Systems 5. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models
  • 9. ************************************************************* IMAGE PROCESSING 1. Minimizing Additive Distortion in Steganography Using Syndrome- Trellis Codes 2. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm 3. Blind Image Watermarking Using a Sample Projection Approach 4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts 5. Adaptive Spectral Transform for Wavelet-Based Color Image Compression 6. Facial Expression Recognition Using Facial Movement Features 7. Histogram Specification: A fast and flexible Method to process digital images
  • 10. ************************************************************* KNOWLEDGE AND DATA ENGINEERING 1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis. 2. Bridging Socially-Enhanced Virtual Communities. 3. DATA LEAGAGE DETECTION. 4. Personalized Ontology Model for Web Information Gathering. 5. Efficient Computation of Range Aggregates against uncertain location based queries. 6. Scalable Learning of Collective Behavior. 7. The World in a Nutshell Concise Range Queries. 8. The Awareness Network, To Whom Should I Display My Actions And, Whose Actions. 9. Publishing Search Logs – A Comparative Study of Privacy Guarantees. 10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases. 11. Monitoring Service Systems from a Language-Action Perspective.
  • 11. ************************************************************* 12. Improving Aggregate Recommendation Diversity Using Ranking- Based Techniques. 13. Exploring Application-Level Semantics for Data Compression. 14. A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. WEB SERIVCE 1. Adaptive Provisioning of Human Expertise in Service-oriented Systems. 2. Vulnerability Analysis in SOA-based Business Processes. 3. Detecting Kernel-Level Root kits Using Data Structure Invariants