MOBILE COMPUTING - WIRELESS COMMUNICATION |
1. Keylogging-resistant Visual Authentication Protocols |
|
|
|
|
SOFTWARE ENGINEERING |
1. Governing Software Process Improvements in Globally Distributed Product Development |
|
|
|
|
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) |
1. Cotton Leaf Disease Identification using Pattern Recognition Techniques |
|
|
|
|
2. Efficient Community Formation for Web Services |
|
|
|
|
3. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform |
|
|
|
|
4. Secure Mining of Association Rules in Hor izontally Distributed Databases |
|
|
|
|
5. Dynamic Query Forms for Database Queries |
|
|
|
|
More Projects>> |
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING |
1. A Random Decision Tree Framework for Privacy-Preserving Data Mining |
|
|
|
|
2. Analysis of Field Data on Web Security Vulnerabilities |
|
|
|
|
3. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation |
|
|
|
|
4. A Reliability Improvement Method for SOA-Based Applications |
|
|
|
|
5. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates |
|
|
|
|
More Projects>> |
CLOUD COMPUTING |
1. Location Aware Keyword Query Suggestion Based on Document Proximity |
|
|
|
|
2. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud |
|
|
|
|
3. A secure data self-destructing scheme in cloud computing |
|
|
|
|
4. A Dynamic Secure Group Sharing Framework in Public Cloud Computing |
|
|
|
|
5. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data |
|
|
|
|
More Projects>> |
IMAGE PROCESSING - MULTIMEDIA |
1. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting |
|
|
|
|
2. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions |
|
|
|
|
3. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback |
|
|
|
|
4. FeatureMatch: A General ANNF Estimation Technique and its Applications |
|
|
|
|
5. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion |
|
|
|
|
More Projects>> |
NETWORKING |
1. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes |
|
|
|
|
2. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness |
|
|
|
|
3. Designing Truthful Spectrum Double Auctions with Local Markets |
|
|
|
|
4. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
|
|
|
|
5. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail |
|
|
|
|
More Projects>> |
INTERNATIONAL CONFERENCE |
1. A Study on Clinical Prediction Using Data Mining Techniques |
|
|
|
|
2. Online Payment System using Steganography and Visual Cryptography |
|
|
|
|
3. Efficient Instant-Fuzzy Search with Proximity Ranking |
|
|
|
|
4. Attribute Based Encryption with Privacy Preserving In Clouds |
|
|
|
|
5. A Secure Client Side Deduplication Scheme in Cloud Storage Environments |
|
|
|
|
|
|
Android Application Demo |
|
|
|
Professional Referrance |
|
- Enterprise IT Training
- Interview Questions
- Technical Reference
- Placement Papers
- Inplant Training
|
 |
|
IEEE 2014 Latest Projects |
|
- IEEE 2013 Projects
- IEEE 2012 Projects
- Software Application Projects
|
|
Online Projects Support |
|
 |
 |
|
|