BULK IEEE PROJECTS


            IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS



DOTNET
DATA MINING


1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data.
2. Secure Mining of Association Rules in Horizontally Distributed Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML a Data
5. Dynamic Query Forms for Database Queries
6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
7. Evaluating Data Reliability An Evidential Answer with Application to a   Web-Enabled Data Warehouse
8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering         Algorithm
9. Optimal Route Queries with Arbitrary Order Constraints
10. Failure-Aware Cascaded Suppression in Wireless Sensor Networks.
11.A Probabilistic Approach to String Transformation Protecting Sensitive         Labels in Social Network Data Anonymization .
12.Mining Contracts for Business Events And Temporal Constraints in Service Engagements
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
Mining Interaction Patterns among Brain Regions by Clustering
Equality to Equals and Unequal’s*: A Revisit of the Equivalence and Nonequivalence Criteria in Class-Level Testing of Object-Oriented Software








NETWORKING AND NETWORK SECURITY




PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network
Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning Delay-Based Network Utility Maximization
Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience


22. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks


23. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks




CLOUD COMPUTING






24. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud


25. Privacy-Preserving Public Auditing for Secure Cloud Storage


26. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption


27. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems


28. CloudMoV: Cloud-based Mobile Social TV


29. Privacy Preserving Delegated Access Control in Public Clouds


30. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
Security and Privacy in Cloud Computing
Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds




Privacy-Preserving Public Auditing for Secure Cloud Storage
Fault Node Recovery Algorithm for a Wireless Sensor Network








MOBILE COMPUTING




A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks




EAACK—A Secure Intrusion-Detection System for MANETs




Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users




Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System




Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks




On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks




Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks




IP-Geolocation Mapping for Moderately Connected Internet Regions




Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users




EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
PARALLEL DISTRIBUTED SYSTEMS








A Model Approach to the Estimation of Peer-to-Peer Traf?c Matrices




Exploiting Service Similarity for Privacy in Location Based Search Queries




IP-Geolocation Mapping for Moderately Connected Internet Regions




GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks







Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment




Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds




BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments




ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks




A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization




A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks














SERVICE COMPUTING




Privacy-Enhanced Web Service Composition




Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing




NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems




Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection




Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing




Commitments to Regulate Social Web Services Operation






IMAGE PROCESSING




Face Recognition and Verification Using Photometric Stereo: The Photo face Database and a Comprehensive Evaluation




Automatic Dynamic Texture Segmentation Using Local Descriptors and Optical Flow




BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS


JAVA
DATA MINING


1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data


2. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data


3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models


4. A Survey of XML Tree Patterns


5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors


6. Dynamic Personalized Recommendation on Sparse Data


7. Mining User Queries with Markov Chains: Application to Online Image Retrieval


8. Optimal Route Queries with Arbitrary Order Constraints


9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks


10. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model


11. A System to Filter Unwanted Messages from OSN User Walls


12. M-Privacy for Collaborative Data Publishing


13. Comparable Entity Mining from Comparative Questions


14. Spatial Approximate String Search


15. Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse -
NETWORKING AND NETWORK SECURITY


16. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System


17. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks


18. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality


19. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems


20. Efficient Algorithms for Neighbor Discovery in Wireless Networks


21. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning


22. Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience


23. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks


24. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks


25. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks


26. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization


27. Participatory Privacy Enabling Privacy in Participatory Sensing




CLOUD COMPUTING






28. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud


29. Privacy-Preserving Public Auditing for Secure Cloud Storage


30. Winds of Change From Vendor Lock-In to the Meta Cloud.


31. Cloud computing for mobile users can offloading compution save energy.


32. On Data Staging Algorithms for Shared Data Accesses in Clouds


33. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems


34. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.


35. CloudMoV: Cloud-based Mobile Social TV


36. QoS Ranking Prediction for Cloud Services


37. Privacy-Preserving Public Auditing for Secure Cloud Storage


38. Collaboration in Multicloud Computing Environments: Framework and Security Issues


39. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring


40. Towards Differential Query Services in Cost-Efficient Clouds
MOBILE COMPUTING






41. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks


42. EAACK :A Secure Intrusion-Detection System for MANETs


43. Vampire attacks:Draining life from wireless ad-hoc sensor networks.


44. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks


45. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks


46. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks


47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks


48. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


49. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users


50. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


51. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks


52. Community-Aware Opportunistic Routing in Mobile Social Networks


53. Distributed Cooperative Caching in Social Wireless Networks


54. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation


55. Toward a Statistical Framework for Source Anonymity in Sensor Networks
PARALLEL DISTRIBUTED SYSTEMS






56. Covering Points of Interest with Mobile Sensors


57. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation


58. Analysis of Distance-Based Location Management in Wireless Communication Networks


59. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks


60. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System


61. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems


62. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment


63. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds


64. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments


65. Towards Differential Query Services in Cost-Efficient Clouds


66. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud


67. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems


68. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.


69. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks .






SERVICE COMPUTING


70. Privacy-Enhanced Web Service Composition


71. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing


72. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems


73. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection


74. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing






SECURE COMPUTING






75. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.


76. Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.


77. Two tales of privacy in online social networks.








BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS


ANDROID
DATA MINING


1. Finding Rare Classes Active Learning with Generative and Discriminative Models


2. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia


3. A Survey of XML Tree Patterns


4. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering


5. T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence


6. Region-Based Foldings in Process Discovery


7. Ranking on Data Manifold with Sink Points


8. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse




CLOUD COMPUTING






9. Privacy-Preserving Public Auditing for Secure Cloud Storage


10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption


11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems


12. CloudMoV: Cloud-based Mobile Social TV
MOBILE COMPUTING






13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks


14. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System


15. SSD A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity


16. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
PARALLEL DISTRIBUTED SYSTEMS






18. Distributed Web Systems Performance Forecasting Using Turning Bands Method


19. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption


20. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks


21. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks


22. Analysis of Distance-Based Location Management in Wireless Communication Networks


SERVICE COMPUTING


23. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing


24. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection


25. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing




IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS


MATLAB






1. A robust digital watermarking scheme for video copyright protection in the wavelet domain MECS1301


2. Active Contour-Based Visual Tracking by Integrating Colors, Shapes, and Motions MECS1302


3. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1303


4. An Analog Sub-Miliwatt CMOS Image Sensor With Pixel-Level Convolution Processing MECS1304


5. An automated supervised method for the diagnosis of Alzheimer disease based on FMRI MECS1305


6. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism MECS1306


7. Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images MECS1307


8. Canny Edge Detection MECS1308


9. Efficient Method for Content Reconstruction With Self-Embedding. MECS1309


10. Enhancement of Angiogram Images Using Pseudo Color Processing MECS1310


11. Exploring Whole Brain fMRI Data with Unsupervised Artificial Neural Network MECS1311


12. Hyperspectral Image Representation and Processing With Binary Partition Trees. MECS1312


13. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. MECS1313


14. Image Enhancement Using the Hypothesis Selection Filter: Theory and Application to JPEG Decoding MECS1314


15. Image Processing Using Smooth Ordering of its Patches MECS1315


16. Image Noise Level Estimation by Principal Component Analysis MECS1316


17. locally adaptive bilateral clustering for image deblurring and sharpness enhancement MECS1317


18. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes MECS1318


19. What Are We Tracking: A Unified Approach of Tracking and Recognition MECS1320


20. Separable Markov Random Field Model and Its Applications in Low Level Vision MECS1321


21. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1322


22. A Modified Model of the Just Noticeable Depth Difference and its Application to Depth Sensation Enhancemen MECS1323


23. Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation MECS1324


24. A hybrid multiview stereo algorithm for modeling urban scenes MECS1325


25. Parallel Sparse Spectral Clustering for SAR Image Segmentation MECS1326


26. Noise Cancellation on ECG and Heart Rate Signals Using the Undecimated Wavelet Transform MECS1327




27. Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes MECS1328


28. Underwater Image Enhancement by Wavelength Compensation and Dehazing MECS1329


29. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting MECS1330


30. Multichannel Non-Local Means Fusion for Color Image Denoising MECS1331


31. Nonlocal Image Restoration With Bilateral Variance Estimation: A Low-Rank Approach MECS1332


32. Image and Video Restorations via Nonlocal Kernel Regression MECS133


33. A Self-Learning Approach to Single Image Super-Resolution MECS1334


34. Object-level Image Segmentation Using Low Level Cues MECS1335


35. Sparse Representation Based Image Interpolation With Nonlocal Autoregressive Modeling MECS1336


36. Modeling Natural Images Using Gated MRFs MECS1337


37. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1338


38. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1339


39. Casual stereoscopic Photo Athoring MECS1340


40. Recognition of Human Iris Patterns for Biometric Identification MECS1341


41. Analysis Operator Learning and its Application to Image Reconstruction MECS1342


42. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1343


43. Spatially Varying Color Distributions for Interactive Multilabel Segmentation MECS1344


44. Exemplar-Based Image Inpainting Using Multiscale Graph Cuts MECS1345


45. Nonlocally Centralized Sparse Representation for Image Restoration MECS1346


46. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1347


47. Signal Processing Of Heart Rate Variability Using Wavelet Transform For Mental Stress Measurement MECS1348


48. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting MECS1349


49. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes MECS1350


50. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks MECS1351


51. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints MECS1352




IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS


NS2






1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. NECS1301


2. Model-Based Analysis of Wireless System Architectures for Real-Time Applications NECS1302


3. Toward a Statistical Framework for Source Anonymity in Sensor Networks NECS1303


4. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks NECS1304


5. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. NECS1305


6. Capacity of Hybrid Wireless Mesh Networks with Random APs. NECS1306


7. EAACK — A Secure Intrusion-Detection System for MANETs. NECS1307


8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation NECS1308


9. Distance Bounding A Practical Security Solution for Real-Time Location Systems. NECS1309


10. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks NECS1310


11. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1311


12. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks NECS1312


13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. NECS1313


14. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network. NECS1314


15. In-Network Estimation with Delay Constraints in Wireless Sensor Network. NECS1315


16. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling. NECS1316


17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. NECS1317


18. Network Traffic Classification Using Correlation Information NECS1318


19. Quality-Differentiated Video Multicast in Multirate Wireless Networks NECS1319


20. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks NECS1320


21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks. NECS1321


22. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1322


23. Analysis of Distance-Based Location Management in Wireless Communication Networks. NECS1323


24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. NECS1324

































No comments:

Post a Comment