DOWNLOAD IEEE PROJECTS
S.NO | TITLE | TECHNOLOGY | MONTH/ YEAR |
KNOWLEDGE AND DATA ENGINEERING / DATA MINING | |||
1 | Supporting Privacy Protection in Personalized Web Search | JAVA/J2EE | Feb 2014 |
2 | Fast Nearest Neighbor Search with Keywords | JAVA | April 2014 |
3 | Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme | JAVA/J2EE | Jan 2014 |
4 | LARS: An Efficient and Scalable Location-Aware Recommender System | JAVA/J2EE | June 2014 |
5 | Dynamic Query Forms for Database Queries | JAVA/J2EE | Preprint |
6 | Privacy Preserving Delegated Access Control in Public Clouds | JAVA/J2EE | Preprint |
7 | m-Privacy for Collaborative Data Publishing | JAVA/J2EE | Preprint |
8 | Scalable Keyword Search on Large RDF Data | JAVA/J2EE | Preprint |
IMAGE PROCESSING | |||
9 | Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation - Information Forensics and Security | JAVA | Jan 2014 |
10 | Fingerprint Compression Based on Sparse Representation | JAVA | Feb 2014 |
11 | Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression | JAVA | Jan 2014 |
CLOUD COMPUTING | |||
12 | Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud | JAVA/J2EE | Jan- Mar 2014 |
13 | Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds - Parallel Distributed Systems | Feb 2014 | |
14 | Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage - Parallel Distributed Systems | Feb 2014 | |
15 | On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage - Parallel Distributed Systems | Jan 2014 | |
16 | Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing | JAVA/J2EE | Jan 2014 |
17 | Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage- Services Computing | DOT NET | Jan 2014 |
NETWORKING | |||
18 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Feb 2014 | |
WIRELESS COMMUNICATIONS | |||
19 | Incentive Based Data Sharing in Delay Tolerant | JAVA | Jan 2014 |
DEPENDABLE SECURE COMPUTING / NETWORK SECURITY | |||
20 | Hiding in the | JAVA | May – June 2014 |
MOBILE COMPUTING | |||
21 | Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks | Feb 2014 | |
22 | Video Dissemination over Hybrid Cellular and Ad Hoc Networks | Feb 2014 | |
23 | Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks | JAVA | June 2014 |
24 | Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks | JAVA | March 2014 |
25 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | JAVA | Preprint 2014 |
PARALLEL DISTRIBUTED SYSTEMS | |||
26 | Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | Feb 2014 | |
27 | Traffic pattern-based content leakage detection for trusted content delivery networks | Feb 2014 | |
28 | A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis | JAVA | Feb 2014 |
29 | Cross-Layer Approach for Minimizing Routing Disruption in IP Networks | JAVA | July 2014 |
SECURITY AND PRIVACY | |||
30 | Bandwidth Distributed Denial of Service: Attacks and Defenses | JAVA | Jan – Feb 2014 |