IMAGE PROCESSING - MULTIMEDIA |
1. View-invariant action recognition based on Artificial Neural Networks |
|
|
|
|
2. User-aware Image Tag Refinement via Ternary Semantic Analysis |
|
|
|
|
3. Separable Reversible Data Hiding in Encrypted Image |
|
|
|
|
4. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval |
|
|
|
|
5. Robust Watermarking of Compressed and Encrypted JPEG2000 Images |
|
|
|
|
More Projects>> |
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) |
1. Scalable Scheduling of Updates in Streaming Data Warehouses |
|
|
|
|
2. Scalable Learning of Collective Behavior |
|
|
|
|
3. Ranking Model Adaptation for Domain-Specific Search |
|
|
|
|
4. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators |
|
|
|
|
5. Outsourced Similarity Search on Metric Data Assets |
|
|
|
|
More Projects>> |
PARALLEL AND DISTRIBUTED SYSTEMS |
1. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency |
|
|
|
|
2. Dynamic Authentication for Cross-Realm SOA-Based Business Processes |
|
|
|
|
3. Resource-Aware Application State Monitoring |
|
|
|
|
4. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection |
|
|
|
|
5. Query Access Assurance in Outsourced Databases |
|
|
|
|
More Projects>> |
SECURE COMPUTING |
1. ROAuth: Recommendation Based Open Authorization |
 |
|
|
|
2. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique |
|
|
|
|
3. Recommendation Models for Open Authorization |
|
|
|
|
4. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group |
|
|
|
|
5. Packet-Hiding Methods for Preventing Selective Jamming Attacks |
|
|
|
|
More Projects>> |
SOFTWARE ENGINEERING |
1. Measuring Code Quality to Improve Specification Mining |
|
|
|
|
2. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development |
|
|
|
|
CLOUD COMPUTING |
1. Towards Secure and Dependable Storage Services in Cloud Computing |
|
|
|
|
2. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption |
|
|
|
|
3. Remote Display Solutions for Mobile Cloud Computing |
|
|
|
|
4. Privacy Preserving Delegated Access Control in Public Clouds |
|
|
|
|
5. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing |
|
|
|
|
More Projects>> |
NETWORKING |
1. SPREAD: Improving network security by multipath routing in mobile ad hoc networks |
|
|
|
|
2. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms |
|
|
|
|
3. Load-Balancing Multipath Switching System with Flow Slice |
|
|
|
|
4. Assessing the Veracity of Identity Assertions via OSNs |
|
|
|
|
5. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform |
|
|
|
|
More Projects>> |
MOBILE COMPUTING - WIRELESS COMMUNICATION |
1. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications |
|
|
|
|
2. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper |
|
|
|
|
3. Network Assisted Mobile Computing with Optimal Uplink Query Processing |
|
|
|
|
4. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions |
|
|
|
|
5. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees |
|
|
|
|
More Projects>> |
INTERNATIONAL CONFERENCE |
1. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks |
|
|
|
|
2. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines |
|
|
|
|
3. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors |
|
|
|
|
4. Hiding Sensitive Association Rule for Privacy Preservation |
|
|
|
|
5. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks |
|
|
|
|
More Projects>> |
|
|
Android Application Demo |
|
|
|
Professional Referrance |
|
- Enterprise IT Training
- Interview Questions
- Technical Reference
- Placement Papers
- Inplant Training
|
 |
|
IEEE 2014 Latest Projects |
|
- IEEE 2013 Projects
- IEEE 2012 Projects
- Software Application Projects
|
|
Online Projects Support |
|
 |
 |
|
|