|  Home   |  Contact Us   |  Online Exam   |  Tech World   |  Jobs    |  Member Login
 Home | IEEE-2014 Java Projects  |  IEEE-2014 Dotnet Projects  |  IEEE-2012 PHP projects
   IEEE-2013 Dotnet Projects | Application Projects | Mini projects | IEEE-2012 JAVA Projects
   |  IEEE-2012 Dotenet Projects    | IEEE-2013 JAVA Projects With Android
               Download          Output

Reference for students projects only - B.Sc,BCA,M.Sc,MCA,B.E,B.Tech,M.E,M.Tech
MOBILE COMPUTING - WIRELESS COMMUNICATIONS
1. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks.

      Mech : "Optimal Mobile Relay Configuration"

    View :Abstract Basepaper                
2. Vampire attacks:Draining life from wireless ad-hoc sensor networks.

    View :Abstract Basepaper                
3. Towards a Statistical Framework for Source Anonymity in Sensor Networks.

      Alg : "AR and AF"

    View :Abstract Basepaper                
4. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications.

      Phase 2 : "Scalable Mobile PresenceCloud with Communication Security"

      Alg : "Directed Buddy Search Algorithm"

    View :Abstract Basepaper                
5. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks.

      Phase 2 : "FindU : Profile Matching in Ssecure Multi-party Computation (SMC)"

      Alg : "Shamir secret sharing scheme Algorithm"

    View :Abstract Basepaper                
6. Distributed Cooperative Caching in Social Wireless Networks.

      Alg : "Split Cache object replacement policy,A distributed heuristic for object replacement in SWNETs"

    View :Abstract Basepaper                
7. Community-Aware Opportunistic Routing in Mobile Social Networks.

      Alg : "Community-Aware Opportunistic Routing (CAOR) algorithm "

    View :Abstract Basepaper                
8. Search Me If You Can Privacy-preserving Location Query Service.

    View :Abstract Basepaper                
9. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks.

    View :Abstract Basepaper                
10. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users.

    View :Abstract Basepaper                
SOFTWARE ENGINEERING
11. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud.

    View :Abstract Basepaper                
NETWORKING
12. Cross-Domain Privacy-Preserving Protocol for Cooperative Firewall Optimization.

    View :Abstract Basepaper                
13. Price Differentiation for Communication Networks.

    View :Abstract Basepaper                
14. Fault Node Recovery Algorithm for a Wireless Sensor Network.

    View :Abstract Basepaper                
15. On the Role of Mobility for Multi-message Gossip.

    View :Abstract Basepaper                
16. Topological Conditions for In-Network Stabilization of Dynamical Systems.

    View :Abstract Basepaper                
17. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks.

    View :Abstract Basepaper                
18. Participatory Privacy Enabling Privacy in Participatory Sensing.

      Mech : "Participatory Privacy"

    View :Abstract Basepaper                
19. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.

    View :Abstract Basepaper                
20. Access Policy Consolidation for Event Processing Systems.

    View :Abstract Basepaper                
21. Fully Anonymous Profile Matching in Mobile Social Networks.

      Phase 2 : "Secure and Logical Multiparty Computation (SMC) Profile Matching"

      Alg : "Homomorphic Encryption"

    View :Abstract Basepaper                
22. A Fast Re-Route Method.

    View :Abstract Basepaper                
23. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.

    View :Abstract Basepaper                
24. Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud Computing.

    View :Abstract Basepaper                
25. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks.

    View :Abstract Basepaper                
26. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility.

    View :Abstract Basepaper                
IMAGE PROCESSING - MULTIMEDIA
27. An Adaptive Cloud Downloading Service.

    View :Abstract Basepaper                
28. Understanding the External Links of Video Sharing Sites Measurement and Analysis.

    View :Abstract Basepaper                
29. Circular Reranking for Visual Search.

    View :Abstract Basepaper                
30. Super-Resolution-based Inpainting.

    View :Abstract Basepaper                
31. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.

      Alg : "Answer medium selection"

    View :Abstract Basepaper                
32. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords.

    View :Abstract Basepaper                
33. Bootstrapping Visual Categorization With Relevant Negatives.

    View :Abstract Basepaper                
34. An extended visual cryptography scheme without pixel expansion for halftone images.

    View :Abstract Basepaper                
35. Image Authentication Using Stochastic Diffusion.

    View :Abstract Basepaper                
36. Hierarchical Super-Resolution-Based Inpainting.

    View :Abstract Basepaper                
SECURE COMPUTING
37. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.

      Mech : "Branching program"

    View :Abstract Basepaper                
38.Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.

      Phase 2 : "MeetUp : Framework for constructing encounter-based social networks"

      Alg : "rusted Certification"

    View :Abstract Basepaper                
39.Two tales of privacy in online social networks.

      Mech : "surveillance problem,social privacy,institutional privacy"

    View :Abstract Basepaper                
40.Extracting Spread-Spectrum Hidden Data from Digital Media.

      Mech : "Multi-carrier spread-spectrum embedding,Steganography"

    View :Abstract Basepaper                
41.Utility-Privacy Tradeoff in Databases An Information-theoretic Approach.

      Mech : "Encryption & Decryption Algorithm"

    View :Abstract Basepaper                
42.TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensing.

      Alg : "Trajectory Graph Construction,Weight Construction Algorithm "

    View :Abstract Basepaper                
43. Craigslist Scams and Community Composition Investigating Online Fraud Victimization.

    View :Abstract Basepaper                
44. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.

    View :Abstract Basepaper                
45. SORT A Self-ORganizing Trust Model for Peer-to-Peer Systems.

    View :Abstract Basepaper                
46. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model.

    View :Abstract Basepaper                
47. NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.

    View :Abstract Basepaper                
48. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data.

    View :Abstract Basepaper                
49. Efficiently Outsourcing Multiparty Computation under Multiple Keys.

    View :Abstract Basepaper                
50. Security Using Colors and Armstrong Numbers.

    View :Abstract Basepaper                
51. Document Clustering for Forensic Analysis An Approach for Improving Computer Inspection.

    View :Abstract Basepaper                
52. On Inference-Proof View Processing of XML Documents.

    View :Abstract Basepaper                
53. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme.

    View :Abstract Basepaper                
54. Privacy Preserving Data Analytics for Smart Homes.

    View :Abstract Basepaper                
55. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis.

    View :Abstract Basepaper                
56. Security and Privacy-Enhancing Multicloud Architectures.

    View :Abstract Basepaper                
CLOUD COMPUTING

For Abstract & Basepaper Mail Us : chennaisunday@gmail.com
57.Efficient Security Solution for Privacy-Preserving Cloud Services.

    View :Abstract Basepaper                
58.Storing Shared Data on the Cloud via Security-Mediator.

    View :Abstract Basepaper                
59.Fault Tolerance Management in Cloud Computing A System-Level Perspective.

    View :Abstract Basepaper                
60.Supporting the Migration of Applications to the Cloud through a Decision Support System.

    View :Abstract Basepaper                
61.CloudFTP A Case Study of Migrating Traditional Applications to the Cloud.

    View :Abstract Basepaper                
62.A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT.

    View :Abstract Basepaper                
63.Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme.

    View :Abstract Basepaper                
64.Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.

    View :Abstract Basepaper                
65.A Log-based Approach to Make Digital Forensics Easier on Cloud Computing.

    View :Abstract Basepaper                
66.A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud.

    View :Abstract Basepaper                
67. Outsourcing Privacy-Preserving Social Networks to a Cloud.

    View :Abstract Basepaper                
68.Privacy-Preserving Public Auditing for Secure Cloud Storage.

    View :Abstract Basepaper                
69.Winds of Change From Vendor Lock-In to the Meta Cloud.

      Mech : "Migration From Cloud Service Provider To Another From Identifying Cheats Of Provider"

    View :Abstract Basepaper                
70.Cloud computing for mobile users can offloading compution save energy.

      Phase 2 : "Cloud based Energy Saving for Mobil User"

    View :Abstract Basepaper                
71.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.

      Alg : "SVC Algorithm"

    View :Abstract Basepaper                
72.Mining Contracts for Business Events and Temporal Constraints in Service Engagements.

      Phase 2 : "Knowledge Based Business Service Engagement Identification (KBS)"

      Alg : "Grammar Tree Pruning"

    View :Abstract Basepaper                
73.Collaboration in Multicloud Computing Environments: Framework and Security Issues.

      Phase 2 : “Proxy based Dynamic Data Outsourcing Multi clouds”

      Alg : "Geometric Data Perturbation"

    View :Abstract Basepaper                
PARALLEL AND DISTRIBUTED SYSTEMS
74. Message in a Sealed Bottle Privacy Preserving Friending in Social Networks.

    View :Abstract Basepaper                
75. Label-Embedding for Attribute-Based Classification.

    View :Abstract Basepaper                
76. Hint-based Execution of Workloads in Clouds with Nefeli.

    View :Abstract Basepaper                
77. Load Rebalancing for Distributed File Systems in Clouds.

    View :Abstract Basepaper                
78.QoS Ranking Prediction for Cloud Services.

    View :Abstract Basepaper                
79. IP-Geolocation Mapping for Moderately Connected Internet Regions.

    View :Abstract Basepaper                
80. Identity-Based Secure Distributed Data Storage Schemes.

    View :Abstract Basepaper                
81. Efficient Two-Server Password-Only Authenticated Key Exchange.

    View :Abstract Basepaper                
82. SocialTube P2P-assisted Video Sharing in Online Social Networks.

    View :Abstract Basepaper                
83. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System.

    View :Abstract Basepaper                
84. Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.

    View :Abstract Basepaper                
85. Priority-Based Consolidation of Parallel Workloads in the Cloud.

    View :Abstract Basepaper                
86. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.

    View :Abstract Basepaper                
87. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing.

    View :Abstract Basepaper                
88. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.

      Phase 2 : "Cost effective Privacy preserving for intermediate datasets on Cloud"

      Alg : "practical heuristic algorithm"

    View :Abstract Basepaper                
89. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment.

      Phase 2 : "Cloud on Dynamic Virtual Resource Allocation"

      Alg : "Skewness"

    View :Abstract Basepaper                
90. Towards Differential Query Services in Cost-Efficient Clouds.

      Mech : "Efficient Information Retrieval for Ranked Query (EIRQ),Aggregation and Distribution Layer (ADL)"

    View :Abstract Basepaper                
91. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks.

      Alg : "Static Route Algorithm"

    View :Abstract Basepaper                
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
92. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

      Alg : "Fast clustering-based feature selection algorithm"

    View :Abstract Basepaper                
93. CloudMoV: Cloud-based Mobile Social TV

    View :Abstract Basepaper                
94. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks

    View :Abstract Basepaper                
95.m-Privacy for Collaborative Data Publishing

      Alg : "Provider-Aware Algorithm"

    View :Abstract Basepaper                
96. Crowdsourcing Predictors of Behavioral Outcomes.

      Phase 2 : "Internet-based collaborative activity"

      Alg : "Crowdsourcing"

    View :Abstract Basepaper                
97. Spatial Approximate String Search.

      Alg : "Novel Adaptive Algorithm"

    View :Abstract Basepaper                
98. Facilitating Document Annotation Using Content And Querying Value.

      Mech : "Information Extraction"

    View :Abstract Basepaper                
99.Incentive Compatible Privacy-Preserving Data Analysis.

      Mech : "Key theorems,Association Rule Mining"

    View :Abstract Basepaper                
100.FoCUS Learning to Crawl Web Forums.

      Alg : "Index/thread URL detection,Page-flipping URL detection"

    View :Abstract Basepaper                
101.ROBUST MODULE BASED DATA MANAGEMENT.

      Mech : "Novel properties of robustness"

    View :Abstract Basepaper                
102.A Probabilistic Approach to String Transformation.

      Alg : "Aho-Corasick"

    View :Abstract Basepaper                
103.Comparable Entity Mining from Comparative Questions.

      Alg : "Bootstrapping algorithm"

    View :Abstract Basepaper                
104.Facilitating Effective User Navigation through Website Structure Improvement.

      Alg : "Mathematical Programming (MP) Model"

    View :Abstract Basepaper                
105.PMSE A Personalized Mobile Search Engine.

      Alg : "Naďve Bayes"

    View :Abstract Basepaper                
106.Fast Nearest Neighbor Search with Keywords.

      Mech : "Spatial Inverted Index"

    View :Abstract Basepaper                
107.Secure Mining of Association Rules in Horizontally Distributed Databases.

      Mech : "Unifying lists of locally Frequent Itemsets ,Kantarcioglu and Clifton"

    View :Abstract Basepaper                
108. A System to Filter Unwanted Messages from OSN User Walls.

      Mech : "Short Text Classifier"

    View :Abstract Basepaper                
109. Anomaly Detection via Online Oversampling Principal Component Analysis.

      Alg : "Online oversampling principal component analysis"

    View :Abstract Basepaper                
110. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia.

      Alg : "primal-dual algorithm "

    View :Abstract Basepaper                
111. A Data-Mining Model for Protection of FACTS-Based Transmission Line.

    View :Abstract Basepaper                
112. Sensitive Label Privacy Protection on Social Network Data.

    View :Abstract Basepaper                
113. Preventing Private Information Inference Attacks on Social Networks.

    View :Abstract Basepaper                
114. Privacy against Aggregate Knowledge Attacks.

    View :Abstract Basepaper                
115. Ranking on Data Manifold with Sink Points.

    View :Abstract Basepaper                
116. Secure Logging As a Service—Delegating Log Management to the Cloud.

    View :Abstract Basepaper                
117. SybilDefender Defend Against Sybil Attacks in Large Social Networks.

    View :Abstract Basepaper                
118. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining.

    View :Abstract Basepaper                
119. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases.

    View :Abstract Basepaper                
120. Improving Security and Efficiency in Attribute-Based Data Sharing.

    View :Abstract Basepaper                
121. Dynamic Personalized Recommendation on Sparse Data.

    View :Abstract Basepaper                
122. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases.

    View :Abstract Basepaper                
123. User Action Interpretation for Online Content Optimization.

    View :Abstract Basepaper                
124. Annotating Search Results from Web Databases.

    View :Abstract Basepaper                
125. A Survey of XML Tree Patterns.

    View :Abstract Basepaper                
126. Dynamic Query Forms for Database Queries.

    View :Abstract Basepaper                
127. A Learning Approach to SQL Query Results Ranking Using Skyline and Users’ Current Navigational Behavior.

    View :Abstract Basepaper                
128. Co-Occurrence-Based Diffusion for Expert Search on the Web.

    View :Abstract Basepaper                
129. Spatial Query Integrity with Voronoi Neighbors.

    View :Abstract Basepaper                
130. Anomaly Detection Approach Using Hidden Markov Model.

    View :Abstract Basepaper                
131. Efficient Evaluation of SUM Queries over Probabilistic Data.

    View :Abstract Basepaper                
132. Vickrey-Clarke-Groves for privacy-preserving collaborative classi?cation.

    View :Abstract Basepaper                
133. Efficient Evaluation of SUM Queries over Probabilistic Data.

    View :Abstract Basepaper                
134. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval.

    View :Abstract Basepaper                
135.Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks(2008).

    View :Abstract Basepaper                
136.A New Algorithm for Inferring User Search Goals with Feedback Sessions.

    View :Abstract Basepaper                
137.Online Search and Buying Behaviour in Consumer Markets.

    View :Abstract Basepaper                
138.Mining User Queries with Markov Chains Application to Online Image Retrieval.

    View :Abstract Basepaper                
139.Optimal Client-Server Assignment for Internet Distributed Systems.

    View :Abstract Basepaper                
140.Personalized QoS-Aware Web Service Recommendation and Visualization.

    View :Abstract Basepaper                
141. Location Based Intelligent Mobile Organizer.(Using Android - 2011)

    View :Abstract Basepaper                
Need a Project, Request Here...
Project Title:      
Name:      
E-Mail:      
Contact No:      
College Name:      
Online Projects Support
Android Application Demo
PROFESSIONAL REFERANCE
    Enterprise IT Training
    Interview Questions
    Technical Referance
    Placement Papers
    Inplant Training
ieee 2013 Latest Projects
    IEEE 2013 Projects
    IEEE 2012 Projects
    Software Application Projects
All Rights Reserved  :  SKdotcom Technologies