SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
2013 and 2014 Completed IEEE Projects List
Contact : K.Manjunath - 09535866270
Sl.No Project Title Year
Cloud Computing
1 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013
2 A Privacy Leakage Upper Bound constraint Based Approach for Cost Effective 2013
3 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 2013
4 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 2013
5 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 2013
6 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
7 NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
8 On the Optimal Allocation of Virtual Resources in Cloud Computing Networks 2013
9 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 2013
10 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 2013
11 Privacy Preserving Delegated Access Control in Public Clouds 2013
12 Privacy Preserving Public Auditing for Secure Cloud Storage 2013
13 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud
Computing Systems
2013
14 Toward Secure Multi keyword Top-k Retrieval Over Encrypted Cloud 2013
15 Towards Differential Query Services in Cost Efficient Cloud 2013
16 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing
Systems
2013
17 Dynamic Audit Services for Outsourced Storages in Clouds 2013
18 Collaboration in Multi cloud Environments Framework and Security Issues 2013
19 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based
Encryption
2013
20 QoS Ranking Prediction for Cloud Services 2013
21 Load Rebalancing for Distributed File Systems in Clouds 2013
22 A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms 2013
23 SeDas A Self Destructing Data System Based on Active Storage Framework 2013
24 Winds of Change from Vendor Lock In to the Meta Cloud 2013
25 On Data Staging Algorithms for Shared Data Accesses in Clouds 2013
26 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 2013
27 Optimal Multi Server Configuration for Profit Maximization in Cloud Computing 2013
28 TST Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud
Computing
2013
29 Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and
Analysis
2013
30 Secure Logging as a Service—Delegating Log Management to the Cloud 2013
31 Fault Tolerance Management in Cloud Computing: A System-Level Perspective 2013
32 Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing 2012
33 Cloud Computing Security From Single to Multi-Clouds 2012
34 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage 2012
35 Efficient audit service outsourcing for data integrity in clouds 2012
36 Enabling Secure and Efficient Ranked Keyword Search Over Out Sourced Cloud Data 2012
37 Ensuring Distributed Accountability for Data Sharing in the Cloud 2012
38 IDSaaS Intrusion Detection System as a Service in Public Clouds 2012
39 Privacy Preserving Public Auditing for Secure Cloud Storage 2012
40 Towards Secure and Dependable Cloud Storage Server 2012
41 Secure Overlay Cloud Storage with Access Control and Assured Deletion 2012
42 A Refined RBAC Model for Cloud Computing 2012
43 Cloud Computing Services A Total Cost of Ownership Approach 2012
44 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in
Cloud Computing
2012
45 Secure and Erasure Coding Based cloud storage system with Secure Data Forwarding 2012
Network Security
1 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013
2 EAACK—A Secure Intrusion-Detection System for MANETs 2013
3 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 2013
4 Modeling the Pair wise Key Pre distribution Scheme in the Presence of Unreliable Links 2013
5 Vampire Attacks Draining life from wireless ad-hoc sensor networks 2013
6 EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 2013
7 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013
8 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013
9 Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks 2013
10 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013
11 Identity-Based Secure Distributed Data Storage Schemes 2013
12 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
13 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013
14 SORT A Self-Organizing Trust Model for Peer-to-Peer Systems 2013
15 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless
Sensor Networks.
2013
16 Distance Bounding: A Practical Security Solution for Real-Time Location Systems 2013
17 Minimum Cost Blocking Problem in Multi path Wireless Routing Protocols 2013
18 A Rank Correlation Based Detection against Distributed Reflection DOS Attacks 2013
19 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc networks 2012
20 An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks 2012
21 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012
22 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 2012
23 Detecting and Resolving Firewall Policy Anomalies 2012
24 Performance of PCN-Based Admission Control Under Challenging Conditions 2012
25 Load-Balancing Multipath Switching System with Flow Slice 2012
26 A Framework for Routing Performance Analysis in delay tolerant Networks 2012
27 Revisiting Defenses Against Large-Scale Online Password Guessing Attacks 2012
28 Secure High Throughput Multicast Routing in Wireless Mesh Networks 2012
29 Online Intrusion Alert Aggregation with Generative Data Stream Modeling 2012
30 ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2013
Adhoc Networks & Mobile Computing & VANET & MANET
1 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc
Networks(MANET)
2013
2 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks (MANET) 2013
3 Efficient Algorithms for Neighbor Discovery in Wireless Networks (Adhoc) 2013
4 Multicast Capacity in MANET with Infrastructure(MANET) 2013
5 Optimal Multicast capacity and delay tradeoff in Manet (MANET) 2013
6 Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets (Adhoc) 2013
7 Performance Modeling of Safety Messages Broadcast in Vehicular Ad Hoc Networks (VANET) 2013
8 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation (Adhoc) 2013
9 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile
Ad Hoc Networks (MANET)
2013
10 Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks (VANET) 2013
11 A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks (VANET) 2013
12 Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
(Mobile Computing)
2013
13 Network Assisted Mobile Computing with Optimal Uplink Query Processing (Mobile Computing) 2013
14 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc networks 2013
15 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013
16 Efficient Rekeying Framework for Secure Multicast with Diverse Subscription Period Mobile Users 2013
17 Risk Aware mitigation of MANET Attacks 2013
18 Balancing the Tradeoffs between Query Delay and Data Availability in MANETs 2012
19 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks 2012
20 TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks 2012
21 Throughput and Energy Efficiency in wireless ad hoc network with caussian channels 2012
Sensor Networks
1 Secure and Efficient Data Transmission for Cluster based WSN 2013
2 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013
3 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
2013
4 Mobile Relay Configuration in Data Intensive Wireless Sensor Network 2013
5 Localization in Wireless Sensor Networks Byzantines and Mitigation Techniques 2013
6 Harvesting Aware Energy Management for Time Critical WSN with Joint Voltage 2013
7 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 2013
8 Adaptive Network Coding for Broadband Wireless Access Networks 2013
9 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless
Sensor Networks.
2013
10 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 2013
11 Participatory Privacy: Enabling Privacy in Participatory Sensing 2013
12 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2013
13 Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs 2012
14 Fast Data Collection in Tree-Based Wireless Sensor Networks 2012
15 BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False
Data in WSN
2012
16 Cut Detection in Wireless Sensor Network 2012
17 Protecting Location Privacy in Sensor Networks against Global Eavesdropper 2012
18 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2012
19 Energy Efficient Routing Mechanism in Wireless Sensor Network 2012
20 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012
21 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2012
Android Projects
1 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
2013
2 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013
3 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013
4 Cloud MoV Cloud-based Mobile Social TV 2013
5 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
Sharing in the Clouds
2013
6 Android College Campus 2013
7 Nautical Telemetrically System 2013
8 Collaborative Learning Assistant for Android 2013
9 Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud 2013
10 Spatial Query Integrity with Voronoi Neighbors 2013
11 Dynamic Personalized Recommendation on Sparse Data 2013
Data Mining
1 m-Privacy for Collaborative Data Publishing 2013
2 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2013
3 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2013
4 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 2013
5 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 2013
6 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 2013
7 Privacy-Enhanced Web Service Composition 2013
8 System to Filter Unwanted Messages from OSN User Walls 2013
9 Incentive Compatible Privacy-Preserving Data Analysis 2013
10 Facilitating Effective User Navigation through Website Structure Improvement 2013
11 Optimal Route Queries with Arbitrary Order Constraints 2013
12 Fast Nearest Neighbor Search with Keywords
13 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 2013
14 Acceleration of XML Parsing through Prefetching 2013
15 Automatic Discovery of Association Orders between Name and Aliases from the Web 2012
16 Slicing A New Approach to Privacy Preserving Data Publishing 2012
17 Ranking Model Adaptation for Domain-Specific Search 2012
18 Improving aggregate recommendation diversity using ranking-based techniques 2012
19 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 2012
20 Dynamic Personalized Recommendation on Sparse Data 2013
21 Trust Modeling in Social Tagging of Multimedia Content 2012
22 MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND
MECHANISMS
2013
Wireless Communication
1 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2013
2 Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive
Networks
2013
3 IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual
Environments
2013
4 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 2012
5 Topology Control in Mobile Adhoc Networks with Cooperative Communications 2012
6 Local Greedy Approximation for Scheduling in Multi-hop Wireless Networks 2012
Image Processing and Multimedia
1 3D Face Recognition Under Expressions, Occlusions and Pose Variations 2013
2 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features 2013
3 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013
4 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. 2013
5 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 2013
6 An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 2013
7 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless
Networks
2013
8 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 2012
J2ME Mobile Based Projects
1 Adaptation of a virtual campus for mobile learning devices 2013
2 Bluetooth Mobile Based College Campus 2013
3 ECops via Handheld Mobile Devices 2013
4 Privacy-Conscious Location-Based Queries in Mobile Environments 2013
5 Ranking Model Adaptation for Domain-Specific Search 2013
6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-
Healthcare Emergency
2013
7 The Word in a nut shell : CONCISE RANGE QUERIES 2013

Mais conteúdo relacionado

Mais procurados

Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14projectsepark
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennaincct
 
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...Green Corner Tech,Nellore
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17praba123456
 
Pantech ns2 projects 2016-17
Pantech   ns2 projects 2016-17Pantech   ns2 projects 2016-17
Pantech ns2 projects 2016-17Java Team
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17Java Team
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects MSR PROJECTS
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project listMSR PROJECTS
 
An Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNAn Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNIJMTST Journal
 

Mais procurados (10)

Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYBEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai4   Sw   2009 Ieee Abstracts   Dot Net, Ncct Chennai
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
 
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17
 
Pantech ns2 projects 2016-17
Pantech   ns2 projects 2016-17Pantech   ns2 projects 2016-17
Pantech ns2 projects 2016-17
 
Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project list
 
An Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSNAn Encrypted MAC for the Authentication Process in WSN
An Encrypted MAC for the Authentication Process in WSN
 

Semelhante a 2013-2014 IEEE Project Lists Cloud Computing Network Security

2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
2014 and 2015 BE Projects @ Bangalore,Rajaji NagarManju Nath
 
Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects Tmks Infotech
 
2014 and 2015 ieee projects for MTech
2014 and 2015 ieee  projects for MTech2014 and 2015 ieee  projects for MTech
2014 and 2015 ieee projects for MTechTmks Infotech
 
2014 and 2015 ieee projects for cse
2014 and 2015 ieee  projects for cse2014 and 2015 ieee  projects for cse
2014 and 2015 ieee projects for cseTmks Infotech
 
2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BETmks Infotech
 
2014 and 2015 ieee projects for CNE
2014 and 2015 ieee  projects for CNE2014 and 2015 ieee  projects for CNE
2014 and 2015 ieee projects for CNETmks Infotech
 
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechBulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechTmks Infotech
 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennaiAishwarya Rajesh
 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennaiAishwarya Rajesh
 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennaiAishwarya Rajesh
 
java project centre in chennai
java project centre in chennaijava project centre in chennai
java project centre in chennaiAishwarya Rajesh
 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014Aishwarya Rajesh
 
cse project centre in chennai
cse project centre in chennai cse project centre in chennai
cse project centre in chennai Aishwarya Rajesh
 
best ieee project centre in chennai
best ieee project centre in chennaibest ieee project centre in chennai
best ieee project centre in chennaiAishwarya Rajesh
 
ece project centre in chennai titles 2014
ece project centre in chennai titles 2014ece project centre in chennai titles 2014
ece project centre in chennai titles 2014Aishwarya Rajesh
 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennaiAishwarya Rajesh
 
final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013JPINFOTECH JAYAPRAKASH
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
 

Semelhante a 2013-2014 IEEE Project Lists Cloud Computing Network Security (20)

2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
 
Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects Final Year 2014 and 2015 IEEE projects
Final Year 2014 and 2015 IEEE projects
 
2014 and 2015 ieee projects for MTech
2014 and 2015 ieee  projects for MTech2014 and 2015 ieee  projects for MTech
2014 and 2015 ieee projects for MTech
 
2014 and 2015 ieee projects for cse
2014 and 2015 ieee  projects for cse2014 and 2015 ieee  projects for cse
2014 and 2015 ieee projects for cse
 
2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE2014 and 2015 ieee projects for BE
2014 and 2015 ieee projects for BE
 
2014 and 2015 ieee projects for CNE
2014 and 2015 ieee  projects for CNE2014 and 2015 ieee  projects for CNE
2014 and 2015 ieee projects for CNE
 
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechBulk 2014 and 2015 ieee Projects @ TMKS Infotech
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennai
 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennai
 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennai
 
java project centre in chennai
java project centre in chennaijava project centre in chennai
java project centre in chennai
 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014
 
cse project centre in chennai
cse project centre in chennai cse project centre in chennai
cse project centre in chennai
 
best ieee project centre in chennai
best ieee project centre in chennaibest ieee project centre in chennai
best ieee project centre in chennai
 
ece project centre in chennai titles 2014
ece project centre in chennai titles 2014ece project centre in chennai titles 2014
ece project centre in chennai titles 2014
 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennai
 
final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013final year ieee projects in pondicherry 2013
final year ieee projects in pondicherry 2013
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
 

Mais de Manju Nath

2017 and 2018 Dependable Computing
2017 and 2018 Dependable Computing2017 and 2018 Dependable Computing
2017 and 2018 Dependable ComputingManju Nath
 
2017 and 2018 Service Computing
2017 and 2018 Service Computing2017 and 2018 Service Computing
2017 and 2018 Service ComputingManju Nath
 
2017 and 2018 Networking and Service Computing
2017 and 2018 Networking and Service Computing2017 and 2018 Networking and Service Computing
2017 and 2018 Networking and Service ComputingManju Nath
 
2017 and 2018 Networking
2017 and 2018 Networking2017 and 2018 Networking
2017 and 2018 NetworkingManju Nath
 
2017 and 2018 Multimedia
2017 and 2018 Multimedia2017 and 2018 Multimedia
2017 and 2018 MultimediaManju Nath
 
2017 and 2018 Artificial Intelligent
2017 and 2018 Artificial Intelligent2017 and 2018 Artificial Intelligent
2017 and 2018 Artificial IntelligentManju Nath
 
2017 and 2018 Neural Networks
2017 and 2018 Neural Networks2017 and 2018 Neural Networks
2017 and 2018 Neural NetworksManju Nath
 
2017 and 2018 Big data
2017 and 2018 Big data2017 and 2018 Big data
2017 and 2018 Big dataManju Nath
 
2017 and 2018 Image Processing
2017 and 2018 Image Processing2017 and 2018 Image Processing
2017 and 2018 Image ProcessingManju Nath
 
2017 and 2018 Parallel and Distributed Systems
2017 and 2018 Parallel and Distributed Systems2017 and 2018 Parallel and Distributed Systems
2017 and 2018 Parallel and Distributed SystemsManju Nath
 
2017 and 2018 Software Engineering
2017 and 2018 Software Engineering2017 and 2018 Software Engineering
2017 and 2018 Software EngineeringManju Nath
 
2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc Networks2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc NetworksManju Nath
 
2017 and 2018 Android Projects
2017 and 2018 Android Projects2017 and 2018 Android Projects
2017 and 2018 Android ProjectsManju Nath
 
2017 and 2018 Secure and Dependable Computing
2017 and 2018 Secure and Dependable Computing2017 and 2018 Secure and Dependable Computing
2017 and 2018 Secure and Dependable ComputingManju Nath
 
2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor Networks2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor NetworksManju Nath
 
2017 and 2018 Secure Computing
2017 and 2018 Secure Computing2017 and 2018 Secure Computing
2017 and 2018 Secure ComputingManju Nath
 
2017 and 2018 Network Security
2017 and 2018 Network Security2017 and 2018 Network Security
2017 and 2018 Network SecurityManju Nath
 
2017 and 2018 Data Mining
2017 and 2018 Data Mining2017 and 2018 Data Mining
2017 and 2018 Data MiningManju Nath
 
2017 and 2018 Cloud Computing
2017 and 2018 Cloud Computing2017 and 2018 Cloud Computing
2017 and 2018 Cloud ComputingManju Nath
 
2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects listManju Nath
 

Mais de Manju Nath (20)

2017 and 2018 Dependable Computing
2017 and 2018 Dependable Computing2017 and 2018 Dependable Computing
2017 and 2018 Dependable Computing
 
2017 and 2018 Service Computing
2017 and 2018 Service Computing2017 and 2018 Service Computing
2017 and 2018 Service Computing
 
2017 and 2018 Networking and Service Computing
2017 and 2018 Networking and Service Computing2017 and 2018 Networking and Service Computing
2017 and 2018 Networking and Service Computing
 
2017 and 2018 Networking
2017 and 2018 Networking2017 and 2018 Networking
2017 and 2018 Networking
 
2017 and 2018 Multimedia
2017 and 2018 Multimedia2017 and 2018 Multimedia
2017 and 2018 Multimedia
 
2017 and 2018 Artificial Intelligent
2017 and 2018 Artificial Intelligent2017 and 2018 Artificial Intelligent
2017 and 2018 Artificial Intelligent
 
2017 and 2018 Neural Networks
2017 and 2018 Neural Networks2017 and 2018 Neural Networks
2017 and 2018 Neural Networks
 
2017 and 2018 Big data
2017 and 2018 Big data2017 and 2018 Big data
2017 and 2018 Big data
 
2017 and 2018 Image Processing
2017 and 2018 Image Processing2017 and 2018 Image Processing
2017 and 2018 Image Processing
 
2017 and 2018 Parallel and Distributed Systems
2017 and 2018 Parallel and Distributed Systems2017 and 2018 Parallel and Distributed Systems
2017 and 2018 Parallel and Distributed Systems
 
2017 and 2018 Software Engineering
2017 and 2018 Software Engineering2017 and 2018 Software Engineering
2017 and 2018 Software Engineering
 
2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc Networks2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc Networks
 
2017 and 2018 Android Projects
2017 and 2018 Android Projects2017 and 2018 Android Projects
2017 and 2018 Android Projects
 
2017 and 2018 Secure and Dependable Computing
2017 and 2018 Secure and Dependable Computing2017 and 2018 Secure and Dependable Computing
2017 and 2018 Secure and Dependable Computing
 
2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor Networks2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor Networks
 
2017 and 2018 Secure Computing
2017 and 2018 Secure Computing2017 and 2018 Secure Computing
2017 and 2018 Secure Computing
 
2017 and 2018 Network Security
2017 and 2018 Network Security2017 and 2018 Network Security
2017 and 2018 Network Security
 
2017 and 2018 Data Mining
2017 and 2018 Data Mining2017 and 2018 Data Mining
2017 and 2018 Data Mining
 
2017 and 2018 Cloud Computing
2017 and 2018 Cloud Computing2017 and 2018 Cloud Computing
2017 and 2018 Cloud Computing
 
2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list2017 and 2018 academic ieee projects list
2017 and 2018 academic ieee projects list
 

Último

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxRich Reba
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024Chandresh Chudasama
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 

Último (20)

Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Implementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptxImplementing Exponential Accelerators.pptx
Implementing Exponential Accelerators.pptx
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024MEP Plans in Construction of Building and Industrial Projects 2024
MEP Plans in Construction of Building and Industrial Projects 2024
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Authentically Social - presented by Corey Perlman
Authentically Social - presented by Corey PerlmanAuthentically Social - presented by Corey Perlman
Authentically Social - presented by Corey Perlman
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 

2013-2014 IEEE Project Lists Cloud Computing Network Security

  • 1. 2013 and 2014 Completed IEEE Projects List Contact : K.Manjunath - 09535866270 Sl.No Project Title Year Cloud Computing 1 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013 2 A Privacy Leakage Upper Bound constraint Based Approach for Cost Effective 2013 3 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 2013 4 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 2013 5 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 2013 6 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013 7 NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013 8 On the Optimal Allocation of Virtual Resources in Cloud Computing Networks 2013 9 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 2013 10 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 2013 11 Privacy Preserving Delegated Access Control in Public Clouds 2013 12 Privacy Preserving Public Auditing for Secure Cloud Storage 2013 13 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud Computing Systems 2013 14 Toward Secure Multi keyword Top-k Retrieval Over Encrypted Cloud 2013 15 Towards Differential Query Services in Cost Efficient Cloud 2013 16 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2013 17 Dynamic Audit Services for Outsourced Storages in Clouds 2013 18 Collaboration in Multi cloud Environments Framework and Security Issues 2013 19 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 2013 20 QoS Ranking Prediction for Cloud Services 2013 21 Load Rebalancing for Distributed File Systems in Clouds 2013 22 A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms 2013 23 SeDas A Self Destructing Data System Based on Active Storage Framework 2013 24 Winds of Change from Vendor Lock In to the Meta Cloud 2013 25 On Data Staging Algorithms for Shared Data Accesses in Clouds 2013 26 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 2013 27 Optimal Multi Server Configuration for Profit Maximization in Cloud Computing 2013 28 TST Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing 2013 29 Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis 2013 30 Secure Logging as a Service—Delegating Log Management to the Cloud 2013 31 Fault Tolerance Management in Cloud Computing: A System-Level Perspective 2013 32 Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing 2012 33 Cloud Computing Security From Single to Multi-Clouds 2012 34 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage 2012 35 Efficient audit service outsourcing for data integrity in clouds 2012
  • 2. 36 Enabling Secure and Efficient Ranked Keyword Search Over Out Sourced Cloud Data 2012 37 Ensuring Distributed Accountability for Data Sharing in the Cloud 2012 38 IDSaaS Intrusion Detection System as a Service in Public Clouds 2012 39 Privacy Preserving Public Auditing for Secure Cloud Storage 2012 40 Towards Secure and Dependable Cloud Storage Server 2012 41 Secure Overlay Cloud Storage with Access Control and Assured Deletion 2012 42 A Refined RBAC Model for Cloud Computing 2012 43 Cloud Computing Services A Total Cost of Ownership Approach 2012 44 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing 2012 45 Secure and Erasure Coding Based cloud storage system with Secure Data Forwarding 2012 Network Security 1 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013 2 EAACK—A Secure Intrusion-Detection System for MANETs 2013 3 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 2013 4 Modeling the Pair wise Key Pre distribution Scheme in the Presence of Unreliable Links 2013 5 Vampire Attacks Draining life from wireless ad-hoc sensor networks 2013 6 EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 2013 7 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013 8 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013 9 Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks 2013 10 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013 11 Identity-Based Secure Distributed Data Storage Schemes 2013 12 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013 13 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013 14 SORT A Self-Organizing Trust Model for Peer-to-Peer Systems 2013 15 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. 2013 16 Distance Bounding: A Practical Security Solution for Real-Time Location Systems 2013 17 Minimum Cost Blocking Problem in Multi path Wireless Routing Protocols 2013 18 A Rank Correlation Based Detection against Distributed Reflection DOS Attacks 2013 19 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc networks 2012 20 An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks 2012 21 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012 22 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 2012 23 Detecting and Resolving Firewall Policy Anomalies 2012 24 Performance of PCN-Based Admission Control Under Challenging Conditions 2012 25 Load-Balancing Multipath Switching System with Flow Slice 2012 26 A Framework for Routing Performance Analysis in delay tolerant Networks 2012 27 Revisiting Defenses Against Large-Scale Online Password Guessing Attacks 2012 28 Secure High Throughput Multicast Routing in Wireless Mesh Networks 2012 29 Online Intrusion Alert Aggregation with Generative Data Stream Modeling 2012 30 ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2013 Adhoc Networks & Mobile Computing & VANET & MANET
  • 3. 1 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks(MANET) 2013 2 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks (MANET) 2013 3 Efficient Algorithms for Neighbor Discovery in Wireless Networks (Adhoc) 2013 4 Multicast Capacity in MANET with Infrastructure(MANET) 2013 5 Optimal Multicast capacity and delay tradeoff in Manet (MANET) 2013 6 Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets (Adhoc) 2013 7 Performance Modeling of Safety Messages Broadcast in Vehicular Ad Hoc Networks (VANET) 2013 8 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation (Adhoc) 2013 9 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks (MANET) 2013 10 Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks (VANET) 2013 11 A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks (VANET) 2013 12 Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks (Mobile Computing) 2013 13 Network Assisted Mobile Computing with Optimal Uplink Query Processing (Mobile Computing) 2013 14 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc networks 2013 15 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013 16 Efficient Rekeying Framework for Secure Multicast with Diverse Subscription Period Mobile Users 2013 17 Risk Aware mitigation of MANET Attacks 2013 18 Balancing the Tradeoffs between Query Delay and Data Availability in MANETs 2012 19 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks 2012 20 TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks 2012 21 Throughput and Energy Efficiency in wireless ad hoc network with caussian channels 2012 Sensor Networks 1 Secure and Efficient Data Transmission for Cluster based WSN 2013 2 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013 3 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 2013 4 Mobile Relay Configuration in Data Intensive Wireless Sensor Network 2013 5 Localization in Wireless Sensor Networks Byzantines and Mitigation Techniques 2013 6 Harvesting Aware Energy Management for Time Critical WSN with Joint Voltage 2013 7 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 2013 8 Adaptive Network Coding for Broadband Wireless Access Networks 2013 9 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. 2013 10 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 2013 11 Participatory Privacy: Enabling Privacy in Participatory Sensing 2013 12 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2013 13 Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs 2012 14 Fast Data Collection in Tree-Based Wireless Sensor Networks 2012 15 BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in WSN 2012 16 Cut Detection in Wireless Sensor Network 2012 17 Protecting Location Privacy in Sensor Networks against Global Eavesdropper 2012 18 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2012 19 Energy Efficient Routing Mechanism in Wireless Sensor Network 2012 20 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012 21 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2012
  • 4. Android Projects 1 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 2013 2 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013 3 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013 4 Cloud MoV Cloud-based Mobile Social TV 2013 5 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 2013 6 Android College Campus 2013 7 Nautical Telemetrically System 2013 8 Collaborative Learning Assistant for Android 2013 9 Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud 2013 10 Spatial Query Integrity with Voronoi Neighbors 2013 11 Dynamic Personalized Recommendation on Sparse Data 2013 Data Mining 1 m-Privacy for Collaborative Data Publishing 2013 2 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2013 3 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2013 4 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 2013 5 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 2013 6 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 2013 7 Privacy-Enhanced Web Service Composition 2013 8 System to Filter Unwanted Messages from OSN User Walls 2013 9 Incentive Compatible Privacy-Preserving Data Analysis 2013 10 Facilitating Effective User Navigation through Website Structure Improvement 2013 11 Optimal Route Queries with Arbitrary Order Constraints 2013 12 Fast Nearest Neighbor Search with Keywords 13 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 2013 14 Acceleration of XML Parsing through Prefetching 2013 15 Automatic Discovery of Association Orders between Name and Aliases from the Web 2012 16 Slicing A New Approach to Privacy Preserving Data Publishing 2012 17 Ranking Model Adaptation for Domain-Specific Search 2012 18 Improving aggregate recommendation diversity using ranking-based techniques 2012 19 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 2012 20 Dynamic Personalized Recommendation on Sparse Data 2013 21 Trust Modeling in Social Tagging of Multimedia Content 2012 22 MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS 2013 Wireless Communication
  • 5. 1 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2013 2 Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 2013 3 IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments 2013 4 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 2012 5 Topology Control in Mobile Adhoc Networks with Cooperative Communications 2012 6 Local Greedy Approximation for Scheduling in Multi-hop Wireless Networks 2012 Image Processing and Multimedia 1 3D Face Recognition Under Expressions, Occlusions and Pose Variations 2013 2 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features 2013 3 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013 4 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. 2013 5 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 2013 6 An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 2013 7 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks 2013 8 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 2012 J2ME Mobile Based Projects 1 Adaptation of a virtual campus for mobile learning devices 2013 2 Bluetooth Mobile Based College Campus 2013 3 ECops via Handheld Mobile Devices 2013 4 Privacy-Conscious Location-Based Queries in Mobile Environments 2013 5 Ranking Model Adaptation for Domain-Specific Search 2013 6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile- Healthcare Emergency 2013 7 The Word in a nut shell : CONCISE RANGE QUERIES 2013