SlideShare a Scribd company logo
2013 and 2014 Completed IEEE Projects List
Contact : K.Manjunath - 09535866270
Sl.No Project Title Year
Cloud Computing
1 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013
2 A Privacy Leakage Upper Bound constraint Based Approach for Cost Effective 2013
3 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 2013
4 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 2013
5 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 2013
6 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013
7 NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
8 On the Optimal Allocation of Virtual Resources in Cloud Computing Networks 2013
9 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 2013
10 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 2013
11 Privacy Preserving Delegated Access Control in Public Clouds 2013
12 Privacy Preserving Public Auditing for Secure Cloud Storage 2013
13 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud
Computing Systems
2013
14 Toward Secure Multi keyword Top-k Retrieval Over Encrypted Cloud 2013
15 Towards Differential Query Services in Cost Efficient Cloud 2013
16 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing
Systems
2013
17 Dynamic Audit Services for Outsourced Storages in Clouds 2013
18 Collaboration in Multi cloud Environments Framework and Security Issues 2013
19 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based
Encryption
2013
20 QoS Ranking Prediction for Cloud Services 2013
21 Load Rebalancing for Distributed File Systems in Clouds 2013
22 A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms 2013
23 SeDas A Self Destructing Data System Based on Active Storage Framework 2013
24 Winds of Change from Vendor Lock In to the Meta Cloud 2013
25 On Data Staging Algorithms for Shared Data Accesses in Clouds 2013
26 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 2013
27 Optimal Multi Server Configuration for Profit Maximization in Cloud Computing 2013
28 TST Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud
Computing
2013
29 Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and
Analysis
2013
30 Secure Logging as a Service—Delegating Log Management to the Cloud 2013
31 Fault Tolerance Management in Cloud Computing: A System-Level Perspective 2013
32 Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing 2012
33 Cloud Computing Security From Single to Multi-Clouds 2012
34 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage 2012
35 Efficient audit service outsourcing for data integrity in clouds 2012
36 Enabling Secure and Efficient Ranked Keyword Search Over Out Sourced Cloud Data 2012
37 Ensuring Distributed Accountability for Data Sharing in the Cloud 2012
38 IDSaaS Intrusion Detection System as a Service in Public Clouds 2012
39 Privacy Preserving Public Auditing for Secure Cloud Storage 2012
40 Towards Secure and Dependable Cloud Storage Server 2012
41 Secure Overlay Cloud Storage with Access Control and Assured Deletion 2012
42 A Refined RBAC Model for Cloud Computing 2012
43 Cloud Computing Services A Total Cost of Ownership Approach 2012
44 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in
Cloud Computing
2012
45 Secure and Erasure Coding Based cloud storage system with Secure Data Forwarding 2012
Network Security
1 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013
2 EAACK—A Secure Intrusion-Detection System for MANETs 2013
3 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 2013
4 Modeling the Pair wise Key Pre distribution Scheme in the Presence of Unreliable Links 2013
5 Vampire Attacks Draining life from wireless ad-hoc sensor networks 2013
6 EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 2013
7 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013
8 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013
9 Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks 2013
10 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013
11 Identity-Based Secure Distributed Data Storage Schemes 2013
12 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013
13 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013
14 SORT A Self-Organizing Trust Model for Peer-to-Peer Systems 2013
15 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless
Sensor Networks.
2013
16 Distance Bounding: A Practical Security Solution for Real-Time Location Systems 2013
17 Minimum Cost Blocking Problem in Multi path Wireless Routing Protocols 2013
18 A Rank Correlation Based Detection against Distributed Reflection DOS Attacks 2013
19 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc networks 2012
20 An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks 2012
21 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012
22 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 2012
23 Detecting and Resolving Firewall Policy Anomalies 2012
24 Performance of PCN-Based Admission Control Under Challenging Conditions 2012
25 Load-Balancing Multipath Switching System with Flow Slice 2012
26 A Framework for Routing Performance Analysis in delay tolerant Networks 2012
27 Revisiting Defenses Against Large-Scale Online Password Guessing Attacks 2012
28 Secure High Throughput Multicast Routing in Wireless Mesh Networks 2012
29 Online Intrusion Alert Aggregation with Generative Data Stream Modeling 2012
30 ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2013
Adhoc Networks & Mobile Computing & VANET & MANET
1 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc
Networks(MANET)
2013
2 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks (MANET) 2013
3 Efficient Algorithms for Neighbor Discovery in Wireless Networks (Adhoc) 2013
4 Multicast Capacity in MANET with Infrastructure(MANET) 2013
5 Optimal Multicast capacity and delay tradeoff in Manet (MANET) 2013
6 Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets (Adhoc) 2013
7 Performance Modeling of Safety Messages Broadcast in Vehicular Ad Hoc Networks (VANET) 2013
8 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation (Adhoc) 2013
9 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile
Ad Hoc Networks (MANET)
2013
10 Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks (VANET) 2013
11 A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks (VANET) 2013
12 Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
(Mobile Computing)
2013
13 Network Assisted Mobile Computing with Optimal Uplink Query Processing (Mobile Computing) 2013
14 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc networks 2013
15 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013
16 Efficient Rekeying Framework for Secure Multicast with Diverse Subscription Period Mobile Users 2013
17 Risk Aware mitigation of MANET Attacks 2013
18 Balancing the Tradeoffs between Query Delay and Data Availability in MANETs 2012
19 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks 2012
20 TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks 2012
21 Throughput and Energy Efficiency in wireless ad hoc network with caussian channels 2012
Sensor Networks
1 Secure and Efficient Data Transmission for Cluster based WSN 2013
2 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013
3 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
2013
4 Mobile Relay Configuration in Data Intensive Wireless Sensor Network 2013
5 Localization in Wireless Sensor Networks Byzantines and Mitigation Techniques 2013
6 Harvesting Aware Energy Management for Time Critical WSN with Joint Voltage 2013
7 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 2013
8 Adaptive Network Coding for Broadband Wireless Access Networks 2013
9 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless
Sensor Networks.
2013
10 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 2013
11 Participatory Privacy: Enabling Privacy in Participatory Sensing 2013
12 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2013
13 Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs 2012
14 Fast Data Collection in Tree-Based Wireless Sensor Networks 2012
15 BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False
Data in WSN
2012
16 Cut Detection in Wireless Sensor Network 2012
17 Protecting Location Privacy in Sensor Networks against Global Eavesdropper 2012
18 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2012
19 Energy Efficient Routing Mechanism in Wireless Sensor Network 2012
20 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012
21 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2012
Android Projects
1 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-
Healthcare Emergency
2013
2 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013
3 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013
4 Cloud MoV Cloud-based Mobile Social TV 2013
5 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
Sharing in the Clouds
2013
6 Android College Campus 2013
7 Nautical Telemetrically System 2013
8 Collaborative Learning Assistant for Android 2013
9 Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud 2013
10 Spatial Query Integrity with Voronoi Neighbors 2013
11 Dynamic Personalized Recommendation on Sparse Data 2013
Data Mining
1 m-Privacy for Collaborative Data Publishing 2013
2 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2013
3 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2013
4 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 2013
5 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 2013
6 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 2013
7 Privacy-Enhanced Web Service Composition 2013
8 System to Filter Unwanted Messages from OSN User Walls 2013
9 Incentive Compatible Privacy-Preserving Data Analysis 2013
10 Facilitating Effective User Navigation through Website Structure Improvement 2013
11 Optimal Route Queries with Arbitrary Order Constraints 2013
12 Fast Nearest Neighbor Search with Keywords
13 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 2013
14 Acceleration of XML Parsing through Prefetching 2013
15 Automatic Discovery of Association Orders between Name and Aliases from the Web 2012
16 Slicing A New Approach to Privacy Preserving Data Publishing 2012
17 Ranking Model Adaptation for Domain-Specific Search 2012
18 Improving aggregate recommendation diversity using ranking-based techniques 2012
19 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 2012
20 Dynamic Personalized Recommendation on Sparse Data 2013
21 Trust Modeling in Social Tagging of Multimedia Content 2012
22 MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND
MECHANISMS
2013
Wireless Communication
1 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2013
2 Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive
Networks
2013
3 IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual
Environments
2013
4 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 2012
5 Topology Control in Mobile Adhoc Networks with Cooperative Communications 2012
6 Local Greedy Approximation for Scheduling in Multi-hop Wireless Networks 2012
Image Processing and Multimedia
1 3D Face Recognition Under Expressions, Occlusions and Pose Variations 2013
2 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features 2013
3 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013
4 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. 2013
5 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 2013
6 An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 2013
7 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless
Networks
2013
8 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 2012
J2ME Mobile Based Projects
1 Adaptation of a virtual campus for mobile learning devices 2013
2 Bluetooth Mobile Based College Campus 2013
3 ECops via Handheld Mobile Devices 2013
4 Privacy-Conscious Location-Based Queries in Mobile Environments 2013
5 Ranking Model Adaptation for Domain-Specific Search 2013
6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-
Healthcare Emergency
2013
7 The Word in a nut shell : CONCISE RANGE QUERIES 2013

More Related Content

DOCX
2014 and 2015 ieee final list
Manju Nath
 
DOCX
2014 and 2015 IEEE Projects
Tmks Infotech
 
PDF
Ieee 2015 2016
Focuslogic Walaja
 
DOC
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
Ganesh Ganesan
 
DOC
Java projects 2013 14
MSR PROJECTS
 
DOCX
IEEE 2014 Title's list for computer science students
gagnertechnologies
 
DOCX
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Manju Nath
 
DOCX
2016 ieee java .net project titles
Adz91 Digital Ads Pvt Ltd
 
2014 and 2015 ieee final list
Manju Nath
 
2014 and 2015 IEEE Projects
Tmks Infotech
 
Ieee 2015 2016
Focuslogic Walaja
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
Ganesh Ganesan
 
Java projects 2013 14
MSR PROJECTS
 
IEEE 2014 Title's list for computer science students
gagnertechnologies
 
Network Security ,2014 and 2015 ieee projects list @ TMKS Infotech
Manju Nath
 
2016 ieee java .net project titles
Adz91 Digital Ads Pvt Ltd
 

What's hot (10)

PDF
Final year IEEE projects for 2013-14
projectsepark
 
PDF
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
Raushan Kumar Singh
 
PDF
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
ncct
 
PDF
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
Green Corner Tech,Nellore
 
PDF
Dotnet titles 2016 17
praba123456
 
PDF
Pantech ns2 projects 2016-17
Java Team
 
PDF
Pantech java projects 2016-17
Java Team
 
DOC
2021- 22 IEEE JAVA Projects
MSR PROJECTS
 
PDF
Java 2015 project list
MSR PROJECTS
 
PDF
An Encrypted MAC for the Authentication Process in WSN
IJMTST Journal
 
Final year IEEE projects for 2013-14
projectsepark
 
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRY
Raushan Kumar Singh
 
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
ncct
 
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
Green Corner Tech,Nellore
 
Dotnet titles 2016 17
praba123456
 
Pantech ns2 projects 2016-17
Java Team
 
Pantech java projects 2016-17
Java Team
 
2021- 22 IEEE JAVA Projects
MSR PROJECTS
 
Java 2015 project list
MSR PROJECTS
 
An Encrypted MAC for the Authentication Process in WSN
IJMTST Journal
 
Ad

Similar to 2013 and 2014 ieee projects list (20)

DOCX
2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
Manju Nath
 
DOCX
Final Year 2014 and 2015 IEEE projects
Tmks Infotech
 
DOCX
2014 and 2015 ieee projects for MTech
Tmks Infotech
 
DOCX
2014 and 2015 ieee projects for BE
Tmks Infotech
 
DOCX
2014 and 2015 ieee projects for cse
Tmks Infotech
 
DOCX
2014 and 2015 ieee projects for CNE
Tmks Infotech
 
DOCX
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Tmks Infotech
 
DOCX
java project centre in chennai
Aishwarya Rajesh
 
DOCX
ece project centre in chennai titles 2014
Aishwarya Rajesh
 
DOCX
final year ieee project centre in chennai
Aishwarya Rajesh
 
DOCX
best project centre in chennai titles 2014
Aishwarya Rajesh
 
DOCX
ieee project centre in chennai
Aishwarya Rajesh
 
DOCX
dotnet project centre in chennai
Aishwarya Rajesh
 
DOCX
best ieee project centre in chennai
Aishwarya Rajesh
 
DOCX
be project centre in chennai
Aishwarya Rajesh
 
DOCX
cse project centre in chennai
Aishwarya Rajesh
 
PDF
final year ieee projects in pondicherry 2013
JPINFOTECH JAYAPRAKASH
 
DOC
Ieee 2013 java projects list
Mumbai Academisc
 
DOCX
2013 2014 bulk ieee projects
JPINFOTECH JAYAPRAKASH
 
DOCX
2013 2014 ieee project titles
JPINFOTECH JAYAPRAKASH
 
2014 and 2015 BE Projects @ Bangalore,Rajaji Nagar
Manju Nath
 
Final Year 2014 and 2015 IEEE projects
Tmks Infotech
 
2014 and 2015 ieee projects for MTech
Tmks Infotech
 
2014 and 2015 ieee projects for BE
Tmks Infotech
 
2014 and 2015 ieee projects for cse
Tmks Infotech
 
2014 and 2015 ieee projects for CNE
Tmks Infotech
 
Bulk 2014 and 2015 ieee Projects @ TMKS Infotech
Tmks Infotech
 
java project centre in chennai
Aishwarya Rajesh
 
ece project centre in chennai titles 2014
Aishwarya Rajesh
 
final year ieee project centre in chennai
Aishwarya Rajesh
 
best project centre in chennai titles 2014
Aishwarya Rajesh
 
ieee project centre in chennai
Aishwarya Rajesh
 
dotnet project centre in chennai
Aishwarya Rajesh
 
best ieee project centre in chennai
Aishwarya Rajesh
 
be project centre in chennai
Aishwarya Rajesh
 
cse project centre in chennai
Aishwarya Rajesh
 
final year ieee projects in pondicherry 2013
JPINFOTECH JAYAPRAKASH
 
Ieee 2013 java projects list
Mumbai Academisc
 
2013 2014 bulk ieee projects
JPINFOTECH JAYAPRAKASH
 
2013 2014 ieee project titles
JPINFOTECH JAYAPRAKASH
 
Ad

More from Manju Nath (20)

PDF
2017 and 2018 Dependable Computing
Manju Nath
 
PDF
2017 and 2018 Service Computing
Manju Nath
 
PDF
2017 and 2018 Networking and Service Computing
Manju Nath
 
DOCX
2017 and 2018 Networking
Manju Nath
 
PDF
2017 and 2018 Multimedia
Manju Nath
 
PDF
2017 and 2018 Artificial Intelligent
Manju Nath
 
DOCX
2017 and 2018 Neural Networks
Manju Nath
 
PDF
2017 and 2018 Big data
Manju Nath
 
DOCX
2017 and 2018 Image Processing
Manju Nath
 
PDF
2017 and 2018 Parallel and Distributed Systems
Manju Nath
 
DOCX
2017 and 2018 Software Engineering
Manju Nath
 
DOCX
2017 and 2018 Adhoc Networks
Manju Nath
 
PDF
2017 and 2018 Android Projects
Manju Nath
 
PDF
2017 and 2018 Secure and Dependable Computing
Manju Nath
 
DOCX
2017 and 2018 Wireless Sensor Networks
Manju Nath
 
DOCX
2017 and 2018 Secure Computing
Manju Nath
 
DOCX
2017 and 2018 Network Security
Manju Nath
 
PDF
2017 and 2018 Data Mining
Manju Nath
 
PDF
2017 and 2018 Cloud Computing
Manju Nath
 
DOCX
2017 and 2018 academic ieee projects list
Manju Nath
 
2017 and 2018 Dependable Computing
Manju Nath
 
2017 and 2018 Service Computing
Manju Nath
 
2017 and 2018 Networking and Service Computing
Manju Nath
 
2017 and 2018 Networking
Manju Nath
 
2017 and 2018 Multimedia
Manju Nath
 
2017 and 2018 Artificial Intelligent
Manju Nath
 
2017 and 2018 Neural Networks
Manju Nath
 
2017 and 2018 Big data
Manju Nath
 
2017 and 2018 Image Processing
Manju Nath
 
2017 and 2018 Parallel and Distributed Systems
Manju Nath
 
2017 and 2018 Software Engineering
Manju Nath
 
2017 and 2018 Adhoc Networks
Manju Nath
 
2017 and 2018 Android Projects
Manju Nath
 
2017 and 2018 Secure and Dependable Computing
Manju Nath
 
2017 and 2018 Wireless Sensor Networks
Manju Nath
 
2017 and 2018 Secure Computing
Manju Nath
 
2017 and 2018 Network Security
Manju Nath
 
2017 and 2018 Data Mining
Manju Nath
 
2017 and 2018 Cloud Computing
Manju Nath
 
2017 and 2018 academic ieee projects list
Manju Nath
 

Recently uploaded (20)

PPTX
Social Media Marketing for Business Growth
vidhi622006
 
PPTX
Appreciations - July 25.pptxdddddddddddss
anushavnayak
 
PPTX
Foreign-Direct-Investment-Shaping-the-Global-Trade-Landscape 5.pptx
Blackworld7
 
PDF
bain-temasek-sea-green-economy-2022-report-investing-behind-the-new-realities...
YudiSaputra43
 
PDF
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
Auxis Consulting & Outsourcing
 
DOCX
UNIT 2 BC.docx- cv - RESOLUTION -MINUTES-NOTICE - BUSINESS LETTER DRAFTING
MANJU N
 
PDF
MDR Services – 24x7 Managed Detection and Response
CyberNX Technologies Private Limited
 
PDF
GenAI for Risk Management: Refresher for the Boards and Executives
Alexei Sidorenko, CRMP
 
PPTX
Virbyze_Our company profile_Preview.pptx
myckwabs
 
PDF
From Risk to Opportunity: How Cybersecurity Enhances Your Staffing Business
Withum
 
PPTX
BUSINESS FINANCE POWER POINT PRESENTATION
JethSrey
 
DOCX
unit 1 BC.docx - INTRODUCTION TO BUSINESS COMMUICATION
MANJU N
 
PDF
NewBase 26 July 2025 Energy News issue - 1806 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
PPTX
Chapter 3 Distributive Negotiation: Claiming Value
badranomar1990
 
PPT
How to Protect Your New York Business from the Unexpected
Sam Vohra
 
PPTX
NTE 2025/20: Updated End User Undertaking (EUU) Form and Guidance
RT Consulting Limited
 
PDF
2025 07 29 The Future, Backwards Agile 2025.pdf
Daniel Walsh
 
PDF
Withum Webinar - OBBBA: Tax Insights for Food and Consumer Brands
Withum
 
PPTX
E-commerce and its impact on business.
pandeyranjan5483
 
PPTX
Communications Recruiter Melbourne.pptx
ReithGordon
 
Social Media Marketing for Business Growth
vidhi622006
 
Appreciations - July 25.pptxdddddddddddss
anushavnayak
 
Foreign-Direct-Investment-Shaping-the-Global-Trade-Landscape 5.pptx
Blackworld7
 
bain-temasek-sea-green-economy-2022-report-investing-behind-the-new-realities...
YudiSaputra43
 
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
Auxis Consulting & Outsourcing
 
UNIT 2 BC.docx- cv - RESOLUTION -MINUTES-NOTICE - BUSINESS LETTER DRAFTING
MANJU N
 
MDR Services – 24x7 Managed Detection and Response
CyberNX Technologies Private Limited
 
GenAI for Risk Management: Refresher for the Boards and Executives
Alexei Sidorenko, CRMP
 
Virbyze_Our company profile_Preview.pptx
myckwabs
 
From Risk to Opportunity: How Cybersecurity Enhances Your Staffing Business
Withum
 
BUSINESS FINANCE POWER POINT PRESENTATION
JethSrey
 
unit 1 BC.docx - INTRODUCTION TO BUSINESS COMMUICATION
MANJU N
 
NewBase 26 July 2025 Energy News issue - 1806 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
Chapter 3 Distributive Negotiation: Claiming Value
badranomar1990
 
How to Protect Your New York Business from the Unexpected
Sam Vohra
 
NTE 2025/20: Updated End User Undertaking (EUU) Form and Guidance
RT Consulting Limited
 
2025 07 29 The Future, Backwards Agile 2025.pdf
Daniel Walsh
 
Withum Webinar - OBBBA: Tax Insights for Food and Consumer Brands
Withum
 
E-commerce and its impact on business.
pandeyranjan5483
 
Communications Recruiter Melbourne.pptx
ReithGordon
 

2013 and 2014 ieee projects list

  • 1. 2013 and 2014 Completed IEEE Projects List Contact : K.Manjunath - 09535866270 Sl.No Project Title Year Cloud Computing 1 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud 2013 2 A Privacy Leakage Upper Bound constraint Based Approach for Cost Effective 2013 3 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment 2013 4 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 2013 5 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations 2013 6 Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 2013 7 NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013 8 On the Optimal Allocation of Virtual Resources in Cloud Computing Networks 2013 9 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization 2013 10 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System 2013 11 Privacy Preserving Delegated Access Control in Public Clouds 2013 12 Privacy Preserving Public Auditing for Secure Cloud Storage 2013 13 Toward Fine Grained Unsupervised Scalable Performance Diagnosis for Production Cloud Computing Systems 2013 14 Toward Secure Multi keyword Top-k Retrieval Over Encrypted Cloud 2013 15 Towards Differential Query Services in Cost Efficient Cloud 2013 16 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems 2013 17 Dynamic Audit Services for Outsourced Storages in Clouds 2013 18 Collaboration in Multi cloud Environments Framework and Security Issues 2013 19 Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption 2013 20 QoS Ranking Prediction for Cloud Services 2013 21 Load Rebalancing for Distributed File Systems in Clouds 2013 22 A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms 2013 23 SeDas A Self Destructing Data System Based on Active Storage Framework 2013 24 Winds of Change from Vendor Lock In to the Meta Cloud 2013 25 On Data Staging Algorithms for Shared Data Accesses in Clouds 2013 26 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 2013 27 Optimal Multi Server Configuration for Profit Maximization in Cloud Computing 2013 28 TST Threshold Based Similarity Transitivity Method in Collaborative Filtering with Cloud Computing 2013 29 Performance of Virtual Machines Under Networked Denial of Service Attacks: Experiments and Analysis 2013 30 Secure Logging as a Service—Delegating Log Management to the Cloud 2013 31 Fault Tolerance Management in Cloud Computing: A System-Level Perspective 2013 32 Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing 2012 33 Cloud Computing Security From Single to Multi-Clouds 2012 34 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage 2012 35 Efficient audit service outsourcing for data integrity in clouds 2012
  • 2. 36 Enabling Secure and Efficient Ranked Keyword Search Over Out Sourced Cloud Data 2012 37 Ensuring Distributed Accountability for Data Sharing in the Cloud 2012 38 IDSaaS Intrusion Detection System as a Service in Public Clouds 2012 39 Privacy Preserving Public Auditing for Secure Cloud Storage 2012 40 Towards Secure and Dependable Cloud Storage Server 2012 41 Secure Overlay Cloud Storage with Access Control and Assured Deletion 2012 42 A Refined RBAC Model for Cloud Computing 2012 43 Cloud Computing Services A Total Cost of Ownership Approach 2012 44 HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing 2012 45 Secure and Erasure Coding Based cloud storage system with Secure Data Forwarding 2012 Network Security 1 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 2013 2 EAACK—A Secure Intrusion-Detection System for MANETs 2013 3 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing 2013 4 Modeling the Pair wise Key Pre distribution Scheme in the Presence of Unreliable Links 2013 5 Vampire Attacks Draining life from wireless ad-hoc sensor networks 2013 6 EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks 2013 7 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013 8 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks 2013 9 Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks 2013 10 Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks 2013 11 Identity-Based Secure Distributed Data Storage Schemes 2013 12 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems 2013 13 Privacy Preserving Data Sharing With Anonymous ID Assignment 2013 14 SORT A Self-Organizing Trust Model for Peer-to-Peer Systems 2013 15 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. 2013 16 Distance Bounding: A Practical Security Solution for Real-Time Location Systems 2013 17 Minimum Cost Blocking Problem in Multi path Wireless Routing Protocols 2013 18 A Rank Correlation Based Detection against Distributed Reflection DOS Attacks 2013 19 A Secure Intrusion detection system against DDOS attack in Wireless Mobile Adhoc networks 2012 20 An Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks 2012 21 Packet-Hiding Methods for Preventing Selective Jamming Attacks 2012 22 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies 2012 23 Detecting and Resolving Firewall Policy Anomalies 2012 24 Performance of PCN-Based Admission Control Under Challenging Conditions 2012 25 Load-Balancing Multipath Switching System with Flow Slice 2012 26 A Framework for Routing Performance Analysis in delay tolerant Networks 2012 27 Revisiting Defenses Against Large-Scale Online Password Guessing Attacks 2012 28 Secure High Throughput Multicast Routing in Wireless Mesh Networks 2012 29 Online Intrusion Alert Aggregation with Generative Data Stream Modeling 2012 30 ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 2013 Adhoc Networks & Mobile Computing & VANET & MANET
  • 3. 1 Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks(MANET) 2013 2 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks (MANET) 2013 3 Efficient Algorithms for Neighbor Discovery in Wireless Networks (Adhoc) 2013 4 Multicast Capacity in MANET with Infrastructure(MANET) 2013 5 Optimal Multicast capacity and delay tradeoff in Manet (MANET) 2013 6 Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets (Adhoc) 2013 7 Performance Modeling of Safety Messages Broadcast in Vehicular Ad Hoc Networks (VANET) 2013 8 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation (Adhoc) 2013 9 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks (MANET) 2013 10 Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks (VANET) 2013 11 A Framework for Secure and Efficient Data Acquisition in Vehicular Ad Hoc Networks (VANET) 2013 12 Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks (Mobile Computing) 2013 13 Network Assisted Mobile Computing with Optimal Uplink Query Processing (Mobile Computing) 2013 14 An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc networks 2013 15 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 2013 16 Efficient Rekeying Framework for Secure Multicast with Diverse Subscription Period Mobile Users 2013 17 Risk Aware mitigation of MANET Attacks 2013 18 Balancing the Tradeoffs between Query Delay and Data Availability in MANETs 2012 19 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks 2012 20 TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks 2012 21 Throughput and Energy Efficiency in wireless ad hoc network with caussian channels 2012 Sensor Networks 1 Secure and Efficient Data Transmission for Cluster based WSN 2013 2 Toward a Statistical Framework for Source Anonymity in Sensor Networks 2013 3 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 2013 4 Mobile Relay Configuration in Data Intensive Wireless Sensor Network 2013 5 Localization in Wireless Sensor Networks Byzantines and Mitigation Techniques 2013 6 Harvesting Aware Energy Management for Time Critical WSN with Joint Voltage 2013 7 Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 2013 8 Adaptive Network Coding for Broadband Wireless Access Networks 2013 9 Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks. 2013 10 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks 2013 11 Participatory Privacy: Enabling Privacy in Participatory Sensing 2013 12 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 2013 13 Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs 2012 14 Fast Data Collection in Tree-Based Wireless Sensor Networks 2012 15 BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in WSN 2012 16 Cut Detection in Wireless Sensor Network 2012 17 Protecting Location Privacy in Sensor Networks against Global Eavesdropper 2012 18 Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2012 19 Energy Efficient Routing Mechanism in Wireless Sensor Network 2012 20 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 2012 21 Privacy- and Integrity-Preserving Range Queries in Sensor Networks 2012
  • 4. Android Projects 1 SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile- Healthcare Emergency 2013 2 Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks 2013 3 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 2013 4 Cloud MoV Cloud-based Mobile Social TV 2013 5 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds 2013 6 Android College Campus 2013 7 Nautical Telemetrically System 2013 8 Collaborative Learning Assistant for Android 2013 9 Cloud FTP: A Case Study of Migrating Traditional Applications to the Cloud 2013 10 Spatial Query Integrity with Voronoi Neighbors 2013 11 Dynamic Personalized Recommendation on Sparse Data 2013 Data Mining 1 m-Privacy for Collaborative Data Publishing 2013 2 Distributed Web Systems Performance Forecasting Using Turning Bands Method 2013 3 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks 2013 4 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia 2013 5 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm 2013 6 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments 2013 7 Privacy-Enhanced Web Service Composition 2013 8 System to Filter Unwanted Messages from OSN User Walls 2013 9 Incentive Compatible Privacy-Preserving Data Analysis 2013 10 Facilitating Effective User Navigation through Website Structure Improvement 2013 11 Optimal Route Queries with Arbitrary Order Constraints 2013 12 Fast Nearest Neighbor Search with Keywords 13 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering 2013 14 Acceleration of XML Parsing through Prefetching 2013 15 Automatic Discovery of Association Orders between Name and Aliases from the Web 2012 16 Slicing A New Approach to Privacy Preserving Data Publishing 2012 17 Ranking Model Adaptation for Domain-Specific Search 2012 18 Improving aggregate recommendation diversity using ranking-based techniques 2012 19 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators 2012 20 Dynamic Personalized Recommendation on Sparse Data 2013 21 Trust Modeling in Social Tagging of Multimedia Content 2012 22 MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS 2013 Wireless Communication
  • 5. 1 Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 2013 2 Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 2013 3 IDM: An Indirect Dissemination Mechanism for Spatial Voice Interaction in Networked Virtual Environments 2013 4 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 2012 5 Topology Control in Mobile Adhoc Networks with Cooperative Communications 2012 6 Local Greedy Approximation for Scheduling in Multi-hop Wireless Networks 2012 Image Processing and Multimedia 1 3D Face Recognition Under Expressions, Occlusions and Pose Variations 2013 2 Iris Recognition Using Possibilistic Fuzzy Matching on Local Features 2013 3 Semi supervised Biased Maximum Margin Analysis for Interactive Image Retrieval 2013 4 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words. 2013 5 A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 2013 6 An Access Point-Based FEC Mechanism for Video Transmission Over Wireless LANs 2013 7 Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks 2013 8 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks 2012 J2ME Mobile Based Projects 1 Adaptation of a virtual campus for mobile learning devices 2013 2 Bluetooth Mobile Based College Campus 2013 3 ECops via Handheld Mobile Devices 2013 4 Privacy-Conscious Location-Based Queries in Mobile Environments 2013 5 Ranking Model Adaptation for Domain-Specific Search 2013 6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile- Healthcare Emergency 2013 7 The Word in a nut shell : CONCISE RANGE QUERIES 2013