DOWNLOAD IEEE PROJECTS
S.NO
|
TITLE
|
TECHNOLOGY
|
MONTH/ YEAR
|
KNOWLEDGE AND DATA ENGINEERING / DATA
MINING
|
|||
1
|
Supporting Privacy Protection in
Personalized Web Search
|
JAVA/J2EE
|
Feb 2014
|
2
|
Fast Nearest Neighbor Search with
Keywords
|
JAVA
|
April 2014
|
3
|
Approximate Shortest Distance Computing:
A Query-Dependent Local Landmark Scheme
|
JAVA/J2EE
|
Jan 2014
|
4
|
LARS: An Efficient and Scalable
Location-Aware Recommender System
|
JAVA/J2EE
|
June 2014
|
5
|
Dynamic Query Forms for Database Queries
|
JAVA/J2EE
|
Preprint
|
6
|
Privacy Preserving Delegated Access
Control in Public Clouds
|
JAVA/J2EE
|
Preprint
|
7
|
m-Privacy for Collaborative Data
Publishing
|
JAVA/J2EE
|
Preprint
|
8
|
Scalable Keyword Search on Large RDF Data
|
JAVA/J2EE
|
Preprint
|
IMAGE PROCESSING
|
|||
9
|
Designing an Efficient Image
Encryption-Then-Compression System via Prediction Error Clustering and Random
Permutation
- Information Forensics and Security
|
JAVA
|
Jan 2014
|
10
|
Fingerprint Compression Based on Sparse
Representation
|
JAVA
|
Feb 2014
|
11
|
Hierarchical Prediction and Context
Adaptive Coding for Lossless Color Image Compression
|
JAVA
|
Jan 2014
|
CLOUD COMPUTING
|
|||
12
|
Oruta: Privacy-Preserving Public Auditing
for Shared Data in the Cloud
|
JAVA/J2EE
|
Jan- Mar 2014
|
13
|
Decentralized Access Control with
Anonymous Authentication of Data Stored in Clouds - Parallel Distributed Systems
|
Feb 2014
|
|
14
|
Key-Aggregate Cryptosystem for Scalable
Data Sharing in Cloud Storage - Parallel Distributed Systems
|
Feb 2014
|
|
15
|
On the Knowledge Soundness of a
Cooperative Provable Data Possession Scheme in Multicloud Storage - Parallel Distributed Systems
|
Jan 2014
|
|
16
|
Privacy Preserving Back-Propagation
Neural Network Learning Made Practical with Cloud Computing
|
JAVA/J2EE
|
Jan 2014
|
17
|
Identity-Based Distributed Provable Data
Possession in Multi-Cloud Storage- Services Computing
|
DOT NET
|
Jan 2014
|
NETWORKING
|
|||
18
|
Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks
|
Feb 2014
|
|
WIRELESS COMMUNICATIONS
|
|||
19
|
Incentive Based Data Sharing in Delay
Tolerant
|
JAVA
|
Jan 2014
|
DEPENDABLE SECURE COMPUTING / NETWORK
SECURITY
|
|||
20
|
Hiding in the
|
JAVA
|
May – June 2014
|
MOBILE COMPUTING
|
|||
21
|
Energy-Efficient Reliable Routing
Considering Residual Energy in Wireless Ad Hoc Networks
|
Feb 2014
|
|
22
|
Video Dissemination over Hybrid Cellular
and Ad Hoc Networks
|
Feb 2014
|
|
23
|
Energy-optimum Throughput and Carrier
Sensing Rate in CSMA-based Wireless Networks
|
JAVA
|
June 2014
|
24
|
Cooperative Caching for Efficient Data
Access in Disruption Tolerant Networks
|
JAVA
|
March 2014
|
25
|
Privacy-Preserving and Truthful Detection
of Packet Dropping Attacks in Wireless Ad Hoc Networks
|
JAVA
|
Preprint 2014
|
PARALLEL DISTRIBUTED SYSTEMS
|
|||
26
|
Securing Broker-Less Publish/Subscribe
Systems Using Identity-Based Encryption
|
Feb 2014
|
|
27
|
Traffic pattern-based content leakage detection
for trusted content delivery networks
|
Feb 2014
|
|
28
|
A System for Denial-of-Service Attack
Detection Based on Multivariate Correlation Analysis
|
JAVA
|
Feb 2014
|
29
|
Cross-Layer Approach for Minimizing
Routing Disruption in IP Networks
|
JAVA
|
July 2014
|
SECURITY AND PRIVACY
|
|||
30
|
Bandwidth Distributed Denial of Service:
Attacks and Defenses
|
JAVA
|
Jan – Feb 2014
|
0 comments:
THANKS FOR UR COMMENT ....