IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
DOTNET
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data.
2. Secure Mining of Association Rules in Horizontally Distributed Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML a Data
5. Dynamic Query Forms for Database Queries
6. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
7. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
8. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
9. Optimal Route Queries with Arbitrary Order Constraints
10. Failure-Aware Cascaded Suppression in Wireless Sensor Networks.
11.A Probabilistic Approach to String Transformation Protecting Sensitive Labels in Social Network Data Anonymization .
12.Mining Contracts for Business Events And Temporal Constraints in Service Engagements
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
Mining Interaction Patterns among Brain Regions by Clustering
Equality to Equals and Unequal’s*: A Revisit of the Equivalence and Nonequivalence Criteria in Class-Level Testing of Object-Oriented Software
NETWORKING AND NETWORK SECURITY
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network
Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning Delay-Based Network Utility Maximization
Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
22. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
23. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
CLOUD COMPUTING
24. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
25. Privacy-Preserving Public Auditing for Secure Cloud Storage
26. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
27. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
28. CloudMoV: Cloud-based Mobile Social TV
29. Privacy Preserving Delegated Access Control in Public Clouds
30. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
Security and Privacy in Cloud Computing
Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
Privacy-Preserving Public Auditing for Secure Cloud Storage
Fault Node Recovery Algorithm for a Wireless Sensor Network
MOBILE COMPUTING
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
EAACK—A Secure Intrusion-Detection System for MANETs
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
IP-Geolocation Mapping for Moderately Connected Internet Regions
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
PARALLEL DISTRIBUTED SYSTEMS
A Model Approach to the Estimation of Peer-to-Peer Traf?c Matrices
Exploiting Service Similarity for Privacy in Location Based Search Queries
IP-Geolocation Mapping for Moderately Connected Internet Regions
GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks
SERVICE COMPUTING
Privacy-Enhanced Web Service Composition
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
Commitments to Regulate Social Web Services Operation
IMAGE PROCESSING
Face Recognition and Verification Using Photometric Stereo: The Photo face Database and a Comprehensive Evaluation
Automatic Dynamic Texture Segmentation Using Local Descriptors and Optical Flow
BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
JAVA
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. A Survey of XML Tree Patterns
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Dynamic Personalized Recommendation on Sparse Data
7. Mining User Queries with Markov Chains: Application to Online Image Retrieval
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
10. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
11. A System to Filter Unwanted Messages from OSN User Walls
12. M-Privacy for Collaborative Data Publishing
13. Comparable Entity Mining from Comparative Questions
14. Spatial Approximate String Search
15. Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse -
NETWORKING AND NETWORK SECURITY
16. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
17. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
18. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
19. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
20. Efficient Algorithms for Neighbor Discovery in Wireless Networks
21. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
22. Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
23. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
24. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
25. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
26. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
27. Participatory Privacy Enabling Privacy in Participatory Sensing
CLOUD COMPUTING
28. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
29. Privacy-Preserving Public Auditing for Secure Cloud Storage
30. Winds of Change From Vendor Lock-In to the Meta Cloud.
31. Cloud computing for mobile users can offloading compution save energy.
32. On Data Staging Algorithms for Shared Data Accesses in Clouds
33. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
34. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
35. CloudMoV: Cloud-based Mobile Social TV
36. QoS Ranking Prediction for Cloud Services
37. Privacy-Preserving Public Auditing for Secure Cloud Storage
38. Collaboration in Multicloud Computing Environments: Framework and Security Issues
39. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
40. Towards Differential Query Services in Cost-Efficient Clouds
MOBILE COMPUTING
41. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
42. EAACK :A Secure Intrusion-Detection System for MANETs
43. Vampire attacks:Draining life from wireless ad-hoc sensor networks.
44. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
45. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
46. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
48. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
49. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
50. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
51. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
52. Community-Aware Opportunistic Routing in Mobile Social Networks
53. Distributed Cooperative Caching in Social Wireless Networks
54. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
55. Toward a Statistical Framework for Source Anonymity in Sensor Networks
PARALLEL DISTRIBUTED SYSTEMS
56. Covering Points of Interest with Mobile Sensors
57. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
58. Analysis of Distance-Based Location Management in Wireless Communication Networks
59. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
60. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
61. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
62. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
63. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
64. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
65. Towards Differential Query Services in Cost-Efficient Clouds
66. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud
67. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
68. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.
69. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks .
SERVICE COMPUTING
70. Privacy-Enhanced Web Service Composition
71. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
72. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
73. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
74. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
SECURE COMPUTING
75. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
76. Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
77. Two tales of privacy in online social networks.
BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
ANDROID
DATA MINING
1. Finding Rare Classes Active Learning with Generative and Discriminative Models
2. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
3. A Survey of XML Tree Patterns
4. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
5. T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence
6. Region-Based Foldings in Process Discovery
7. Ranking on Data Manifold with Sink Points
8. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
CLOUD COMPUTING
9. Privacy-Preserving Public Auditing for Secure Cloud Storage
10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
12. CloudMoV: Cloud-based Mobile Social TV
MOBILE COMPUTING
13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
14. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
15. SSD A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity
16. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
PARALLEL DISTRIBUTED SYSTEMS
18. Distributed Web Systems Performance Forecasting Using Turning Bands Method
19. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
20. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
21. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
22. Analysis of Distance-Based Location Management in Wireless Communication Networks
SERVICE COMPUTING
23. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
24. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
25. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
MATLAB
1. A robust digital watermarking scheme for video copyright protection in the wavelet domain MECS1301
2. Active Contour-Based Visual Tracking by Integrating Colors, Shapes, and Motions MECS1302
3. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1303
4. An Analog Sub-Miliwatt CMOS Image Sensor With Pixel-Level Convolution Processing MECS1304
5. An automated supervised method for the diagnosis of Alzheimer disease based on FMRI MECS1305
6. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism MECS1306
7. Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images MECS1307
8. Canny Edge Detection MECS1308
9. Efficient Method for Content Reconstruction With Self-Embedding. MECS1309
10. Enhancement of Angiogram Images Using Pseudo Color Processing MECS1310
11. Exploring Whole Brain fMRI Data with Unsupervised Artificial Neural Network MECS1311
12. Hyperspectral Image Representation and Processing With Binary Partition Trees. MECS1312
13. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. MECS1313
14. Image Enhancement Using the Hypothesis Selection Filter: Theory and Application to JPEG Decoding MECS1314
15. Image Processing Using Smooth Ordering of its Patches MECS1315
16. Image Noise Level Estimation by Principal Component Analysis MECS1316
17. locally adaptive bilateral clustering for image deblurring and sharpness enhancement MECS1317
18. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes MECS1318
19. What Are We Tracking: A Unified Approach of Tracking and Recognition MECS1320
20. Separable Markov Random Field Model and Its Applications in Low Level Vision MECS1321
21. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1322
22. A Modified Model of the Just Noticeable Depth Difference and its Application to Depth Sensation Enhancemen MECS1323
23. Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation MECS1324
24. A hybrid multiview stereo algorithm for modeling urban scenes MECS1325
25. Parallel Sparse Spectral Clustering for SAR Image Segmentation MECS1326
26. Noise Cancellation on ECG and Heart Rate Signals Using the Undecimated Wavelet Transform MECS1327
27. Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes MECS1328
28. Underwater Image Enhancement by Wavelength Compensation and Dehazing MECS1329
29. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting MECS1330
30. Multichannel Non-Local Means Fusion for Color Image Denoising MECS1331
31. Nonlocal Image Restoration With Bilateral Variance Estimation: A Low-Rank Approach MECS1332
32. Image and Video Restorations via Nonlocal Kernel Regression MECS133
33. A Self-Learning Approach to Single Image Super-Resolution MECS1334
34. Object-level Image Segmentation Using Low Level Cues MECS1335
35. Sparse Representation Based Image Interpolation With Nonlocal Autoregressive Modeling MECS1336
36. Modeling Natural Images Using Gated MRFs MECS1337
37. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1338
38. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1339
39. Casual stereoscopic Photo Athoring MECS1340
40. Recognition of Human Iris Patterns for Biometric Identification MECS1341
41. Analysis Operator Learning and its Application to Image Reconstruction MECS1342
42. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1343
43. Spatially Varying Color Distributions for Interactive Multilabel Segmentation MECS1344
44. Exemplar-Based Image Inpainting Using Multiscale Graph Cuts MECS1345
45. Nonlocally Centralized Sparse Representation for Image Restoration MECS1346
46. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1347
47. Signal Processing Of Heart Rate Variability Using Wavelet Transform For Mental Stress Measurement MECS1348
48. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting MECS1349
49. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes MECS1350
50. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks MECS1351
51. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints MECS1352
IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
NS2
1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. NECS1301
2. Model-Based Analysis of Wireless System Architectures for Real-Time Applications NECS1302
3. Toward a Statistical Framework for Source Anonymity in Sensor Networks NECS1303
4. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks NECS1304
5. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. NECS1305
6. Capacity of Hybrid Wireless Mesh Networks with Random APs. NECS1306
7. EAACK — A Secure Intrusion-Detection System for MANETs. NECS1307
8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation NECS1308
9. Distance Bounding A Practical Security Solution for Real-Time Location Systems. NECS1309
10. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks NECS1310
11. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1311
12. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks NECS1312
13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. NECS1313
14. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network. NECS1314
15. In-Network Estimation with Delay Constraints in Wireless Sensor Network. NECS1315
16. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling. NECS1316
17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. NECS1317
18. Network Traffic Classification Using Correlation Information NECS1318
19. Quality-Differentiated Video Multicast in Multirate Wireless Networks NECS1319
20. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks NECS1320
21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks. NECS1321
22. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1322
23. Analysis of Distance-Based Location Management in Wireless Communication Networks. NECS1323
24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. NECS1324
12.Mining Contracts for Business Events And Temporal Constraints in Service Engagements
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
Mining Interaction Patterns among Brain Regions by Clustering
Equality to Equals and Unequal’s*: A Revisit of the Equivalence and Nonequivalence Criteria in Class-Level Testing of Object-Oriented Software
NETWORKING AND NETWORK SECURITY
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Network
Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning Delay-Based Network Utility Maximization
Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
22. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
23. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
CLOUD COMPUTING
24. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
25. Privacy-Preserving Public Auditing for Secure Cloud Storage
26. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
27. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
28. CloudMoV: Cloud-based Mobile Social TV
29. Privacy Preserving Delegated Access Control in Public Clouds
30. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks.
Security and Privacy in Cloud Computing
Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
Privacy-Preserving Public Auditing for Secure Cloud Storage
Fault Node Recovery Algorithm for a Wireless Sensor Network
MOBILE COMPUTING
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
EAACK—A Secure Intrusion-Detection System for MANETs
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
IP-Geolocation Mapping for Moderately Connected Internet Regions
Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
PARALLEL DISTRIBUTED SYSTEMS
A Model Approach to the Estimation of Peer-to-Peer Traf?c Matrices
Exploiting Service Similarity for Privacy in Location Based Search Queries
IP-Geolocation Mapping for Moderately Connected Internet Regions
GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks
SERVICE COMPUTING
Privacy-Enhanced Web Service Composition
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
Commitments to Regulate Social Web Services Operation
IMAGE PROCESSING
Face Recognition and Verification Using Photometric Stereo: The Photo face Database and a Comprehensive Evaluation
Automatic Dynamic Texture Segmentation Using Local Descriptors and Optical Flow
BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
JAVA
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. A Survey of XML Tree Patterns
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Dynamic Personalized Recommendation on Sparse Data
7. Mining User Queries with Markov Chains: Application to Online Image Retrieval
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
10. Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
11. A System to Filter Unwanted Messages from OSN User Walls
12. M-Privacy for Collaborative Data Publishing
13. Comparable Entity Mining from Comparative Questions
14. Spatial Approximate String Search
15. Evaluating Data Reliability: An Evidential Answer with Application to a Web-Enabled Data Warehouse -
NETWORKING AND NETWORK SECURITY
16. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
17. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
18. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
19. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
20. Efficient Algorithms for Neighbor Discovery in Wireless Networks
21. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
22. Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
23. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
24. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
25. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
26. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
27. Participatory Privacy Enabling Privacy in Participatory Sensing
CLOUD COMPUTING
28. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
29. Privacy-Preserving Public Auditing for Secure Cloud Storage
30. Winds of Change From Vendor Lock-In to the Meta Cloud.
31. Cloud computing for mobile users can offloading compution save energy.
32. On Data Staging Algorithms for Shared Data Accesses in Clouds
33. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
34. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.
35. CloudMoV: Cloud-based Mobile Social TV
36. QoS Ranking Prediction for Cloud Services
37. Privacy-Preserving Public Auditing for Secure Cloud Storage
38. Collaboration in Multicloud Computing Environments: Framework and Security Issues
39. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
40. Towards Differential Query Services in Cost-Efficient Clouds
MOBILE COMPUTING
41. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
42. EAACK :A Secure Intrusion-Detection System for MANETs
43. Vampire attacks:Draining life from wireless ad-hoc sensor networks.
44. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
45. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
46. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
47. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
48. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
49. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
50. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
51. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
52. Community-Aware Opportunistic Routing in Mobile Social Networks
53. Distributed Cooperative Caching in Social Wireless Networks
54. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation
55. Toward a Statistical Framework for Source Anonymity in Sensor Networks
PARALLEL DISTRIBUTED SYSTEMS
56. Covering Points of Interest with Mobile Sensors
57. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
58. Analysis of Distance-Based Location Management in Wireless Communication Networks
59. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
60. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
61. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
62. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
63. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
64. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
65. Towards Differential Query Services in Cost-Efficient Clouds
66. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud
67. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
68. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks.
69. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks .
SERVICE COMPUTING
70. Privacy-Enhanced Web Service Composition
71. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
72. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
73. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
74. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
SECURE COMPUTING
75. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
76. Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
77. Two tales of privacy in online social networks.
BULK IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
ANDROID
DATA MINING
1. Finding Rare Classes Active Learning with Generative and Discriminative Models
2. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
3. A Survey of XML Tree Patterns
4. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
5. T-Drive Enhancing Driving Directions with Taxi Driversâc Intelligence
6. Region-Based Foldings in Process Discovery
7. Ranking on Data Manifold with Sink Points
8. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
CLOUD COMPUTING
9. Privacy-Preserving Public Auditing for Secure Cloud Storage
10. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
11. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
12. CloudMoV: Cloud-based Mobile Social TV
MOBILE COMPUTING
13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
14. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
15. SSD A Robust RF Location Fingerprint Addressing Mobile Devices’ Heterogeneity
16. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
PARALLEL DISTRIBUTED SYSTEMS
18. Distributed Web Systems Performance Forecasting Using Turning Bands Method
19. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
20. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
21. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
22. Analysis of Distance-Based Location Management in Wireless Communication Networks
SERVICE COMPUTING
23. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
24. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
25. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
MATLAB
1. A robust digital watermarking scheme for video copyright protection in the wavelet domain MECS1301
2. Active Contour-Based Visual Tracking by Integrating Colors, Shapes, and Motions MECS1302
3. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1303
4. An Analog Sub-Miliwatt CMOS Image Sensor With Pixel-Level Convolution Processing MECS1304
5. An automated supervised method for the diagnosis of Alzheimer disease based on FMRI MECS1305
6. An Inpainting-Assisted Reversible Steganographic Scheme Using a Histogram Shifting Mechanism MECS1306
7. Automatic Detection and Reconstruction of Building Radar Footprints From Single VHR SAR Images MECS1307
8. Canny Edge Detection MECS1308
9. Efficient Method for Content Reconstruction With Self-Embedding. MECS1309
10. Enhancement of Angiogram Images Using Pseudo Color Processing MECS1310
11. Exploring Whole Brain fMRI Data with Unsupervised Artificial Neural Network MECS1311
12. Hyperspectral Image Representation and Processing With Binary Partition Trees. MECS1312
13. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. MECS1313
14. Image Enhancement Using the Hypothesis Selection Filter: Theory and Application to JPEG Decoding MECS1314
15. Image Processing Using Smooth Ordering of its Patches MECS1315
16. Image Noise Level Estimation by Principal Component Analysis MECS1316
17. locally adaptive bilateral clustering for image deblurring and sharpness enhancement MECS1317
18. Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes MECS1318
19. What Are We Tracking: A Unified Approach of Tracking and Recognition MECS1320
20. Separable Markov Random Field Model and Its Applications in Low Level Vision MECS1321
21. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1322
22. A Modified Model of the Just Noticeable Depth Difference and its Application to Depth Sensation Enhancemen MECS1323
23. Moving Object Detection by Detecting Contiguous Outliers in the Low-Rank Representation MECS1324
24. A hybrid multiview stereo algorithm for modeling urban scenes MECS1325
25. Parallel Sparse Spectral Clustering for SAR Image Segmentation MECS1326
26. Noise Cancellation on ECG and Heart Rate Signals Using the Undecimated Wavelet Transform MECS1327
27. Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes MECS1328
28. Underwater Image Enhancement by Wavelength Compensation and Dehazing MECS1329
29. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting MECS1330
30. Multichannel Non-Local Means Fusion for Color Image Denoising MECS1331
31. Nonlocal Image Restoration With Bilateral Variance Estimation: A Low-Rank Approach MECS1332
32. Image and Video Restorations via Nonlocal Kernel Regression MECS133
33. A Self-Learning Approach to Single Image Super-Resolution MECS1334
34. Object-level Image Segmentation Using Low Level Cues MECS1335
35. Sparse Representation Based Image Interpolation With Nonlocal Autoregressive Modeling MECS1336
36. Modeling Natural Images Using Gated MRFs MECS1337
37. Adaptive Fingerprint Image Enhancement with Emphasis on Pre-processing of Data MECS1338
38. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1339
39. Casual stereoscopic Photo Athoring MECS1340
40. Recognition of Human Iris Patterns for Biometric Identification MECS1341
41. Analysis Operator Learning and its Application to Image Reconstruction MECS1342
42. Rich Intrinsic Image Decomposition of Outdoor Scenes from Multiple Views MECS1343
43. Spatially Varying Color Distributions for Interactive Multilabel Segmentation MECS1344
44. Exemplar-Based Image Inpainting Using Multiscale Graph Cuts MECS1345
45. Nonlocally Centralized Sparse Representation for Image Restoration MECS1346
46. Parameter Estimation for Blind and Non-Blind Deblurring Using Residual Whiteness Measures MECS1347
47. Signal Processing Of Heart Rate Variability Using Wavelet Transform For Mental Stress Measurement MECS1348
48. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting MECS1349
49. General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes MECS1350
50. LDFT-Based Watermarking Resilient to Local Desynchronization Attacks MECS1351
51. Image Size Invariant Visual Cryptography for General Access Structures Subject to Display Quality Constraints MECS1352
IEEE 2013 PROJECTS TITLES IN ECRUITMENT SOLUTIONS
NS2
1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System. NECS1301
2. Model-Based Analysis of Wireless System Architectures for Real-Time Applications NECS1302
3. Toward a Statistical Framework for Source Anonymity in Sensor Networks NECS1303
4. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks NECS1304
5. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models. NECS1305
6. Capacity of Hybrid Wireless Mesh Networks with Random APs. NECS1306
7. EAACK — A Secure Intrusion-Detection System for MANETs. NECS1307
8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation NECS1308
9. Distance Bounding A Practical Security Solution for Real-Time Location Systems. NECS1309
10. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks NECS1310
11. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1311
12. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks NECS1312
13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks. NECS1313
14. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network. NECS1314
15. In-Network Estimation with Delay Constraints in Wireless Sensor Network. NECS1315
16. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling. NECS1316
17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks. NECS1317
18. Network Traffic Classification Using Correlation Information NECS1318
19. Quality-Differentiated Video Multicast in Multirate Wireless Networks NECS1319
20. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks NECS1320
21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks. NECS1321
22. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks NECS1322
23. Analysis of Distance-Based Location Management in Wireless Communication Networks. NECS1323
24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks. NECS1324
No comments:
Post a Comment