SlideShare a Scribd company logo
1 of 10
Download to read offline
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
2013 - 2014 IEEE Projects
ANDROID
1) OSA1301 - T-Drive: Enhancing Driving Directions with Taxi Driversโ€™ Intelligence
2) OSA1302 - Dynamic Personalized Recommendation on Sparse Data
3) OSA1303 - Spatial Query Integrity with Voronoi Neighbours
4) OSA1304 - MeetYou -- Social Networking on Android
5) OSA1305 -A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile
Environments
6) OSA1306 - PMSE: A Personalized Mobile Search Engine
7) OSA1307 โ€“ Crowd-sourced Trace Similarity with Smartphones
8) OSA1308 - Twitsper: Tweeting Privately
9) OSA1309 - Review of Behaviour Malware Analysis for Android
10) OSA1310 - Research in Progress - Defending Android Smartphones from Malware Attacks
11) OSA1311 - Secure Encounter-based Mobile Social Networks: Requirements, Designs, and
Tradeoffs
12) OSA1312 - CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
13) OSA1313 - Collaborative Policy Administration
14) OSA1314 - SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for
Mobile-Healthcare Emergency
15) OSA1315- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
16) OSA1316 - Collaborative Learning Assistant for Android
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
2013 - 2014 IEEE Projects
JAVA
CLOUD COMPUTING
1) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing
Systems
2) CloudMoV: Cloud-based Mobile Social TV
3) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
4) Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
5) Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
6) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
7) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
8) Privacy-Preserving Public Auditing for Secure Cloud Storage
9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-
Based Encryption
10) Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
11) A Load Balancing Model Based on Cloud Partitioning for the
Public Cloud
12) Load Rebalancing for Distributed File Systems in Clouds
13) Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
14) Privacy Preserving Delegated Access Control in Public Clouds
15) Attribute-Based Encryption with Verifiable Outsourced Decryption
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
KNOWLEDGE AND DATA ENGINEERING:
16) A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
17) A New Algorithm for Inferring User Search Goals with Feedback Sessions
18) Annotating Search Results from Web Databases
19) Anomaly Detection via Online Over-Sampling Principal Component Analysis
20) Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
21) m-Privacy for Collaborative Data Publishing
22) Protecting Sensitive Labels in Social Network Data Anonymization
23) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
24) Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
25) A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse
Drug Reaction Signal Pairs
26) Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
27) Crowdsourcing Predictors of Behavioural Outcomes
28) Facilitating Document Annotation using Content and Querying Value
29) A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
30) A System to Filter Unwanted Messages from OSN User Walls
31) Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.
32) Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers
33) Spatial Approximate String Search
34) Preventing Private Information Inference Attacks on Social Networks
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
35) Multiparty Access Control for Online Social Networks Model and Mechanisms
36) Incentive Compatible Privacy-Preserving Data Analysis
SECURE COMPUTING:
37) EAACKโ€”A Secure Intrusion-Detection System for MANETs
38) Identity-Based Secure Distributed Data Storage Schemes
39) Modelling the Pairwise Key Redistribution Scheme in the Presence of Unreliable Links
40) NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
41) Privacy Preserving Data Sharing With Anonymous ID Assignment
42) Securing Class Initialization in Java-like Languages
43) Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
44) SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems
45) WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
46) Two tales of privacy in online social networks
47) Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
48) Twitsper: Tweeting Privately
49) Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
50) Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
NETWORKING:
51) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
52) Delay-Based Network Utility Maximization
53) Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
54) Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
55) On the Node Clone Detection in Wireless Sensor Networks
56) Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
57) Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
58) Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
59) Participatory Privacy: Enabling Privacy in Participatory Sensing
60) Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed
Networks
PARALLEL AND DISTRIBUTED SYSTEMS
61) A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
62) Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Scheme
63) IP-Geolocation Mapping for Moderately Connected Internet Regions
64) Optimal Client-Server Assignment for Internet Distributed Systems
65) SocialTube P2P-assisted Video Sharing in Online Social Networks
66) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
MOBILE COMPUTING:
67) Content Sharing over Smartphone-Based Delay-Tolerant Networks
68) DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless
Mobile Networks
69) Discovery and Verification of Neighbour Positions in Mobile Ad Hoc Networks
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
70) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile
Users
71) Toward a Statistical Framework for Source Anonymity in Sensor Networks
72) Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
73) Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
74) Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
PATTERN ANALYSIS AND MACHINE INTELLIGENCE:
75) A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare
Data
SERVICES COMPUTING:
76) A Decentralized Service Discovery Approach on Peer-to-Peer Networks
77) Personalized QoS-Aware Web Service Recommendation and Visualization
78) Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERING:
79) Whole Test Suite Generation
MULTIMEDIA:
80) Understanding the External Links of Video Sharing Sites: Measurement and Analysis
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
******************
DOT NET
CLOUD COMPUTING:
1) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
2) An Adaptive Cloud Downloading Service
3) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
4) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
5) On Data Staging Algorithms for Shared Data Accesses in Clouds
6) Optimal Multi-server Configuration for Profit Maximization in Cloud Computing
7) Privacy-Preserving Public Auditing for Secure Cloud Storage
8) QoS Ranking Prediction for Cloud Services
9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-
Based Encryption
10) Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud
Computing Systems
11) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
12) A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
13) Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
14) CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
15) Privacy Preserving Delegated Access Control in Public Clouds
16) Dynamic Audit Services for Outsourced Storages in Clouds
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
KNOWLEDGE AND DATA ENGINEERING:
17) A New Algorithm for Inferring User Search Goals with Feedback Sessions
18) A Survey of XML Tree Patterns
19) Dynamic Personalized Recommendation on Sparse Data
20) Mining User Queries with Markov Chains: Application to Online Image Retrieval
21) TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
22) A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile
Environments
23) Supporting Search-As-You-Type Using SQL in Databases
24) Secure Mining of Association Rules in Horizontally Distributed Databases
SECURE COMPUTING:
25) A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
26) EAACKโ€”A Secure Intrusion-Detection System for MANETs
27) Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Sharing
28) Modelling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
29) Privacy Preserving Data Sharing With Anonymous ID Assignment
30) SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
NETWORKING:
31) A Distributed Control Law for Load Balancing in Content Delivery Networks
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
32) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
33) An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
34) BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETโ€™s City Environments
35) Efficient Algorithms for Neighbour Discovery in Wireless Networks
36) Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
37) Resource Allocation for QoS Support in Wireless Mesh Networks
38) A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless
Networks With Order-Optimal Per-Flow Delay
PARALLEL AND DISTRIBUTED SYSTEMS:
39) A Secure Payment Scheme with Low Communication and Processing Overhead for Multi-hop
Wireless Networks
40) Multicast Capacity in MANET with Infrastructure Support
41) SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
42) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
43) Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
44) A Probabilistic Misbehaviour Detection Scheme towards Efficient Trust Establishment in Delay-
tolerant Networks
45) Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor
Networks
MOBILE COMPUTING:
46) Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
47) Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game
Approach
48) EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
49) Optimal Multicast Capacity and Delay Trade-offs in MANETs
50) Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
51) A Neighbour Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in
Mobile Ad Hoc Networks
52) Network-Assisted Mobile Computing with Optimal Uplink Query Processing
53) Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
54) On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
55) Toward Accurate Mobile Sensor Network Localization in Noisy Environments
IMAGE PROCESSING:
56) Query-Adaptive Image Search with Hash Codes
57) Reversible Data Hiding With Optimal Value Transfer
58) Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram
Shifting
59) Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
60) Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage
SERVICE COMPUTING (WEB SERVICE):
61) Cost-Based Optimization of Service Compositions
62) Evolution of Social Networks Based on Tagging Practices
MULTIMEDIA:
63) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.

More Related Content

What's hot

Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14
MSR PROJECTS
ย 

What's hot (15)

IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
ย 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
ย 
2014 list
2014 list2014 list
2014 list
ย 
Ieee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projectsIeee 2014 completd dotnet java projects
Ieee 2014 completd dotnet java projects
ย 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14
ย 
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
ย 
IEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for meIEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for me
ย 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects list
ย 
Projecttitles 2013
Projecttitles 2013Projecttitles 2013
Projecttitles 2013
ย 
2015 ieee projects in bangalore
2015 ieee projects in bangalore2015 ieee projects in bangalore
2015 ieee projects in bangalore
ย 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects
ย 
Pvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titlesPvr technologies 2013 java ieee project titles
Pvr technologies 2013 java ieee project titles
ย 
Ieee 2014 projects
Ieee 2014 projectsIeee 2014 projects
Ieee 2014 projects
ย 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14
ย 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final list
ย 

Viewers also liked

2016 BN marking criteria Emily Assign 1 ethics (1)
2016 BN marking criteria Emily Assign 1 ethics (1)2016 BN marking criteria Emily Assign 1 ethics (1)
2016 BN marking criteria Emily Assign 1 ethics (1)
Emily Bishop
ย 
PORNPAT KHAWUBON CV Update 17042016
PORNPAT KHAWUBON CV Update 17042016PORNPAT KHAWUBON CV Update 17042016
PORNPAT KHAWUBON CV Update 17042016
PORNPAT KHAWUBON
ย 
Educaรงรฃo e comunicaรงรฃo: do mundo editado รก construรงรฃo do mundo
Educaรงรฃo e comunicaรงรฃo: do  mundo editado รก construรงรฃo  do mundoEducaรงรฃo e comunicaรงรฃo: do  mundo editado รก construรงรฃo  do mundo
Educaรงรฃo e comunicaรงรฃo: do mundo editado รก construรงรฃo do mundo
Tharley Cortes Freitas
ย 
Skype
SkypeSkype
Skype
nathyele15
ย 
IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...
IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...
IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...
Tharley Cortes Freitas
ย 
credit-suisse Quarterly Report Q2/2003
credit-suisse Quarterly Report Q2/2003credit-suisse Quarterly Report Q2/2003
credit-suisse Quarterly Report Q2/2003
QuarterlyEarningsReports2
ย 
Presentacion Completa
Presentacion CompletaPresentacion Completa
Presentacion Completa
guestd35dd1
ย 

Viewers also liked (20)

William Ebenezer Fleming
William Ebenezer FlemingWilliam Ebenezer Fleming
William Ebenezer Fleming
ย 
2016 BN marking criteria Emily Assign 1 ethics (1)
2016 BN marking criteria Emily Assign 1 ethics (1)2016 BN marking criteria Emily Assign 1 ethics (1)
2016 BN marking criteria Emily Assign 1 ethics (1)
ย 
PORNPAT KHAWUBON CV Update 17042016
PORNPAT KHAWUBON CV Update 17042016PORNPAT KHAWUBON CV Update 17042016
PORNPAT KHAWUBON CV Update 17042016
ย 
Presentasi tortor batak sorimangaraja
Presentasi tortor batak sorimangarajaPresentasi tortor batak sorimangaraja
Presentasi tortor batak sorimangaraja
ย 
Educaรงรฃo e comunicaรงรฃo: do mundo editado รก construรงรฃo do mundo
Educaรงรฃo e comunicaรงรฃo: do  mundo editado รก construรงรฃo  do mundoEducaรงรฃo e comunicaรงรฃo: do  mundo editado รก construรงรฃo  do mundo
Educaรงรฃo e comunicaรงรฃo: do mundo editado รก construรงรฃo do mundo
ย 
Skype
SkypeSkype
Skype
ย 
18 Death Note
18 Death Note18 Death Note
18 Death Note
ย 
Biomedical Research as an Open Digital Enterprise
Biomedical Research as an Open Digital EnterpriseBiomedical Research as an Open Digital Enterprise
Biomedical Research as an Open Digital Enterprise
ย 
IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...
IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...
IMPORTร‚NCIA E PERSPECTIVAS DA รREA DE NOVAS LINGUAGENS COMUNIACIONAIS E TECNO...
ย 
Igor Ansoff presented a matrix that focused on the firm's present and potent...
 Igor Ansoff presented a matrix that focused on the firm's present and potent... Igor Ansoff presented a matrix that focused on the firm's present and potent...
Igor Ansoff presented a matrix that focused on the firm's present and potent...
ย 
credit-suisse Quarterly Report Q2/2003
credit-suisse Quarterly Report Q2/2003credit-suisse Quarterly Report Q2/2003
credit-suisse Quarterly Report Q2/2003
ย 
Barcelo Vuelta al Mundo
Barcelo Vuelta al MundoBarcelo Vuelta al Mundo
Barcelo Vuelta al Mundo
ย 
08 Death Note
08 Death Note08 Death Note
08 Death Note
ย 
13 Death Note
13 Death Note13 Death Note
13 Death Note
ย 
Page frame management
Page frame managementPage frame management
Page frame management
ย 
Enquanto houver sol
Enquanto houver solEnquanto houver sol
Enquanto houver sol
ย 
Trabajo final powerpoint
Trabajo final powerpointTrabajo final powerpoint
Trabajo final powerpoint
ย 
IEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
IEEE 2014 java and android BE, MCA, ME Computer Engineering ProjectsIEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
IEEE 2014 java and android BE, MCA, ME Computer Engineering Projects
ย 
Happyco Products Results (Rus)
Happyco Products Results (Rus)Happyco Products Results (Rus)
Happyco Products Results (Rus)
ย 
Presentacion Completa
Presentacion CompletaPresentacion Completa
Presentacion Completa
ย 

Similar to IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

FINAL YEAR PROJECTS FOR CSE 2013-2014
FINAL YEAR PROJECTS  FOR CSE 2013-2014FINAL YEAR PROJECTS  FOR CSE 2013-2014
FINAL YEAR PROJECTS FOR CSE 2013-2014
onepointer
ย 
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSE
onepointer
ย 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
Bhavanislide2
ย 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
Bhavanislide2
ย 
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSE
onepointer
ย 
FINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEFINAL PROJECT FOR ECE
FINAL PROJECT FOR ECE
onepointer
ย 
FINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESFINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLES
onepointer
ย 
2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
Focuz Technologies
ย 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
JPINFOTECH JAYAPRAKASH
ย 

Similar to IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma (20)

FINAL YEAR PROJECTS FOR CSE 2013-2014
FINAL YEAR PROJECTS  FOR CSE 2013-2014FINAL YEAR PROJECTS  FOR CSE 2013-2014
FINAL YEAR PROJECTS FOR CSE 2013-2014
ย 
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSE
ย 
Java IEEE 2013 Projects list
Java IEEE 2013 Projects list Java IEEE 2013 Projects list
Java IEEE 2013 Projects list
ย 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
ย 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
ย 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
ย 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
ย 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
ย 
FINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSEFINAL YEAR PROJECTS FOR CSE
FINAL YEAR PROJECTS FOR CSE
ย 
FINAL PROJECT FOR ECE
FINAL PROJECT FOR ECEFINAL PROJECT FOR ECE
FINAL PROJECT FOR ECE
ย 
FINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLESFINAL YEAR PROJECT TITLES
FINAL YEAR PROJECT TITLES
ย 
Php 2014 Projects_ S3 Infotech:09884848198.
Php  2014 Projects_ S3 Infotech:09884848198.Php  2014 Projects_ S3 Infotech:09884848198.
Php 2014 Projects_ S3 Infotech:09884848198.
ย 
E2matrix
E2matrixE2matrix
E2matrix
ย 
Global tech project list
Global tech project listGlobal tech project list
Global tech project list
ย 
Java IEEE Projects 2012-2011-2010
Java IEEE Projects 2012-2011-2010Java IEEE Projects 2012-2011-2010
Java IEEE Projects 2012-2011-2010
ย 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
ย 
2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
ย 
2012 ieeeproject titles
2012 ieeeproject titles2012 ieeeproject titles
2012 ieeeproject titles
ย 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
ย 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
ย 

More from Adz91 Digital Ads Pvt Ltd

Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Adz91 Digital Ads Pvt Ltd
ย 

More from Adz91 Digital Ads Pvt Ltd (20)

2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
ย 
Java project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsJava project ideas topics for computer engineering students
Java project ideas topics for computer engineering students
ย 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
ย 
Adz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 business opportunity presentation
Adz91 business opportunity presentation
ย 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
ย 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
ย 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy
ย 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
ย 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
ย 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
ย 
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
ย 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
ย 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
ย 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
ย 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
ย 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation
ย 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
ย 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
ย 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
ย 
Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...
ย 

Recently uploaded

Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
amitlee9823
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
ย 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort ServiceCall Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
Call Girls in Ramesh Nagar Delhi ๐Ÿ’ฏ Call Us ๐Ÿ”9953056974 ๐Ÿ” Escort Service
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
ย 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
ย 
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night StandCall Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
Call Girls In Bangalore โ˜Ž 7737669865 ๐Ÿฅต Book Your One night Stand
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
ย 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
ย 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 

IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma

  • 1. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 2013 - 2014 IEEE Projects ANDROID 1) OSA1301 - T-Drive: Enhancing Driving Directions with Taxi Driversโ€™ Intelligence 2) OSA1302 - Dynamic Personalized Recommendation on Sparse Data 3) OSA1303 - Spatial Query Integrity with Voronoi Neighbours 4) OSA1304 - MeetYou -- Social Networking on Android 5) OSA1305 -A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 6) OSA1306 - PMSE: A Personalized Mobile Search Engine 7) OSA1307 โ€“ Crowd-sourced Trace Similarity with Smartphones 8) OSA1308 - Twitsper: Tweeting Privately 9) OSA1309 - Review of Behaviour Malware Analysis for Android 10) OSA1310 - Research in Progress - Defending Android Smartphones from Malware Attacks 11) OSA1311 - Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs 12) OSA1312 - CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 13) OSA1313 - Collaborative Policy Administration 14) OSA1314 - SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 15) OSA1315- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption 16) OSA1316 - Collaborative Learning Assistant for Android
  • 2. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 2013 - 2014 IEEE Projects JAVA CLOUD COMPUTING 1) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2) CloudMoV: Cloud-based Mobile Social TV 3) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 4) Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 5) Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 6) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 7) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 8) Privacy-Preserving Public Auditing for Secure Cloud Storage 9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 10) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 11) A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 12) Load Rebalancing for Distributed File Systems in Clouds 13) Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 14) Privacy Preserving Delegated Access Control in Public Clouds 15) Attribute-Based Encryption with Verifiable Outsourced Decryption
  • 3. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 KNOWLEDGE AND DATA ENGINEERING: 16) A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data 17) A New Algorithm for Inferring User Search Goals with Feedback Sessions 18) Annotating Search Results from Web Databases 19) Anomaly Detection via Online Over-Sampling Principal Component Analysis 20) Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 21) m-Privacy for Collaborative Data Publishing 22) Protecting Sensitive Labels in Social Network Data Anonymization 23) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development 24) Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection 25) A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs 26) Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 27) Crowdsourcing Predictors of Behavioural Outcomes 28) Facilitating Document Annotation using Content and Querying Value 29) A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 30) A System to Filter Unwanted Messages from OSN User Walls 31) Anonymization of Centralized and Distributed Social Networks by Sequential Clustering. 32) Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers 33) Spatial Approximate String Search 34) Preventing Private Information Inference Attacks on Social Networks
  • 4. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 35) Multiparty Access Control for Online Social Networks Model and Mechanisms 36) Incentive Compatible Privacy-Preserving Data Analysis SECURE COMPUTING: 37) EAACKโ€”A Secure Intrusion-Detection System for MANETs 38) Identity-Based Secure Distributed Data Storage Schemes 39) Modelling the Pairwise Key Redistribution Scheme in the Presence of Unreliable Links 40) NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 41) Privacy Preserving Data Sharing With Anonymous ID Assignment 42) Securing Class Initialization in Java-like Languages 43) Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 44) SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems 45) WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream 46) Two tales of privacy in online social networks 47) Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs 48) Twitsper: Tweeting Privately 49) Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks 50) Cross-Domain Privacy-Preserving Cooperative Firewall Optimization NETWORKING: 51) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 52) Delay-Based Network Utility Maximization 53) Dynamic Control of Coding for Progressive Packet Arrivals in DTNs 54) Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
  • 5. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 55) On the Node Clone Detection in Wireless Sensor Networks 56) Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power 57) Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks 58) Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm 59) Participatory Privacy: Enabling Privacy in Participatory Sensing 60) Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks PARALLEL AND DISTRIBUTED SYSTEMS 61) A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation 62) Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme 63) IP-Geolocation Mapping for Moderately Connected Internet Regions 64) Optimal Client-Server Assignment for Internet Distributed Systems 65) SocialTube P2P-assisted Video Sharing in Online Social Networks 66) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis MOBILE COMPUTING: 67) Content Sharing over Smartphone-Based Delay-Tolerant Networks 68) DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks 69) Discovery and Verification of Neighbour Positions in Mobile Ad Hoc Networks
  • 6. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 70) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users 71) Toward a Statistical Framework for Source Anonymity in Sensor Networks 72) Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks 73) Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks 74) Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System PATTERN ANALYSIS AND MACHINE INTELLIGENCE: 75) A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data SERVICES COMPUTING: 76) A Decentralized Service Discovery Approach on Peer-to-Peer Networks 77) Personalized QoS-Aware Web Service Recommendation and Visualization 78) Privacy-Enhanced Web Service Composition SOFTWARE ENGINEERING: 79) Whole Test Suite Generation MULTIMEDIA: 80) Understanding the External Links of Video Sharing Sites: Measurement and Analysis
  • 7. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 ****************** DOT NET CLOUD COMPUTING: 1) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud 2) An Adaptive Cloud Downloading Service 3) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 4) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 5) On Data Staging Algorithms for Shared Data Accesses in Clouds 6) Optimal Multi-server Configuration for Profit Maximization in Cloud Computing 7) Privacy-Preserving Public Auditing for Secure Cloud Storage 8) QoS Ranking Prediction for Cloud Services 9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute- Based Encryption 10) Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems 11) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data 12) A Log-based Approach to Make Digital Forensics Easier on Cloud Computing 13) Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks 14) CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud 15) Privacy Preserving Delegated Access Control in Public Clouds 16) Dynamic Audit Services for Outsourced Storages in Clouds
  • 8. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 KNOWLEDGE AND DATA ENGINEERING: 17) A New Algorithm for Inferring User Search Goals with Feedback Sessions 18) A Survey of XML Tree Patterns 19) Dynamic Personalized Recommendation on Sparse Data 20) Mining User Queries with Markov Chains: Application to Online Image Retrieval 21) TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality 22) A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 23) Supporting Search-As-You-Type Using SQL in Databases 24) Secure Mining of Association Rules in Horizontally Distributed Databases SECURE COMPUTING: 25) A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. 26) EAACKโ€”A Secure Intrusion-Detection System for MANETs 27) Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 28) Modelling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links 29) Privacy Preserving Data Sharing With Anonymous ID Assignment 30) SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems NETWORKING: 31) A Distributed Control Law for Load Balancing in Content Delivery Networks
  • 9. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 32) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks 33) An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks 34) BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETโ€™s City Environments 35) Efficient Algorithms for Neighbour Discovery in Wireless Networks 36) Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality 37) Resource Allocation for QoS Support in Wireless Mesh Networks 38) A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay PARALLEL AND DISTRIBUTED SYSTEMS: 39) A Secure Payment Scheme with Low Communication and Processing Overhead for Multi-hop Wireless Networks 40) Multicast Capacity in MANET with Infrastructure Support 41) SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 42) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 43) Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks 44) A Probabilistic Misbehaviour Detection Scheme towards Efficient Trust Establishment in Delay- tolerant Networks 45) Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor Networks MOBILE COMPUTING: 46) Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
  • 10. info@ocularsystems.in www.ocularsystems.in +91 9970186685 +91-7385043047 47) Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach 48) EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 49) Optimal Multicast Capacity and Delay Trade-offs in MANETs 50) Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks 51) A Neighbour Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks 52) Network-Assisted Mobile Computing with Optimal Uplink Query Processing 53) Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 54) On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks 55) Toward Accurate Mobile Sensor Network Localization in Noisy Environments IMAGE PROCESSING: 56) Query-Adaptive Image Search with Hash Codes 57) Reversible Data Hiding With Optimal Value Transfer 58) Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting 59) Local Directional Number Pattern for Face Analysis: Face and Expression Recognition 60) Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage SERVICE COMPUTING (WEB SERVICE): 61) Cost-Based Optimization of Service Compositions 62) Evolution of Social Networks Based on Tagging Practices MULTIMEDIA: 63) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.