Gagner Technologies offered Final Year Projects, M.E projects 2013-2014, mini projects 2013-2014, Real Time Projects, Final Year Projects for BE ECE, Final Year Projects for BE cse, Final Year Projects for IT,
Mini projects, .Net projects,Java project,J2EE projects,Projects in Networking, Projects in data mining, Projects in mobile computing,Projects in distributed systems, Projects in networking security,software Engineering
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Ieee 2013 projects titles
1. IEEE 2013 Projects
DOTNET
DATA MINING
GD001
A Novel profit Maximizing Metric for measuring classification performance of
customer churn Prediction Models
GD002 Annotating search results from Web databases
GD003 Building a Scalable Database-Driven Reverse Dictionary
GD004 Discovering Temporal Change Patterns in the Presence of Taxonomies
GD005 Efficient and Effective Duplicate Detection in Hierarchical Data
GD006 Extending BCDM to Cope with Proposals and Evaluations of Updates)
GD007 Failure-Aware Cascaded Suppression in Wireless Sensor Networks
GD008 Information-Theoretic Outlier Detection for Large-Scale Categorical Data
GD009 PMSE: A Personalized Mobile Search Engine
GD010 Genetic Programming Approach to Record duplication
GD011 A Query Formulation Language for the Data web
GD012 Outsourced Similarity Search on Metric Data Assets
GD013 Efficient Iceberg Query Evaluation Using Compressed Bitmap Index
GD014
TSCAN: A Content Anatomy Approach to Temporal Topic Summarization
CLOUD COMPUTING
GD021 Security and Privacy-Enhancing Multi cloud Architectures
GD022
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment
GD023 Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud
GD024 Toward Secure Multi key word Top-k Retrieval over Encrypted Cloud Data
2. GD025
A Hierarchical Approach for the Resource Management of Very Large Cloud
Platforms
GD026
Ensuring Distributed responsibility For Data distribution in the Cloud
DISTRIBUTED SYSTEM
GD041
Aging-aware energy-efficient workload allocation for mobile multimedia
platforms
GD042 Attached-RTS: Eliminating an exposed terminal problem in wireless networks
GD044
Efficient computation of robust average of compressive sensing data in
wireless sensor networks in the presence of sensor faults
GD045
ESWC: efficient scheduling for the mobile sink in wireless sensor networks
with delay constraint
GD046 High-accuracy TDOA-based localization without time synchronization
GD047 Hint-Based Execution Of Workloads In Clouds With Nefeli
GD048 Intelligent Sensor Placement For Hot Server Detection In Data Centers
GD049 ITA: Innocuous Topology Awareness For Unstructured P2p Networks
GD050 A new hierarchical packet classification algorithm for Networking Concept
GD051
Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False
Data in WSNs
GD052
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile
Sinks
GD053
A Secure Erasure Code -Based Cloud Storage System with Secure Data
Forwarding
GD054
Balancing the Trade-Offs between Query Delay and Data Availability in
MANETs
MOBILE COMPUTING
GD061 Network-Assisted Mobile Computing With Optimal Uplink Query Processing
GD062 ALERT: An Anonymous Location-Based Efficient Routing Protocol In
Manets
GD063 Toward Accurate Mobile Sensor Network Localization In Noisy Environments
GD064 On The Forwarding Performance Under Heterogeneous Contact Dynamics In
Mobile Opportunistic Networks
3. GD065 Predictable Mobile Routing For Spacecraft Networks
GD066 Design And Analysis Of Adaptive Receiver Transmission Protocols For
Receiver Blocking Problem In Wireless Ad Hoc Networks
GD067 Enhanced Least-Squares Positioning Algorithm For Indoor Position
GD068 Game-Based Broadcast Over Reliable And Unreliable Wireless Links In
Wireless Multihop Networks
GD069 Understanding The Scheduling Performance In Wireless Networks With
Successive Interference Cancellation
GD070 Topological Persistence For Medium Access Control
GD071 Reducing Signaling Overhead For Femtocell/Macrocell Networks
GD072 Adaptive Duty Cycle Control With Queue Management In Wireless Sensor
Networks
GD073 Secure and Efficient Handover Authentication Based on Bilinear Pairing
Functions
GD074 Senseless :A Database Driven White Space Network
GD075 Efficient Rendezvous Algorithms for Mobility-Enabled Wireless Sensor Networks
GD076 Protecting Location Privacy in Sensor Networks against a Global
Eavesdropper
NETWORKING
GD091 Randomized Information Dissemination In Dynamic Environments
GD092 An Efficient And Robust Addressing Protocol For Node Auto Configuration In
Ad Hoc Networks
GD093 Fine-Grained Channel Access In Wireless LAN
GD094 QFQ: Efficient Packet Scheduling With Tight Guarantees
GD095 An Efficient And Fair Mac Protocol Robust To Reactive Interference
GD096 A Formal Data-Centric Approach For Passive Testing Of Communication
Protocols
GD097 Spreader Classification Based On Optimal Dynamic Bit Sharing
GD098 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
GD099 An Adaptive System Based On Roadmap Profiling To Enhance Warning
Message Dissemination In Vanets
GD100 Duty-Cycle-Aware Minimum-Energy Multicasting In Wireless Sensor
Networks
4. GD101 ICTCP: Incast Congestion Control For TCP In Data-Center Networks
GD102 Moment-Based Spectral Analysis Of Large-Scale Networks Using Local
Structural Information
GD103 Time-Bounded Essential Localization For Wireless Sensor Networks
GD104 Mobility Increases The Connectivity Of Wireless Networks
GD105 Topology Control For Effective Interference Cancellation In Multiuser MIMO
Networks
GD106 Latency Equalization as a New Network Service Primitive
GD107 Privacy- and Integrity-Preserving Range Queriesin Sensor Networks
NETWORK SECURITY
GD121 Entrusting Private Computation And Data To Untrusted Networks
GD122 NICE: Network Intrusion Detection And Countermeasure Selection In Virtual
Network
GD123 DNS For Massive-Scale Command And Control
GD124 Warningbird:A Near Real-Time Detection System For Suspicious Urls In
Twitter Stream
GD125 A System For Timely And Controlled Information Sharing In Emergency
Situations
GD126 Detecting Automation of Twitter Accounts:Are You a Human, Bot, or
Cyborg?
SOFTWARE ENGINEERING
GD141 A Decentralized Self-Adaptation Mechanism For Service-Based Applications
In The Cloud
GD142 A Large-Scale Empirical Study Of Just-In-Time Quality Assurance
GD143 A Machine Learning Approach To Software Requirements Prioritization
GD144 Abstracting Runtime Heaps For Program Understanding
GD145 Coverage Estimation In Model Checking With Bitstate Hashing
GD146 Edzl Schedulability Analysis In Real-Time Multicore Scheduling
GD147 Event Logs For The Analysis Of Software Failures A Rule-Based Approach
GD148 Local Versus Global Lessons For Defect Prediction And Effort Estimation
5. IEEE 2013 Projects
JAVA
DATA MINING
GJ001 Optimal Route Queries with Arbitrary Order Constraints
GJ002 Protecting Sensitive Labels in Social Network Data Anonymization
GJ003 Successive GToup Selection for MicroagGTegation
GJ004 Transductive Multilabel Learning via Label Set Propagation
GJ005
Single-Database Private Information Retrieval from Fully Homomorphic
Encryption
GJ006 Efficient Evaluation of SUM Queries over Probabilistic Data
GJ007 Multiview Partioning Via Tensor Methods
GJ008
On the Spectral Characterization and Scalable Mining of Network Communities
GJ009
Incremental Information Extraction Using Relational Databases
GJ010
Mining Web Graphs for Recommendations
GJ011
Extending Attribute Information for Small Data Set Classification
GJ012
Anomaly Detection for Discrete Sequences A Survey
CLOUD COMPUTING
GJ021 Security and Privacy-Enhancing Multi cloud Architectures
GJ022
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing
Environment
GJ023 Mona: Secure Multi-Owner Data Sharing For Dynamic Groups In The Cloud
GJ024 Toward Secure Multi key word Top-k Retrieval over Encrypted Cloud Data
GJ025
A Hierarchical Approach for the Resource Management of Very Large Cloud
Platforms
6. GJ026
Ensuring Distributed responsibility For Data distribution in the Cloud
GJ027 Cloud Computing Security: From Single To Multi-Clouds
DISTRIBUTED SYSTEM
GJO41 Link Scheduling For Exploiting Spatial Reuse In Multihop Mimo Networks
GJ042 Modeling Propagation Dynamics Of Social Network Worms
GJ043 Per-Flow Queue Management With Succinct Priority Indexing Structures For
High Speed Packet Scheduling
GJ044 A Secure Erasure Code-Based Cloud Storage System with Secure Data
Forwarding
GJ045 Scalable Hyper Grid K-Nn-Based Online Anomaly Detection In Wireless
Sensor Networks
GJ046 Self-Adaptive Contention Aware Routing Protocol For Intermittently
Connected Mobile Networks
GJ047 Sensor Network Navigation without Location
GJ048 Task Allocation for Undependable Multiagent Systems in Social Networks
GJ049 Virtual Batching: Request Batching For Server Energy Conservation In
Virtualized Data Centers
GJ050 Online Balancing Two Independent Criteria upon Placements and Deletions
GJ051 Catching Packet Droppers and Modifiers in Wireless Sensor Networks
GJ052 CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats
GJ053 Meeting Soft Deadlines in Scientific Workflows Using Resubmission Impact
MOBILE COMPUTING
GJ071 Predicting Human Movement Based On Telecom's Handoff In Mobile
Networks
GJ072 Deployment Of A Connected Reinforced Backbone Network With A Limited
Number Of Backbone Nodes
GJ073 Underwater Localization With Time-Synchronization And Propagation Speed
Uncertainties
GJ074 Maximizing Rendezvous Diversity In Rendezvous Protocols For Decentralized
Cognitive Radio Networks
7. GJ075 A Progressive Approach To Reducing Data Collection Latency In Wireless
Sensor Networks With Mobile Elements
GJ076 A Traffic-Aware Channel And Rate Reassignment Algorithm For Wireless
Mesh Networks
GJ077 Nuzzer: A Large-Scale Device-Free Passive Localization System For Wireless
Environments
GJ078 On Power And Throughput Tradeoffs Of Wifi And Bluetooth In Smartphones
GJ079 Optimal Content Downloading In Vehicular Networks
GJ080 A Robust Indoor Pedestrian Tracking System With Sparse Infrastructure
Support
GJ081 Assessing The E-Services Of International Airport Websites: Implications For
Innovative E-Tourism Applications
GJ082 Variable-Width Channel Allocation For Access Points: A Game-Theoretic
Perspective
GJ083 Fast Data Collection in Tree-Based Wireless Sensor Networks
GJ084 Stateless Multicast Protocol for Ad Hoc Networks
NETWORKING
GJ091 Distortion-Aware Scalable Video Streaming To Multinetwork Clients
GJ092 Combined Optimal Control Of Activation And Transmission In Delay-
Tolerant Networks
GJ093 Quantifying And Verifying Reachability For Access Controlled Networks
GJ094 Model-Driven Optimization Of Opportunistic Routing
GJ095
ABC: Adaptive Binary Cuttings For Multidimensional Packet Classification
GJ096 Localization Of Wireless Sensor Networks In The Wild: Pursuit Of Ranging
Quality
GJ097 Combined Optimal Control Of Activation And Transmission In Delay-
Tolerant Networks
GJ098 Answering “What-If” Deployment and Configuration Questions With
WISE: Techniques and Deployment Experience
GJ099 A Distributed Control Law for Load Balancing in Content Delivery
Networks
8. GJ100 Stochastic Game for Wireless Network Virtualization
GJ101 A Utility Maximization Framework for Fair and Efficient Multicasting in
Multicarrier Wireless Cellular Networks
GJ102 Achieving Efficient Flooding by Utilizing Link Correlation in Wireless
Sensor Networks
GJ103 Efficient Algorithms for Neighbor Discovery in Wireless Networks
GJ104 Diffusion Dynamics of Network Technologies With Bounded Rational
Users: Aspiration-Based Learning
GJ105 Tiered Authentication Of Multicast Protocol For Ad-Hoc Networks
GJ106 Static Routing and Wavelength Assignment for Multicast Advance Reservation in
All-Optical Wavelength-Routed WDM Networks
GJ107 Independent Directed Acyclic Graphs for Resilient Multipath Routing
NETWORK SECUIRITY
GJ121 To Lie Or To Comply: Defending Against Flood Attacks In Disruption
Tolerant Networks
GJ122 Non-Cooperative Location Privacy
GJ123 Predicting Architectural Vulnerability On Multithreaded Processors Under
Resource Contention And Sharing
GJ124 SORT: A Self-Organizing Trust Model For Peer-To-Peer Systems
GJ125 On Inference-Proof View Processing of XML Documents
GJ126
Data-Provenance Verification For Secure Hosts
GJ127
On the Security and Efficiency of Content Distribution via Network Coding
GJ128
Packet-Hiding Methods for Preventing Selective Jamming Attacks
GJ129
Security Analysis and Implementation of 3-Level Security System Using
Image Based Authentication
9. SOFTWARE ENGINEERING
GJ141 Locating Need-To-Externalize Constant Strings For Software
Internationalization With Generalized String-Taint Analysis
GJ142 Proactive And Reactive Runtime Service Discovery A Framework And Its
Evaluation
GJ143 Synthesizing Modal Transition Systems From Triggered Scenarios
GJ144 Trustrace Mining Software Repositories To Improve The Accuracy Of
Requirement Traceability Links
GJ145 Using Timed Automata For Modeling Distributed Systems With Clocks
Challenges And Solutions
GJ145 Validating Second-Order Mutation At System Level
GJ146 Verifying Linearizability Via Optimized Refinement Checking
GJ147 Perfomance Specification and Evaluation with Unifies Stochastic Probes and
Fluid Anlaysis