SlideShare ist ein Scribd-Unternehmen logo
1 von 7
IEEE Projects Final List
No Project Name Domain
1 Jamming-Aware Traffic Allocation For Multiple-Path Routing
Using Portfolio Selection
Networking
2 A New Cell-Counting-Based Attack Against Tor Networking
3 Cooperative Download In Vehicular Environments Networking
4 Data Delivery Properties Of Human Contact Networks Networking
5 Self-Reconfigurable Wireless Mesh Networks Networking
6 Reliability In Layered Networks With Random Link Failures Networking
7 Load-Balancing Multipath Switching System with Flow Slice Networking
8 Achieving Secure, Scalable, And Fine-Grained Data Access
Control In Cloud Computing
Cloud Computing
9 Privacy-Preserving Public Auditing For Data Storage Security In
Cloud Computing
Cloud Computing
10 Fuzzy Keyword Search Over Encrypted Data In Cloud Computing Cloud Computing
11 Cloud Computing Security: From Single To Multi-Clouds Cloud Computing
12 Automatic protocol blocker for privacy preserving public auditing
in cloud computing
Cloud Computing
13 Dynamic Audit Services for Integrity Verification of Outsourced
Storages in Clouds
Cloud Computing
14 Scalable and Secure Sharing of Personal Health Records in Cloud
Computing using Attribute-based Encryption
Cloud Computing
15 Publishing Search Logs – A Comparative Study Of Privacy
Guarantees
Data Engineering
16 Horizontal Aggregations In SQL To Prepare Data Sets For Data
Mining Analysis
Data Engineering
17 Closing The Loop In Webpage Understanding Data Engineering
18 Automatic Discovery Of Personal Name Aliases From The Web Data Engineering
19 A Personalized Ontology Model For Web Information Gathering Data Engineering
20 Scalable And Secure Sharing Of Personal Health Records In Cloud
Computing Using Attribute-Based Encryption
Data Engineering
21 Efficient Computation of Range Aggregates against Uncertain
Location Based Queries
Data Engineering
22 Hiding Sensitive Association Rule For Privacy Preservation Security
23 Authentication Schemes For Session Passwords Using Color And
Images
Security
24 Separable Reversible Data Hiding In Encrypted Image Security
25 Implicit Password Authentication System Security
26 Data Hiding In Motion Vectors Of Compressed Video Based On
Their Associated Prediction Error
Security
27 Defenses Against Large Scale Online Password Guessing Attacks
By Using Persuasive Click Points
Security
28 A Probabilistic Model Of (T, N) Visual Cryptography Scheme
With Dynamic Group
Security
29 Robust Correlation Of Encrypted Attack Traffic Through Stepping
Stones By Flow Watermarking
Image Processing
30 On the Selection of Optimal Feature Region Set for Robust Digital
Image Watermarking
Image Processing
31 Semi supervised Biased Maximum Margin Analysis For
Interactive Image Retrieval
Image Processing
32 Three-Dimensional Password For More Secure Authentication Image Processing
33 Optimal Stochastic Location Updates In Mobile Ad Hoc Networks Mobile Computing
34 Mabs: Multicast Authentication Based On Batch Signature Mobile Computing
35 Random Cast: An Energy Efficient Communication Scheme For
Mobile Ad Hoc Networks
Mobile Computing
36 Monitoring Service Systems From A Language-Action
Perspective
Service Computing
37 Online Intrusion Alert Aggregation With Generative Data Stream
Modeling
Service Computing
38 Dynamic Authentication For Cross-Realm SOA-Based Business
Processes
Service Computing
39 Identifying Content For Planned Events Across Social Media Sites Service Computing
40 Bridging Socially-Enhanced Virtual Communities Service Computing
41 Automated Certification For Compliant Cloud-Based Business
Processes
Data Mining
42 Slow Adaptive OFDMA Systems Through Chance Constrained
Programming
Signal Processing
43 Exploiting Dynamic Resource Allocation For Efficient Parallel
Data Processing In The Cloud
Parallel &
Distributed
44 Anonymous Query Processing In Road Network Parallel &
Distributed
45 Throughput Optimization In High Speed Downlink Packet Access
(HSDPA)
Wireless
Communications
46 Analysis of P2P File Sharing Network Wireless
Communications
47 Digital Image Watermarking Image Processing
48 Load-Balancing Multipath Switching System with Flow Slice Data Mining
49 Vulnerability Analysis in SOA-based Business Processes Data Mining
50 A Fast Clustering-Based Feature Subset
51 A Load Balancing Model Based on Cloud Partitioningfor the
Public Cloud
Global tech project list
Global tech project list

Weitere ähnliche Inhalte

Was ist angesagt?

3i techso project title
3i techso project title3i techso project title
3i techso project title3itechso
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvrtechnologies Nellore
 
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsCloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsElakkiya Triplen
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nelloreGreen Corner Tech,Nellore
 
2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud Computing2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud ComputingManju Nath
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
 
Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titlesGeneric Technology
 

Was ist angesagt? (13)

2015 ieee projects in bangalore
2015 ieee projects in bangalore2015 ieee projects in bangalore
2015 ieee projects in bangalore
 
3i techso project title
3i techso project title3i techso project title
3i techso project title
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titles
 
Java titles 2017 2018
Java titles 2017 2018Java titles 2017 2018
Java titles 2017 2018
 
Cloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutionsCloud computing titles list dream web techno solutions
Cloud computing titles list dream web techno solutions
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellore
 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
 
2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud Computing2015 and 2016 IEEE Projects for Cloud Computing
2015 and 2016 IEEE Projects for Cloud Computing
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Generic technology ieee projects titles
Generic technology ieee projects titlesGeneric technology ieee projects titles
Generic technology ieee projects titles
 
CSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.NelloreCSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.Nellore
 

Ähnlich wie Global tech project list

Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects listMumbai Academisc
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaAdz91 Digital Ads Pvt Ltd
 
JavaProjectlist2023-Nexgen Technology
JavaProjectlist2023-Nexgen TechnologyJavaProjectlist2023-Nexgen Technology
JavaProjectlist2023-Nexgen TechnologyArudhra Innovations
 
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...Green Corner Tech,Nellore
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryLeMeniz Infotech
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsLeMeniz Infotech
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryLeMeniz Infotech
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 Ganesh Ganesan
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Nexgen Technology
 

Ähnlich wie Global tech project list (20)

Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS DiplomaIEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
 
JavaProjectlist2023-Nexgen Technology
JavaProjectlist2023-Nexgen TechnologyJavaProjectlist2023-Nexgen Technology
JavaProjectlist2023-Nexgen Technology
 
E2matrix
E2matrixE2matrix
E2matrix
 
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
 
2014 list
2014 list2014 list
2014 list
 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
Bulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherryBulk ieee projects | bulk ieee projects in pondicherry
Bulk ieee projects | bulk ieee projects in pondicherry
 
Online ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projectsOnline ieee projects | 2015 online ieee projects
Online ieee projects | 2015 online ieee projects
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
 
Java 2015
Java 2015Java 2015
Java 2015
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 

Kürzlich hochgeladen

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 

Kürzlich hochgeladen (20)

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

Global tech project list

  • 1. IEEE Projects Final List No Project Name Domain 1 Jamming-Aware Traffic Allocation For Multiple-Path Routing Using Portfolio Selection Networking 2 A New Cell-Counting-Based Attack Against Tor Networking 3 Cooperative Download In Vehicular Environments Networking 4 Data Delivery Properties Of Human Contact Networks Networking 5 Self-Reconfigurable Wireless Mesh Networks Networking 6 Reliability In Layered Networks With Random Link Failures Networking 7 Load-Balancing Multipath Switching System with Flow Slice Networking 8 Achieving Secure, Scalable, And Fine-Grained Data Access Control In Cloud Computing Cloud Computing 9 Privacy-Preserving Public Auditing For Data Storage Security In Cloud Computing Cloud Computing 10 Fuzzy Keyword Search Over Encrypted Data In Cloud Computing Cloud Computing 11 Cloud Computing Security: From Single To Multi-Clouds Cloud Computing 12 Automatic protocol blocker for privacy preserving public auditing in cloud computing Cloud Computing 13 Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds Cloud Computing 14 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Cloud Computing 15 Publishing Search Logs – A Comparative Study Of Privacy Guarantees Data Engineering 16 Horizontal Aggregations In SQL To Prepare Data Sets For Data Mining Analysis Data Engineering
  • 2. 17 Closing The Loop In Webpage Understanding Data Engineering 18 Automatic Discovery Of Personal Name Aliases From The Web Data Engineering 19 A Personalized Ontology Model For Web Information Gathering Data Engineering 20 Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute-Based Encryption Data Engineering 21 Efficient Computation of Range Aggregates against Uncertain Location Based Queries Data Engineering 22 Hiding Sensitive Association Rule For Privacy Preservation Security 23 Authentication Schemes For Session Passwords Using Color And Images Security 24 Separable Reversible Data Hiding In Encrypted Image Security 25 Implicit Password Authentication System Security 26 Data Hiding In Motion Vectors Of Compressed Video Based On Their Associated Prediction Error Security 27 Defenses Against Large Scale Online Password Guessing Attacks By Using Persuasive Click Points Security 28 A Probabilistic Model Of (T, N) Visual Cryptography Scheme With Dynamic Group Security
  • 3.
  • 4.
  • 5. 29 Robust Correlation Of Encrypted Attack Traffic Through Stepping Stones By Flow Watermarking Image Processing 30 On the Selection of Optimal Feature Region Set for Robust Digital Image Watermarking Image Processing 31 Semi supervised Biased Maximum Margin Analysis For Interactive Image Retrieval Image Processing 32 Three-Dimensional Password For More Secure Authentication Image Processing 33 Optimal Stochastic Location Updates In Mobile Ad Hoc Networks Mobile Computing 34 Mabs: Multicast Authentication Based On Batch Signature Mobile Computing 35 Random Cast: An Energy Efficient Communication Scheme For Mobile Ad Hoc Networks Mobile Computing 36 Monitoring Service Systems From A Language-Action Perspective Service Computing 37 Online Intrusion Alert Aggregation With Generative Data Stream Modeling Service Computing 38 Dynamic Authentication For Cross-Realm SOA-Based Business Processes Service Computing 39 Identifying Content For Planned Events Across Social Media Sites Service Computing 40 Bridging Socially-Enhanced Virtual Communities Service Computing 41 Automated Certification For Compliant Cloud-Based Business Processes Data Mining 42 Slow Adaptive OFDMA Systems Through Chance Constrained Programming Signal Processing 43 Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud Parallel & Distributed 44 Anonymous Query Processing In Road Network Parallel & Distributed 45 Throughput Optimization In High Speed Downlink Packet Access (HSDPA) Wireless Communications 46 Analysis of P2P File Sharing Network Wireless Communications 47 Digital Image Watermarking Image Processing 48 Load-Balancing Multipath Switching System with Flow Slice Data Mining 49 Vulnerability Analysis in SOA-based Business Processes Data Mining 50 A Fast Clustering-Based Feature Subset 51 A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud