IMAGE PROCESSING - MULTIMEDIA |
1. Visual Object Tracking Based on Local Steering Kernels and Color Histograms |
|
|
|
|
2. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores |
|
|
|
|
3. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization |
|
|
|
|
4. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition |
|
|
|
|
5. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering |
|
|
|
|
NETWORKING |
1. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey |
|
|
|
|
2. The Target Tracking in Mobile Sensor Networks |
|
|
|
|
3. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay |
|
|
|
|
4. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks |
|
|
|
|
5. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking |
|
|
|
|
More Projects>> |
SOFTWARE ENGINEERING |
1. Analyzing the Friendliness of Exchanges in an Online Software Developer Community |
|
|
|
|
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) |
1. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development |
|
|
|
|
2. SUSIE: Search Using Services and Information Extraction |
|
|
|
|
3. SeDas: A Self-Destructing Data System Based on Active Storage Framework |
|
|
|
|
4. Secure Mining of Association Rules in Horizontally Distributed Databases |
|
|
|
|
5. Sampling Online Social Networks |
|
|
|
|
More Projects>> |
PARALLEL AND DISTRIBUTED SYSTEMS |
1. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency |
|
|
|
|
2. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks |
|
|
|
|
3. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data |
|
|
|
|
4. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks |
|
|
|
|
SECURE COMPUTING |
1. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption |
|
|
|
|
2. Privacy Preserving Data Sharing With Anonymous ID Assignment |
|
|
|
|
3. Non-Cooperative Location Privacy |
|
|
|
|
4. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing |
|
|
|
|
5. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol |
|
|
|
|
CLOUD COMPUTING |
1. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption |
|
|
|
|
2. Cloud based emails boundaries and vulnerabilities |
|
|
|
|
3. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks |
|
|
|
|
MOBILE COMPUTING - WIRELESS COMMUNICATION |
1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System |
|
|
|
|
2. Optimal Multicast Capacity and Delay Tradeoffs in MANETs |
|
|
|
|
3. Optimal Content Downloading in Vehicular Networks |
|
|
|
|
4. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks |
|
|
|
|
5. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks |
|
|
|
|
|
|
Android Application Demo |
|
|
|
Professional Referrance |
|
- Enterprise IT Training
- Interview Questions
- Technical Reference
- Placement Papers
- Inplant Training
|
 |
|
IEEE 2014 Latest Projects |
|
- IEEE 2013 Projects
- IEEE 2012 Projects
- Software Application Projects
|
|
Online Projects Support |
|
 |
 |
|
|