SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
*************************************************************




                                     CLOUD COMPUTING



1. Cloud Computing for Agent-Based Urban Transportation Systems

2. Secure and Practical Outsourcing of Linear Programming in Cloud
   Computing

3. Enabling Public Auditability and Data Dynamics for Storage Security in
   Cloud Computing
*************************************************************




                                             MOBILE COMPUTING



1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc
   Networks




                                              NETWORKING

1. ProgME: Towards Programmable Network Measurement

2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop
   Wireless Networks

3. Buffer Sizing for 802.11 Based Networks

4. Caching Strategies Based on Information Density

5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
*************************************************************

6. A Unified Approach to Optimizing Performance in Networks Serving
   Heterogeneous Flows

7. Denial of Service Attacks in Wireless Networks: The Case of Jammers




                                       SECURE COMPUTING

1. SAT: A Security Architecture Achieving Anonymity and Traceability in
   Wireless Mesh Networks

2. Nymble- Blocking Misbehaving Users in Anonymizing Networks

3. Modeling and Detection of Camouflaging Worm.

4. Online Intrusion Alert Aggregation with Generative Data Stream
   Modeling.

5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks.

6. Towards Situational Awareness of Large-Scale Botnet Probing Events

7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING
   AND SELECTIVE EMBEDDING

8. Competitive Study of Cryptography Techniques over Block Cipher.

9. Analysis on Credit Card Fraud Detection Methods.
*************************************************************




                                        IMAGE PROCESSING

1. Additive Distortion in Steganography Using Syndrome-Trellis Codes

2. Subspace-Based Striping Noise Reduction in Hyperspectral Images.

3. Sketch4Match – Content-based Image Retrieval System Using Sketches.

4. Embedded Extended Visual Cryptography Schemes




                          KNOWLEDGE AND DATA ENGINEERING

1. Extended XML Tree Pattern Matching: Theories and Algorithms.

2. Ranking Spatial Data by Quality Preferences

3. Discovering Conditional Functional Dependencies
*************************************************************

4. Effective Navigation of Query Results Based on Concept Hierarchies.

5. Clustering with Multi-Viewpoint based Similarity Measure.




                                        WEB SERIVCE

1. Ontology Based Business Process Customization for Composite Web
   Services
*************************************************************




                                     CLOUD COMPUTING

1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud
   Data.

2. Data integrity proofs in cloud storage.

3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data
   Processing in the Cloud.

4. Optimal service pricing for a cloud cache.
*************************************************************




                                              NETWORKING

1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System
   Lifetime of Query-Based Wireless Sensor Networks

2. Distributed Adaptation of Quantized Feedback for Downlink Network
   MIMO Systems

3. Network Coding Based Privacy Preservation against Traffic Analysis in
   Multi-hop Wireless Networks

4. Continuous Neighbor Discovery in Asynchronous Sensor Networks

5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using
   Portfolio Selection

6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop
   Wireless Networks

7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless
   Sensor Networks
*************************************************************




                                       SECURE COMPUTING

1. Integration of Sound Signature in Graphical Password Authentication
  System

2. The Geometric Efficient Matching Algorithm for Firewalls

3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones
   by Flow Watermarking.

4. NABS Novel Approaches for Biometric Systems

5. Improving Offline Handwritten Text Recognition with Hybrid
   HMM/ANN Models
*************************************************************




                                        IMAGE PROCESSING

1. Minimizing Additive Distortion in Steganography Using Syndrome-
   Trellis Codes

2. A User-Oriented Image Retrieval System Based on Interactive Genetic
   Algorithm

3. Blind Image Watermarking Using a Sample Projection Approach

4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process
   Experts

5. Adaptive Spectral Transform for Wavelet-Based Color Image
   Compression

6. Facial Expression Recognition Using Facial Movement Features

7. Histogram Specification: A fast and flexible Method to process digital
   images
*************************************************************




                          KNOWLEDGE AND DATA ENGINEERING

1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining
   Analysis.

2. Bridging Socially-Enhanced Virtual Communities.

3. DATA LEAGAGE DETECTION.

4. Personalized Ontology Model for Web Information Gathering.

5. Efficient Computation of Range Aggregates against uncertain location
   based queries.

6. Scalable Learning of Collective Behavior.

7. The World in a Nutshell Concise Range Queries.

8. The Awareness Network, To Whom Should I Display My Actions And,
   Whose Actions.

9. Publishing Search Logs – A Comparative Study of Privacy Guarantees.

10.     One Size Does Not Fit All Towards User- and Query-Dependent
   Ranking For Web Databases.

11.      Monitoring Service Systems from a Language-Action Perspective.
*************************************************************

12.     Improving Aggregate Recommendation Diversity Using Ranking-
   Based Techniques.

13.   Exploring Application-Level Semantics for Data Compression.

14.   A Web Search Engine-Based Approach to Measure Semantic Similarity
      between Words.




                                           WEB SERIVCE

1. Adaptive Provisioning of Human Expertise in Service-oriented Systems.

2. Vulnerability Analysis in SOA-based Business Processes.

3.    Detecting Kernel-Level Root kits Using Data Structure Invariants

Mais conteúdo relacionado

Mais procurados

Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects listMumbai Academisc
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Mumbai Academisc
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects listMumbai Academisc
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaperMumbai Academisc
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvrtechnologies Nellore
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEEGLOBALSOFTSTUDENTPROJECTS
 

Mais procurados (14)

2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
 
Java project 2013
Java project 2013Java project 2013
Java project 2013
 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Android titles
Android titlesAndroid titles
Android titles
 
Novel secure communication protocol basepaper
Novel secure communication protocol basepaperNovel secure communication protocol basepaper
Novel secure communication protocol basepaper
 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titles
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Top k-query-result-completeness-veri...
 

Destaque

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...JPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsJPINFOTECH JAYAPRAKASH
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...JPINFOTECH JAYAPRAKASH
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...JPINFOTECH JAYAPRAKASH
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationJPINFOTECH JAYAPRAKASH
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsJPINFOTECH JAYAPRAKASH
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...JPINFOTECH JAYAPRAKASH
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemJPINFOTECH JAYAPRAKASH
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesJPINFOTECH JAYAPRAKASH
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...JPINFOTECH JAYAPRAKASH
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...JPINFOTECH JAYAPRAKASH
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service compositionJPINFOTECH JAYAPRAKASH
 

Destaque (18)

Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...Secure encounter based mobile social networks requirements, designs, and trad...
Secure encounter based mobile social networks requirements, designs, and trad...
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighbors
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service composition
 

Semelhante a Bulk ieee projects

2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titlesMukundhan Elumalai
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titlesMukundhan Elumalai
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...S3 Infotech IEEE Projects
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- itElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- itElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetElakkiya Triplen
 

Semelhante a Bulk ieee projects (20)

Software project list
Software project listSoftware project list
Software project list
 
2013 2014 ieee projects titles
2013 2014 ieee projects titles2013 2014 ieee projects titles
2013 2014 ieee projects titles
 
2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles2013-2014 IEEE Projects titles
2013-2014 IEEE Projects titles
 
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
JAVA IEEE 2014 PROJECTS FOR ME/BE/B.TECH STUDENTS. FINAL YEAR 2014 PROJECTS F...
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech project titles for cse- it
Ieee 2016  m.e m.tech project titles for cse- itIeee 2016  m.e m.tech project titles for cse- it
Ieee 2016 m.e m.tech project titles for cse- it
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 
Ieee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnetIeee 2016 m.e m.tech titles for java and dotnet
Ieee 2016 m.e m.tech titles for java and dotnet
 

Último

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 

Último (20)

Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 

Bulk ieee projects

  • 1. ************************************************************* CLOUD COMPUTING 1. Cloud Computing for Agent-Based Urban Transportation Systems 2. Secure and Practical Outsourcing of Linear Programming in Cloud Computing 3. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
  • 2. ************************************************************* MOBILE COMPUTING 1. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks NETWORKING 1. ProgME: Towards Programmable Network Measurement 2. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks 3. Buffer Sizing for 802.11 Based Networks 4. Caching Strategies Based on Information Density 5. Optimal Bandwidth Assignment for Multiple-Description-Coded Video
  • 3. ************************************************************* 6. A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows 7. Denial of Service Attacks in Wireless Networks: The Case of Jammers SECURE COMPUTING 1. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks 2. Nymble- Blocking Misbehaving Users in Anonymizing Networks 3. Modeling and Detection of Camouflaging Worm. 4. Online Intrusion Alert Aggregation with Generative Data Stream Modeling. 5. Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks. 6. Towards Situational Awareness of Large-Scale Botnet Probing Events 7. ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING 8. Competitive Study of Cryptography Techniques over Block Cipher. 9. Analysis on Credit Card Fraud Detection Methods.
  • 4. ************************************************************* IMAGE PROCESSING 1. Additive Distortion in Steganography Using Syndrome-Trellis Codes 2. Subspace-Based Striping Noise Reduction in Hyperspectral Images. 3. Sketch4Match – Content-based Image Retrieval System Using Sketches. 4. Embedded Extended Visual Cryptography Schemes KNOWLEDGE AND DATA ENGINEERING 1. Extended XML Tree Pattern Matching: Theories and Algorithms. 2. Ranking Spatial Data by Quality Preferences 3. Discovering Conditional Functional Dependencies
  • 5. ************************************************************* 4. Effective Navigation of Query Results Based on Concept Hierarchies. 5. Clustering with Multi-Viewpoint based Similarity Measure. WEB SERIVCE 1. Ontology Based Business Process Customization for Composite Web Services
  • 6. ************************************************************* CLOUD COMPUTING 1. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. 2. Data integrity proofs in cloud storage. 3. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud. 4. Optimal service pricing for a cloud cache.
  • 7. ************************************************************* NETWORKING 1. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks 2. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems 3. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks 4. Continuous Neighbor Discovery in Asynchronous Sensor Networks 5. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection 6. On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks 7. A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks
  • 8. ************************************************************* SECURE COMPUTING 1. Integration of Sound Signature in Graphical Password Authentication System 2. The Geometric Efficient Matching Algorithm for Firewalls 3. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. 4. NABS Novel Approaches for Biometric Systems 5. Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models
  • 9. ************************************************************* IMAGE PROCESSING 1. Minimizing Additive Distortion in Steganography Using Syndrome- Trellis Codes 2. A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm 3. Blind Image Watermarking Using a Sample Projection Approach 4. Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts 5. Adaptive Spectral Transform for Wavelet-Based Color Image Compression 6. Facial Expression Recognition Using Facial Movement Features 7. Histogram Specification: A fast and flexible Method to process digital images
  • 10. ************************************************************* KNOWLEDGE AND DATA ENGINEERING 1. Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis. 2. Bridging Socially-Enhanced Virtual Communities. 3. DATA LEAGAGE DETECTION. 4. Personalized Ontology Model for Web Information Gathering. 5. Efficient Computation of Range Aggregates against uncertain location based queries. 6. Scalable Learning of Collective Behavior. 7. The World in a Nutshell Concise Range Queries. 8. The Awareness Network, To Whom Should I Display My Actions And, Whose Actions. 9. Publishing Search Logs – A Comparative Study of Privacy Guarantees. 10. One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases. 11. Monitoring Service Systems from a Language-Action Perspective.
  • 11. ************************************************************* 12. Improving Aggregate Recommendation Diversity Using Ranking- Based Techniques. 13. Exploring Application-Level Semantics for Data Compression. 14. A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. WEB SERIVCE 1. Adaptive Provisioning of Human Expertise in Service-oriented Systems. 2. Vulnerability Analysis in SOA-based Business Processes. 3. Detecting Kernel-Level Root kits Using Data Structure Invariants