Bulk ieee projects,ieee projects 2013-14,bulk ieee projects 2013-14,bulk ieee project for...
-
Upload
praveen-kumar -
Category
Business
-
view
1.893 -
download
0
Embed Size (px)
description
Transcript of Bulk ieee projects,ieee projects 2013-14,bulk ieee projects 2013-14,bulk ieee project for...

E-CRUITMENT SOLUTIONS
IEEE 2013-14 BULK PROJECTS
JAVA J2EE*MATLAB*DOTNET*
ANDROID*NS2
Our Corporate Office
#1, E-Cruitment Solutions,, Ist Cross, Ist Main Road, Elango Nagar,
Pondicherry-605 011.
Mobile: 9751442511, 97506 101010 Phone: 0413-3240330
Mail :[email protected] Web : www.ecruitments.com

E-CRUITMENT SOLUTIONS
We are offering IEEE & Non IEEE Projects In various Domains including
IEEE Projects on Image Processing
IEEE Projects on Knowledge and Data Mining
IEEE Projects on Networking
IEEE Projects on Artificial Intelligence
IEEE Projects on Audio and Video Processing
IEEE Projects on Pattern Analysis & Machine Intelligence
IEEE Projects on Multimedia
IEEE Projects on Parallel and Distributed Systems
IEEE Projects on Mobile Computing
IEEE Projects on Software Engineering
IEEE Projects on Information Forensics and Security
IEEE Projects on Dependable and Secure Computing
IEEE Projects on Systems, Man & Cybernetics
IEEE Projects on Computers
IEEE Projects on Learning Technologies

E-CRUITMENT SOLUTIONSPROJECT SUPPORTS & DELIVERABLES
Project Abstract
IEEE Paper
PPT / Review Details
Project Report
Working Procedure/Screen
Shots
Materials & Books in CD
Project Certification

E-CRUITMENT SOLUTIONS
IEEE 2013-14 JAVA PROJECTS AT
ECRUITMENTS SOLUTIONSCLOUD COMPUTING
1. A Load Balancing Model Based on Cloud Partitioning for the Public
Cloud
2. Privacy-Preserving Public Auditing for Secure Cloud Storage
3. Winds of Change From Vendor Lock-In to the Meta Cloud.
4. Cloud computing for mobile users can offloading compution save
energy.
5. On Data Staging Algorithms for Shared Data Accesses in Clouds
6. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage
Systems
7. CloudMoV: Cloud-based Mobile Social TV
8. QoS Ranking Prediction for Cloud Services
9. Privacy-Preserving Public Auditing for Secure Cloud Storage
10. AMES-Cloud: A Framework of Adaptive Mobile Video
Streaming and Efficient Social Video Sharing in the Clouds
DATA MINING:
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High
Dimensional Data
2. A Framework for Mining Signatures from Event Sequences and Its
Applications in Healthcare Data
3. A Novel Profit Maximizing Metric for Measuring Classification
Performance of Customer Churn Prediction Models
4. A Survey of XML Tree Patterns

E-CRUITMENT SOLUTIONS5. Change Detection in Streaming Multivariate Data Using Likelihood
Detectors
6. Dynamic Personalized Recommendation on Sparse Data
7. Mining User Queries with Markov Chains: Application to Online
Image Retrieval
8. Optimal Route Queries with Arbitrary Order Constraints
9. Failure-Aware Cascaded Suppression in Wireless Sensor Networks
PARLLEL DISTRIBUTION
1. IP-Geolocation Mapping for Moderately Connected Internet
Regions
2. A Secure Protocol for Spontaneous Wireless Ad Hoc Networks
Creation
3. Analysis of Distance-Based Location Management in Wireless
Communication Networks.
4. Dynamic Resource Allocation Using Virtual Machines for Cloud
Computing Environment
5. Dynamic Optimization of Multiattribute Resource Allocation in
Self-Organizing Clouds
6. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City
Environments
7. Towards Differential Query Services in Cost-Efficient Clouds.
8. A Privacy Leakage Upper-bound Constraint based Approach for
Cost-effective Privacy Preserving of Intermediate Datasets in
Cloud.
9. Enabling Data Dynamic and Indirect Mutual Trust for Cloud
Computing Storage Systems.
10. ASAP: An Adaptive Sampling Approach to Data Collection in
Sensor Networks.

E-CRUITMENT SOLUTIONS
MOBILE COMPUTING
1. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
2. EAACK—A Secure Intrusion-Detection System for MANETs
3. Vampire attacks:Draining life from wireless ad-hoc sensor networks.
4. Towards a Statistical Framework for Source Anonymity in Sensor Networks
5. Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
6. Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
7. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
8. Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
9. IP-Geolocation Mapping for Moderately Connected Internet Regions
10. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users

E-CRUITMENT SOLUTIONS11. EMAP: Expedite Message Authentication Protocol for
Vehicular Ad Hoc Networks
12. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
NETWORKING
1. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
2. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
3. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
4. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
5. Efficient Algorithms for Neighbor Discovery in Wireless Networks
6. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
7. Answering “What-If” Deployment and Configuration Questions With WISE: Techniques and Deployment Experience
8. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
9. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
10. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
11. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.

E-CRUITMENT SOLUTIONS12. Participatory Privacy Enabling Privacy in Participatory
Sensing.
SERVICE COMPUTING
1. Privacy-Enhanced Web Service Composition
2. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
3. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
4. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
5. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
SECURE COMPUTING
1. CAM: Cloud-Assisted Privacy Preserving Mobile Health
Monitoring.
2. Secure Encounter-based Mobile Social Networks
Requirements Designs and Tradeoffs.
3. Two tales of privacy in online social networks.

E-CRUITMENT SOLUTIONS
IEEE 2013-14 DOTNET PROJECTS AT
ECRUITMENTS SOLUTIONS
PARLLEL DISTRIBUTION
1. Lightweight Location Verification Algorithms for Wireless Sensor Networks
2. Heterogeneous Resource Allocation under Degree Constraints
3. Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
4. GKAR: A Novel Geographic K-Anycast Routing for Wireless Sensor Networks
5. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
6. Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
7. Dynamic Optimization of Multiattribute Resource Allocation in Self-Organizing Clouds
8. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
9. ASAP: An Adaptive Sampling Approach to Data Collection in Sensor Networks
10. A New Progressive Algorithm for a Multiple Longest Common Subsequences Problem and Its Efficient Parallelization
11. A General Framework for Efficient Continuous Multidimensional Top-k Query Processing in Sensor Networks
CLOUD COMPUITNG

E-CRUITMENT SOLUTIONS1. A Load Balancing Model Based on Cloud Partitioning for the
Public Cloud2. Privacy-Preserving Public Auditing for Secure Cloud Storage3. Scalable and Secure Sharing of Personal Health Records in
Cloud Computing Using Attribute-Based Encryption4. Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems5. CloudMoV: Cloud-based Mobile Social TV6. Privacy Preserving Delegated Access Control in Public
Clouds.7. Attribute-based Access to Scalable Media in Cloud-assisted
Content Sharing Networks.
DATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
2. Secure Mining of Association Rules in Horizontally Distributed Databases.
3. A Novel Profit Maximizing Metric for Measuring Classification Performance of Customer Churn Prediction Models
4. ELCA: Evaluation for Keyword Search on Probabilistic XML Data.
5. Change Detection in Streaming Multivariate Data Using Likelihood Detectors
6. Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
7. Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
8. Optimal Route Queries with Arbitrary Order Constraints9. Failure-Aware Cascaded Suppression in Wireless Sensor
Networks
MOBILE COMPUTING
1. A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
2. EAACK—A Secure Intrusion-Detection System for MANETs3. Efficient Rekeying Framework for Secure Multicast with
Diverse-Subscription-Period Mobile Users4. Toward Privacy Preserving and Collusion Resistance in a
Location Proof Updating System5. Passive Duplicate Address-Detection Schemes for On-
Demand Routing Protocols in Mobile Ad Hoc Networks

E-CRUITMENT SOLUTIONS6. On Quality of Monitoring for Multi-channel Wireless
Infrastructure Networks7. Mobile Relay Configuration in Data-Intensive Wireless
Sensor Networks8. IP-Geolocation Mapping for Moderately Connected Internet
Regions9. Efficient Rekeying Framework for Secure Multicast with
Diverse-Subscription-Period Mobile Users10. EMAP: Expedite Message Authentication Protocol for
Vehicular Ad Hoc Networks
NETWORKING
1. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
2. Novel Packet-Level Resource Allocation with Effective QoS Provisioning for Wireless Mesh Networks
3. Exploring the Design Space of Multichannel Peer-to-Peer Live Video Streaming Systems
4. Diffusion Dynamics of Network Technologies With Bounded Rational Users: Aspiration-Based Learning
5. Delay-Based Network Utility Maximization6. Answering “What-If” Deployment and Configuration
Questions With WISE: Techniques and Deployment Experience
7. An Empirical Interference Modeling for Link Reliability Assessment in Wireless Networks
8. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
SERVICE COMPUTING
1. Privacy-Enhanced Web Service Composition2. Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing3. NICE: Network Intrusion Detection and Countermeasure Selection
in Virtual Network Systems4. Document Clustering for Forensic Analysis: An Approach for
Improving Computer Inspection

E-CRUITMENT SOLUTIONS
IEEE 2013-14 ANDROID PROJECTS AT
ECRUITMENTS SOLUTIONS
PARLLEL DISTRIBUTION
1. Distributed Web Systems Performance Forecasting Using Turning
Bands Method
2. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
3. Security Analysis of a Single Sign-On Mechanism for Distributed
Computer Networks
4. Exploiting Ubiquitous Data Collection for Mobile Users in Wireless
Sensor Networks
5. Analysis of Distance-Based Location Management in Wireless
Communication Networks
CLOUD COMPUITNG
1. A Load Balancing Model Based on Cloud Partitioning for the Public
Cloud
2. Privacy-Preserving Public Auditing for Secure Cloud Storage

E-CRUITMENT SOLUTIONS3. Scalable and Secure Sharing of Personal Health Records in Cloud
Computing Using Attribute-Based Encryption
4. Enabling Dynamic Data and Indirect Mutual Trust for Cloud
Computing Storage Systems
5. CloudMoV: Cloud-based Mobile Social TV

E-CRUITMENT SOLUTIONSDATA MINING
1. A Fast Clustering-Based Feature Subset Selection Algorithm for
High Dimensional Data
2. Finding Rare Classes Active Learning with Generative and
Discriminative Models
3. A Generalized Flow-Based Method for Analysis of Implicit
Relationships on Wikipedia
4. A Survey of XML Tree Patterns
5. Anonymization of Centralized and Distributed Social Networks by
Sequential Clustering
6. T-Drive Enhancing Driving Directions with Taxi Drivers�
Intelligence
7. Region-Based Foldings in Process Discovery
8. Ranking on Data Manifold with Sink Points
9. Evaluating Data Reliability An Evidential Answer with Application
to a Web-Enabled Data Warehouse
MOBILE COMPUTING
1. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc
Networks
2. Toward Privacy Preserving and Collusion Resistance in a Location
Proof Updating System
3. SSD A Robust RF Location Fingerprint Addressing Mobile
Devices� Heterogeneity
4. A Scalable Server Architecture for Mobile Presence Services in
Social Network Applications
5. Target Tracking and Mobile Sensor Navigation in Wireless Sensor
Networks

E-CRUITMENT SOLUTIONSSERVICE COMPUTING
1. Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
2. Document Clustering for Forensic Analysis: An Approach for
Improving Computer Inspection
3.Enforcing Secure and Privacy-Preserving Information Brokering in
Distributed Information Sharing
IEEE 2013-14 MATLAB PROJECTS AT
ECRUITMENTS SOLUTIONS
IMAGE PROCESSING:
1. A Hybrid Multiview Stereo Algorithm for Modeling Urban Scenes.
2. Rich Intrinsic Image Decomposition of Outdoor Scenes from
Multiple Views.
3. Casual Stereoscopic Photo Authoring.
4. Interactive Segmentation for Change Detection in Multispectral
Remote-Sensing Images
5. Estimating Information from Image Colors An Application to
Digital Cameras and Natural Scenes.
6. Airborne Vehicle Detection in Dense Urban Areas Using HoG
Features and Disparity Maps.
7. Automatic Detection and Reconstruction of Building Radar
Footprints From Single VHR SAR Images
8. Estimating Information from Image Colors An Application to
Digital Cameras and Natural Scenes.
9. Hyperspectral Imagery Restoration Using Nonlocal Spectral-
Spatial Structured Sparse Representation With Noise Estimation.

E-CRUITMENT SOLUTIONS10. Estimating Information from Image Colors An Application to
Digital Cameras and Natural Scenes.
11. Robust Face Recognition for Uncontrolled Pose and
Illumination Changes.
12. Linear Distance Coding for Image Classi?cation.
13. Reversible Watermarking Based on Invariant Image Classi?
cation and Dynamic Histogram Shifting
14. Discrete Wavelet Transform and Data Expansion Reduction
in Homomorphic Encrypted Domain.
15. Secure Watermarkingfor Multimedia Content Protection.
16. Extracting Spread-Spectrum Hidden Data from Digital
Media.
17. Image Size Invariant Visual Cryptography for General
Access Structures Subject to Display Quality Constraints.
18. A Watermarking Based Medical Image Integrity Control
System and an Image Moment Signature for Tampering
Characterization
19. Discrete Wavelet Transform and Data Expansion Reduction
in Homomorphic Encrypted Domain.
20. LDFT-Based Watermarking Resilient to Local
Desynchronization Attacks.
21. Structured Output Layer Neural Network Language Models
for Speech Recognition.

E-CRUITMENT SOLUTIONSIEEE 2013-14 NS2 PROJECTS AT
ECRUITMENTS SOLUTIONS
1. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
2. Model-Based Analysis of Wireless System Architectures for Real-Time Applications.
3. Toward a Statistical Framework for Source Anonymity in Sensor Networks .
4. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks .
5. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models.
6. Capacity of Hybrid Wireless Mesh Networks with Random APs.
7. EAACK � A Secure Intrusion-Detection System for MANETs.
8. Delay-Optimal Broadcast for Multihop Wireless Networks Using Self-Interference Cancellation .
9. Distance Bounding A Practical Security Solution for Real-Time Location Systems .
10. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks.
11. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks .
12. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks .
13. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks .
14. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network .
15. In-Network Estimation with Delay Constraints in Wireless Sensor Network .
16. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation Scaling .
17. Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
18. Network Traffic Classification Using Correlation Information .
19.Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks .

E-CRUITMENT SOLUTIONS20. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks21. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks.22. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks.23. Analysis of Distance-Based Location Management in Wireless Communication Networks.24. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks.25. Quality-Differentiated Video Multicast in Multirate Wireless Networks