Pondicherry
    Posted: 19 days ago by Institute / School / Tutor
    Shortlist

    IEEE Project for UG and PG Students

    Courses
    Software Training / Application Programming / Embedded Systems
    Locality
    Mudaliarpet
     
    Reply
     

    Description for "IEEE Project for UG and PG Students"

    IEEE Project for UG and PG Students:-

    Project List:-

    2014 – 2015 IEEE ANDROID PROJECT TITLES

    1) A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks
    2) Catch Me If You Can: Evaluating Android Anti-Malware against Transformation Attacks
    3) Collaborative Policy Administration
    4) Context-based Access Control Systems for Mobile Devices
    5) Context-driven, Prescription-Based Personal Activity Classification: Methodology, Architecture, and End-to-End Implementation
    6) Cooperative Positioning and Tracking in Disruption Tolerant Networks
    7) DELTA++: Reducing the Size of Android Application Updates
    8) Effective Risk Communication for Android Apps
    9) Face-to-Face Proximity Estimation Using Bluetooth on Smart phones
    10) Generating Summary Risk Scores for Mobile Applications
    11)GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications
    12) Hiding in the Mobile Crowd: Location Privacy through Collaboration
    13) How Long to Wait? Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing
    14) MOSES: Supporting and Enforcing Security Profiles on Smartphone's
    15) Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones
    16) The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data.

    2014 – 2015 IEEE JAVA PROJECT TITLES

    CLOUD COMPUTING

    1) A Hybrid Cloud Approach for Secure Authorized Reduplication
    2) A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
    3) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
    4) Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
    5) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
    6) Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
    7) Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
    8) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
    9) Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
    10) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
    11) Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    12) Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
    13) Towards Differential Query Services in Cost-Efficient Clouds.

    DATA MINING

    14) A Cocktail Approach for Travel Package Recommendation
    15) Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
    16) BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
    17) Data Mining with Big Data
    18) Dealing With Concept Drifts in Process Mining
    19) Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
    20) Efficient Prediction of Difficult Keyword Queries over Databases
    21) Facilitating Document Annotation Using Content and Querying Value
    22) Fast Nearest Neighbor Search with Keywords
    23) Keyword Query Routing
    24) Privacy-Preserving and Content-Protecting Location Based Queries
    25) Security Evaluation of Pattern Classifiers under Attack
    26) Supporting Privacy Protection in Personalized Web Search
    27) Towards Online Shortest Path Computation

    SECURE COMPUTING

    28) Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
    29) Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
    30) PROFILR: Toward Preserving Privacy and Functionality in Geo social Networks
    31) Top-k Query Result Completeness Verification in Tiered Sensor Networks

    NETWORKING
    32) Automatic Test Packet Generation
    33) Cost-Effective Resource Allocation of Overlay Routing Relay
    Nodes
    34) Boundary Cutting for Packet Classification
    35) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

    PARALLEL AND DISTRIBUTED SYSTEMS

    36) Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
    37) Exploiting Service Similarity for Privacy in Location-Based Search Queries
    38) LocaWard: A Security and Privacy Aware Location-Based Rewarding System
    39) On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
    40) RRE: A Game-Theoretic Intrusion Response and Recovery Engine
    41) Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
    42) SOS: A Distributed Mobile Q&A System Based on Social Networks
    43) The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation
    44) The Design and Evaluation of An Information Sharing System for Human Networks
    45) Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
    46) Secure Outsourced Attribute-based Signatures.

    MOBILE COMPUTING

    47) An Incentive Framework for Cellular Traffic Offloading
    48) Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
    49) Efficient Authentication for Mobile and Pervasive Computing
    50) Friendbook: A Semantic-based Friend Recommendation System for Social Networks
    51) Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices

    SERVICE COMPUTING (Web Service)
    52) Privacy-Enhanced Web Service Composition
    53) Web Service Recommendation via Exploiting Location and QoS Information


    2014 – 2015 IEEE DOT NET PROJECT TITLES

    CLOUD COMPUTING

    1) Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
    2) Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
    3) Consistency as a Service: Auditing Cloud Consistency
    4) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
    5) Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
    6) Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
    7) Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
    8) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
    9) Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
    10) Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
    11) Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.

    DATA MINING

    12) A Cocktail Approach for Travel Package Recommendation
    13) An Empirical Performance Evaluation of Relational Keyword Search Techniques
    14) LARS*: An Efficient and Scalable Location-Aware Recommender System
    15) Product Aspect Ranking and Its Applications
    16) Secure Mining of Association Rules in Horizontally Distributed Databases
    17) Supporting Privacy Protection in Personalized Web Search
    18) Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
    19) Typicality-Based Collaborative Filtering Recommendation

    SECURE COMPUTING
    20) Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems

    NETWORKING
    21) Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic
    22) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks.

    PARALLEL AND DISTRIBUTED SYSTEMS

    23) A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
    24) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
    25) An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
    26) Certificate less Remote Anonymous Authentication Schemes for Wireless Body Area Networks
    27) Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
    28) Multicast Capacity in MANET with Infrastructure Support
    29) Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
    30) Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing.

    MOBILE COMPUTING

    31) A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
    32) Autonomous Mobile Mesh Networks
    33) DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks
    34) Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
    35) Preserving Location Privacy in Geo social Applications

    PATTERN ANALYSIS & MACHINE INTELLIGENCE

    36) Web Image Re-Ranking Using Query-Specific Semantic Signatures
    IMAGE PROCESSING
    37) Click Prediction for Web Image Reran king Using Multimodal Sparse Coding
    38) Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation.

    More Details Contact:-

    CGATES
    169/C, Frist Floor
    Sundraraju Chettiayar Complex
    Mudaliarpet, Pondicherry-4
    Cell:- 9790582555.
    8825255525.

     

    FCCS Administration Tips and Tricks

    Hyperion Essbase Online Training And Real Time Job Support

    Hyperion Planning Online Training And Real Time Job Support

    Hyperion Financial Management Training And Real Time Support

    FDMEE Online Training And Real Time Placement Assistance

    DRM Training And Real Time Placement Assistance Job Support

    Hyperion Infrastructure Administrator Training And Real Time

    OBIEE Online Training And Real Time Placement Assistance

    Oracle ODI Online Training And Real Time PlacementAssistance

    Hyperion Financial Close Management Training And Real Time