Tuesday, 14 October 2014

IEEE 2015-2016 PROJECTS


FINAL YEAR STUDENT PROJECT 2015-2016

 ANDROID PROJECT:-



2015 – 2016 IEEE ANDROID PROJECT TITLES  

1) A Real-Time Adaptive Algorithm for Video Streaming over Multiple Wireless Access Networks
2) Catch Me If You Can: Evaluating Android Anti-Malware against Transformation Attacks
3) Collaborative Policy Administration
4) Context-based Access Control Systems for Mobile Devices
5) Context-driven, Prescription-Based Personal Activity Classification: Methodology, Architecture, and End-to-End Implementation
6) Cooperative Positioning and Tracking in Disruption Tolerant Networks
7) DELTA++: Reducing the Size of Android Application Updates
8) Effective Risk Communication for Android Apps
9) Face-to-Face Proximity Estimation Using Bluetooth on Smart phones
10) Generating Summary Risk Scores for Mobile Applications
11)GreenDroid: Automated Diagnosis of Energy Inefficiency for Smartphone Applications
12) Hiding in the Mobile Crowd: Location Privacy through Collaboration
13) How Long to Wait? Predicting Bus Arrival Time with Mobile Phone Based Participatory Sensing
14) MOSES: Supporting and Enforcing Security Profiles on Smartphone's
15) Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones
16) The Places of Our Lives: Visiting Patterns and Automatic Labeling from Longitudinal Smartphone Data.

JAVA PROJECT
 2015 – 2016  IEEE JAVA PROJECT TITLE

CLOUD COMPUTING
1) A Hybrid Cloud Approach for Secure Authorized Reduplication
2) A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
3) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
4) Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
5) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
6) Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
7) Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
8) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
9) Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
10) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
11) Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
12) Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
13) Towards Differential Query Services in Cost-Efficient Clouds
DATA MINING
14) A Cocktail Approach for Travel Package Recommendation
15) Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
16) BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
17) Data Mining with Big Data
18) Dealing With Concept Drifts in Process Mining
19) Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
20) Efficient Prediction of Difficult Keyword Queries over Databases
21) Facilitating Document Annotation Using Content and Querying Value
22) Fast Nearest Neighbor Search with Keywords
23) Keyword Query Routing
24) Privacy-Preserving and Content-Protecting Location Based Queries
25) Security Evaluation of Pattern Classifiers under Attack
26) Supporting Privacy Protection in Personalized Web Search
27) Towards Online Shortest Path Computation

SECURE COMPUTING
28) Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
29) Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
30) PROFILR: Toward Preserving Privacy and Functionality in Geo social Networks
31) Top-k Query Result Completeness Verification in Tiered Sensor Networks

NETWORKING
32) Automatic Test Packet Generation
33) Cost-Effective Resource Allocation of Overlay Routing Relay
Nodes
34) Boundary Cutting for Packet Classification
35) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
 PARALLEL AND DISTRIBUTED SYSTEMS
36) Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
37) Exploiting Service Similarity for Privacy in Location-Based Search Queries
38) LocaWard: A Security and Privacy Aware Location-Based Rewarding System
39) On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
40) RRE: A Game-Theoretic Intrusion Response and Recovery Engine
41) Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
42) SOS: A Distributed Mobile Q&A System Based on Social Networks
43) The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation
44) The Design and Evaluation of An Information Sharing System for Human Networks
45) Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
46) Secure Outsourced Attribute-based Signatures.
  
MOBILE COMPUTING
47) An Incentive Framework for Cellular Traffic Offloading
48) Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
49)  Efficient Authentication for Mobile and Pervasive Computing
50) Friendbook: A Semantic-based Friend Recommendation System for Social Networks
51) Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
  
SERVICE COMPUTING (Web Service)
52) Privacy-Enhanced Web Service Composition
53) Web Service Recommendation via Exploiting Location and QoS Information
     

DOT NET PROJECT:- 

 2015 – 2016 IEEE DOT NET PROJECT TITLES

CLOUD COMPUTING
1) Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
2) Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
3) Consistency as a Service: Auditing Cloud Consistency
4) Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
5) Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
6) Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
7) Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
8) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
9) Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
10) Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
11)  Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

DATA MINING
12) A Cocktail Approach for Travel Package Recommendation
13) An Empirical Performance Evaluation of Relational Keyword Search Techniques
14) LARS*: An Efficient and Scalable Location-Aware Recommender System
15) Product Aspect Ranking and Its Applications
16) Secure Mining of Association Rules in Horizontally Distributed Databases
17) Supporting Privacy Protection in Personalized Web Search
18) Trusted DB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
19) Typicality-Based Collaborative Filtering Recommendation

SECURE COMPUTING
20) Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
 
NETWORKING
21) Content Caching and Scheduling in Wireless Networks with Elastic and Inelastic Traffic
22) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
PARALLEL AND DISTRIBUTED SYSTEMS
23) A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
24) A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
25) An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
26) Certificate less Remote Anonymous Authentication Schemes for Wireless Body Area Networks
27) Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
28) Multicast Capacity in MANET with Infrastructure Support
29) Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
30) Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing

MOBILE COMPUTING
31) A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
32) Autonomous Mobile Mesh Networks
33) DA-Sync: A Doppler-Assisted Time-Synchronization Scheme  for Mobile Underwater Sensor Networks
34) Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
35) Preserving Location Privacy in Geo social Applications

PATTERN ANALYSIS & MACHINE INTELLIGENCE
36) Web Image Re-Ranking Using Query-Specific Semantic Signatures
IMAGE PROCESSING
37) Click Prediction for Web Image Reran king Using Multimodal Sparse Coding
38) Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation





No comments:

Post a Comment

Best Video Learn Make Money Online in You Tube Website

Learn Make Money Online in You Tube Website Very soon Upload link sorry for inconvenient