The document lists over 60 projects related to various topics including Android, Java, cloud computing, knowledge and data engineering, secure computing, networking, parallel and distributed systems, mobile computing, image processing, service computing, and multimedia. The projects involve developing applications and conducting research related to topics such as recommendation systems, location services, social networks, healthcare, cryptography, and more.
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย
IEEE projects java and dotnet for BE BTECH ME MTECH MCA MCS Diploma
1. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
2013 - 2014 IEEE Projects
ANDROID
1) OSA1301 - T-Drive: Enhancing Driving Directions with Taxi Driversโ Intelligence
2) OSA1302 - Dynamic Personalized Recommendation on Sparse Data
3) OSA1303 - Spatial Query Integrity with Voronoi Neighbours
4) OSA1304 - MeetYou -- Social Networking on Android
5) OSA1305 -A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile
Environments
6) OSA1306 - PMSE: A Personalized Mobile Search Engine
7) OSA1307 โ Crowd-sourced Trace Similarity with Smartphones
8) OSA1308 - Twitsper: Tweeting Privately
9) OSA1309 - Review of Behaviour Malware Analysis for Android
10) OSA1310 - Research in Progress - Defending Android Smartphones from Malware Attacks
11) OSA1311 - Secure Encounter-based Mobile Social Networks: Requirements, Designs, and
Tradeoffs
12) OSA1312 - CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
13) OSA1313 - Collaborative Policy Administration
14) OSA1314 - SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for
Mobile-Healthcare Emergency
15) OSA1315- Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption
16) OSA1316 - Collaborative Learning Assistant for Android
2. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
2013 - 2014 IEEE Projects
JAVA
CLOUD COMPUTING
1) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing
Systems
2) CloudMoV: Cloud-based Mobile Social TV
3) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
4) Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
5) Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
6) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
7) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
8) Privacy-Preserving Public Auditing for Secure Cloud Storage
9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-
Based Encryption
10) Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
11) A Load Balancing Model Based on Cloud Partitioning for the
Public Cloud
12) Load Rebalancing for Distributed File Systems in Clouds
13) Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
14) Privacy Preserving Delegated Access Control in Public Clouds
15) Attribute-Based Encryption with Verifiable Outsourced Decryption
3. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
KNOWLEDGE AND DATA ENGINEERING:
16) A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
17) A New Algorithm for Inferring User Search Goals with Feedback Sessions
18) Annotating Search Results from Web Databases
19) Anomaly Detection via Online Over-Sampling Principal Component Analysis
20) Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
21) m-Privacy for Collaborative Data Publishing
22) Protecting Sensitive Labels in Social Network Data Anonymization
23) Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
24) Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
25) A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse
Drug Reaction Signal Pairs
26) Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
27) Crowdsourcing Predictors of Behavioural Outcomes
28) Facilitating Document Annotation using Content and Querying Value
29) A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
30) A System to Filter Unwanted Messages from OSN User Walls
31) Anonymization of Centralized and Distributed Social Networks by Sequential Clustering.
32) Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers
33) Spatial Approximate String Search
34) Preventing Private Information Inference Attacks on Social Networks
4. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
35) Multiparty Access Control for Online Social Networks Model and Mechanisms
36) Incentive Compatible Privacy-Preserving Data Analysis
SECURE COMPUTING:
37) EAACKโA Secure Intrusion-Detection System for MANETs
38) Identity-Based Secure Distributed Data Storage Schemes
39) Modelling the Pairwise Key Redistribution Scheme in the Presence of Unreliable Links
40) NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
41) Privacy Preserving Data Sharing With Anonymous ID Assignment
42) Securing Class Initialization in Java-like Languages
43) Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
44) SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems
45) WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
46) Two tales of privacy in online social networks
47) Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
48) Twitsper: Tweeting Privately
49) Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
50) Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
NETWORKING:
51) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
52) Delay-Based Network Utility Maximization
53) Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
54) Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
5. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
55) On the Node Clone Detection in Wireless Sensor Networks
56) Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
57) Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
58) Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
59) Participatory Privacy: Enabling Privacy in Participatory Sensing
60) Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed
Networks
PARALLEL AND DISTRIBUTED SYSTEMS
61) A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
62) Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Scheme
63) IP-Geolocation Mapping for Moderately Connected Internet Regions
64) Optimal Client-Server Assignment for Internet Distributed Systems
65) SocialTube P2P-assisted Video Sharing in Online Social Networks
66) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
MOBILE COMPUTING:
67) Content Sharing over Smartphone-Based Delay-Tolerant Networks
68) DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless
Mobile Networks
69) Discovery and Verification of Neighbour Positions in Mobile Ad Hoc Networks
6. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
70) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile
Users
71) Toward a Statistical Framework for Source Anonymity in Sensor Networks
72) Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
73) Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
74) Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
PATTERN ANALYSIS AND MACHINE INTELLIGENCE:
75) A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare
Data
SERVICES COMPUTING:
76) A Decentralized Service Discovery Approach on Peer-to-Peer Networks
77) Personalized QoS-Aware Web Service Recommendation and Visualization
78) Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERING:
79) Whole Test Suite Generation
MULTIMEDIA:
80) Understanding the External Links of Video Sharing Sites: Measurement and Analysis
7. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
******************
DOT NET
CLOUD COMPUTING:
1) A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy
Preserving of Intermediate Data Sets in Cloud
2) An Adaptive Cloud Downloading Service
3) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
4) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
5) On Data Staging Algorithms for Shared Data Accesses in Clouds
6) Optimal Multi-server Configuration for Profit Maximization in Cloud Computing
7) Privacy-Preserving Public Auditing for Secure Cloud Storage
8) QoS Ranking Prediction for Cloud Services
9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-
Based Encryption
10) Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud
Computing Systems
11) Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
12) A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
13) Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
14) CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
15) Privacy Preserving Delegated Access Control in Public Clouds
16) Dynamic Audit Services for Outsourced Storages in Clouds
8. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
KNOWLEDGE AND DATA ENGINEERING:
17) A New Algorithm for Inferring User Search Goals with Feedback Sessions
18) A Survey of XML Tree Patterns
19) Dynamic Personalized Recommendation on Sparse Data
20) Mining User Queries with Markov Chains: Application to Online Image Retrieval
21) TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
22) A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile
Environments
23) Supporting Search-As-You-Type Using SQL in Databases
24) Secure Mining of Association Rules in Horizontally Distributed Databases
SECURE COMPUTING:
25) A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
26) EAACKโA Secure Intrusion-Detection System for MANETs
27) Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information
Sharing
28) Modelling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
29) Privacy Preserving Data Sharing With Anonymous ID Assignment
30) SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
NETWORKING:
31) A Distributed Control Law for Load Balancing in Content Delivery Networks
9. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
32) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
33) An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
34) BAHG: Back-Bone-Assisted Hop Greedy Routing for VANETโs City Environments
35) Efficient Algorithms for Neighbour Discovery in Wireless Networks
36) Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
37) Resource Allocation for QoS Support in Wireless Mesh Networks
38) A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless
Networks With Order-Optimal Per-Flow Delay
PARALLEL AND DISTRIBUTED SYSTEMS:
39) A Secure Payment Scheme with Low Communication and Processing Overhead for Multi-hop
Wireless Networks
40) Multicast Capacity in MANET with Infrastructure Support
41) SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
42) Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
43) Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
44) A Probabilistic Misbehaviour Detection Scheme towards Efficient Trust Establishment in Delay-
tolerant Networks
45) Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor
Networks
MOBILE COMPUTING:
46) Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
10. info@ocularsystems.in www.ocularsystems.in
+91 9970186685 +91-7385043047
47) Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game
Approach
48) EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
49) Optimal Multicast Capacity and Delay Trade-offs in MANETs
50) Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
51) A Neighbour Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in
Mobile Ad Hoc Networks
52) Network-Assisted Mobile Computing with Optimal Uplink Query Processing
53) Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
54) On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
55) Toward Accurate Mobile Sensor Network Localization in Noisy Environments
IMAGE PROCESSING:
56) Query-Adaptive Image Search with Hash Codes
57) Reversible Data Hiding With Optimal Value Transfer
58) Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram
Shifting
59) Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
60) Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage
SERVICE COMPUTING (WEB SERVICE):
61) Cost-Based Optimization of Service Compositions
62) Evolution of Social Networks Based on Tagging Practices
MULTIMEDIA:
63) Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.