Lord Muruga ! ! !

IEEE 2013 - 2014 PROJECT Titles

 

           

 

 

PROJECT ID

Title

Domain

Area

13SMT01

Privacy-Preserving Public Auditing for Secure Cloud Storage

JAVA

Cloud Computing

13SMT02

Winds of Change from Vendor Lock-In to the Meta Cloud

JAVA

Cloud Computing

13SMT03

AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds

JAVA

Cloud Computing

13SMT04

Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks

DOTNET

Cloud Computing

13SMT05

Privacy-Preserving Public Auditing for Secure Cloud Storage

DOTNET

Cloud Computing

13SMT06

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

DOTNET

Cloud Computing

13SMT07

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

JAVA

Cloud Computing

13SMT08

Cloud computing for mobile users can offloading compution save energy

JAVA

Cloud Computing

13SMT09

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

DOTNET

Cloud Computing

13SMT10

A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

DOTNET

Cloud Computing

13SMT11

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

DOTNET

Cloud Computing

13SMT12

Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems

DOTNET

Cloud Computing

13SMT13

Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data

DOTNET

Cloud Computing

13SMT14

An Adaptive Cloud Downloading Service

DOTNET

Cloud Computing

13SMT15

Load Rebalancing for Distributed File Systems in Clouds

JAVA

Cloud Computing

13SMT16

Dynamic Audit Services for Outsourced Storages in Clouds

DOTNET

Cloud Computing

13SMT17

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

JAVA

Cloud Computing

13SMT18

Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

JAVA

Cloud Computing

13SMT19

PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

JAVA

Cloud Computing

13SMT20

Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords

JAVA

IMAGE PROCESSING

13SMT21

Local Directional Number Pattern for Face Analysis Face and Expression Recognition

DOTNET

IMAGE PROCESSING

13SMT22

Reversible Data Hiding With Optimal Value Transfer

DOTNET

IMAGE PROCESSING

13SMT23

Super-Resolution-based Inpainting

JAVA

IMAGE PROCESSING

13SMT24

Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting

DOTNET

IMAGE PROCESSING

13SMT25

A Fast Re-Route Method

JAVA

Journal

13SMT26

A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

JAVA

DATA MINING

13SMT27

CloudMoV: Cloud-based Mobile Social TV

JAVA

DATA MINING

13SMT28

Crowd sourcing Predictors of Behavioral Outcomes.

JAVA

DATA MINING

13SMT29

Spatial Approximate String Search

JAVA

DATA MINING

13SMT30

Incentive Compatible Privacy-Preserving Data Analysis

JAVA

DATA MINING

13SMT31

Focus Learning to Crawl Web Forums

JAVA

DATA MINING

13SMT32

Robust Module Based Data Management

JAVA

DATA MINING

13SMT33

Comparable Entity Mining from Comparative Questions

JAVA

DATA MINING

13SMT34

Facilitating Effective User Navigation through Website Structure Improvement

JAVA

DATA MINING

13SMT35

PMSE: A Personalized Mobile Search Engine

JAVA

DATA MINING

13SMT36

A System to Filter Unwanted Messages from OSN User Walls

JAVA

DATA MINING

13SMT37

Protecting Sensitive Labels in Social Network Data Anonymization

JAVA

DATA MINING

13SMT38

Mining Order-Preserving Sub matrices from Data with Repeated Measurements

DOTNET

DATA MINING

13SMT39

Secure Mining of Association Rules in Horizontally Distributed Databases

DOTNET

DATA MINING

13SMT40

A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

JAVA

DATA MINING

13SMT41

A Survey of XML Tree Patterns

DOTNET

DATA MINING

13SMT42

Dynamic Personalized Recommendation on Sparse Data

DOTNET

DATA MINING

13SMT43

A Probabilistic Approach to String Transformation

JAVA

DATA MINING

13SMT44

Mining User Queries with Markov Chains: Application to Online Image Retrieval

DOTNET

DATA MINING

13SMT45

Annotating Search Results from Web Databases

JAVA

DATA MINING

13SMT46

Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development

JAVA

DATA MINING

13SMT47

A New Algorithm for Inferring User Search Goals with Feedback Sessions

JAVA

DATA MINING

13SMT48

m-Privacy for Collaborative Data Publishing

JAVA

DATA MINING

13SMT49

Facilitating Document Annotation Using Content And Querying Value

JAVA

DATA MINING

13SMT50

Mobile Relay Configuration in Data-intensive Wireless Sensor Networks

JAVA

Mobile Computing

13SMT51

Vampire attacks: Draining life from wireless ad-hoc sensor networks

JAVA

Mobile Computing

13SMT52

A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

JAVA

Mobile Computing

13SMT53

Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks

JAVA

Mobile Computing

13SMT54

Distributed Cooperative Caching in Social Wireless Networks

JAVA

Mobile Computing

13SMT55

EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks

DOTNET

Mobile Computing

13SMT56

On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks

DOTNET

Mobile Computing

13SMT57

Optimal Multicast Capacity and Delay Tradeoffs in MANETs

DOTNET

Mobile Computing

13SMT58

Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks

DOTNET

Mobile Computing

13SMT59

Optimal Content Downloading in Vehicular Networks

DOTNET

Mobile Computing

13SMT60

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks

JAVA

Mobile Computing

13SMT61

Optimizing Cloud Resources for Delivering IPTV Services through Virtualization

JAVA

Networking

13SMT62

Access Policy Consolidation for Event Processing Systems

JAVA

Networking

13SMT63

Fully Anonymous Profile Matching in Mobile Social Networks

JAVA

Networking

13SMT64

The Target Tracking in Mobile Sensor Networks.

DOTNET

Networking

13SMT65

Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

DOTNET

Networking

13SMT66

Resource Allocation for QoS Support in Wireless Mesh Networks

DOTNET

Networking

13SMT67

Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks

JAVA

Networking

13SMT68

SinkTrail: A Proactive Data Reporting Protocol for Wireless Sensor Networks

JAVA

Networking

13SMT69

Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality

DOTNET

Networking

13SMT70

Dynamic Control of Coding for Progressive Packet Arrivals in DTNs

JAVA

Networking

13SMT71

Transfer Reliability and Congestion Control Strategies in Opportunistic Networks A Survey

DOTNET

Networking

13SMT72

Participatory Privacy Enabling Privacy in Participatory Sensing

JAVA

Networking

13SMT73

Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment

JAVA

Parallel and Distributed Systems

13SMT74

Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks.

DOTNET

Parallel and Distributed Systems

13SMT75

SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.

DOTNET

Parallel and Distributed Systems

13SMT76

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

DOTNET

Parallel and Distributed Systems

13SMT77

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

JAVA

Parallel and Distributed Systems

13SMT78

CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.

JAVA

Secured Computing

13SMT79

Two tales of privacy in online social networks

JAVA

Secured Computing

13SMT80

Extracting Spread-Spectrum Hidden Data from Digital Media

JAVA

Secured Computing

13SMT81

Utility-Privacy Tradeoff in Databases An Information-theoretic Approach

JAVA

Secured Computing

13SMT82

Privacy Preserving Data Sharing With Anonymous ID Assignment.

DOTNET

Secured Computing

13SMT83

Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing

DOTNET

Secured Computing

13SMT84

Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption

DOTNET

Secured Computing

13SMT85

EAACK—A Secure Intrusion-Detection System for MANETs

DOTNET

Secured Computing

13SMT86

SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

DOTNET

Secured Computing

13SMT87

NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

JAVA

Secured Computing

13SMT88

A Decentralized Service Discovery Approach on Peer-to-Peer Networks

JAVA

Secured Computing

13SMT89

Identity-Based Secure Distributed Data Storage Schemes

JAVA

Secured Computing

13SMT90

WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream

JAVA

Secured Computing