Sie sind auf Seite 1von 7

IEEE 2014 PROJECTS

S.N
o

Code

Title

LSJ1401

LSJ1402

LSJ1403

LSJ1404

LSJ1405

LSJ1406

LSJ1407

LSJ1408

LSJ1409

10

LSJ1410

11

LSJ1411

12

LSJ1412

13

LSJ1413

14

LSJ1414

15

LSJ1415

16

LSJ1416

17

LSJ1417

A Hybrid Cloud Approach for Secure Authorized


Reduplications
A Scalable Two Phase Top Down Specialization
Approach for Data Anonymization Using Map Reduce
on Cloud
A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud Computing
Systems
Building Confidential and Efficient Query Services in
the Cloud with RASP Data Perturbation
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases
Expressive, Efficient, and Revocable Data Access
Control for Multi Authority Cloud Storage
Key-Aggregate Cryptosystem for Scalable Data
Sharing in Cloud Storage
Oruta: Privacy-Preserving Public Auditing for Shared
Data in the Cloud
PACK Prediction-Based Cloud Bandwidth and Cost
Reduction System
Privacy Preserving Multi Keyword Ranked Search over
Encrypted Cloud Data
Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds
Towards Differential Query Services in Cost-Efficient
Clouds
A Cocktail Approach for Travel Package
Recommendation
Accuracy-Constrained Privacy Preserving Access
Control Mechanism for Relational Data
Best Peer++ A Peer-to-Peer Based Large-Scale Data
Processing Platform
Data Mining with Big Data

18

LSJ1418

Dealing With Concept Drifts in Process Mining

19

LSJ1419

20

LSJ1420

21

LSJ1421

22

LSJ1422

23

Category

Tech

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Data Mining

JAVA

Data Mining

JAVA

Data Mining

JAVA

Data Mining

JAVA

Data Mining

JAVA

Data Mining

JAVA

Data Mining

JAVA

Data Mining

JAVA

Fast Nearest Neighbor Search with Keywords

Data Mining

JAVA

LSJ1423

Keyword Query Routing

Data Mining

JAVA

24

LSJ1424

Privacy-Preserving and Content-Protecting Location


Based Queries

Data Mining

JAVA

25

LSJ1425

Security Evaluation of Pattern Classifiers under Attack

Data Mining

JAVA

26

LSJ1426

Supporting Privacy Protection in Personalized Web


Search

Data Mining

JAVA

Discovering Emerging Topics in Social Streams via


Link-Anomaly Detection
Efficient Prediction of Difficult Keyword Queries over
Databases
Facilitating Document Annotation Using Content and
Querying Value

IEEE 2014 PROJECTS


27

LSJ1427

Towards Online Shortest Path Computation

28

LSJ1428

29

LSJ1429

30

LSJ1430

31

LSJ1431

32

LSJ1432

33

LSJ1433

34

LSJ1434

35

LSJ1435

36

LSJ1436

Enabling Trustworthy Service Evaluation in ServiceOriented Mobile Social Networks

37

LSJ1437

Exploiting Service Similarity for Privacy in LocationBased Search Queries

38

LSJ1438

LocaWard A Security and Privacy Aware LocationBased Rewarding System

39

LSJ1439

On False Data-Injection Attacks against Power System


State Estimation Modeling and Countermeasures

40

LSJ1440

RRE: A Game-Theoretic Intrusion Response and


Recovery Engine

41

LSJ1441

Securing Broker-Less Publish Subscribe Systems


Using Identity-Based Encryption

42

LSJ1442

SOS A Distributed Mobile Q&A System Based on


Social Networks

43

LSJ1443

The Client Assignment Problem for Continuous


Distributed Interactive Applications Analysis,
Algorithms, and Eva

44

LSJ1444

The Design and Evaluation of An Information Sharing


System for Human Networks

45

LSJ1445

Traffic Pattern-Based Content Leakage Detection for


Trusted Content Delivery Networks

46

LSJ1446

Secure Outsourced Attribute-based Signatures

47

LSJ1447

48

LSJ1448

49

LSJ1449

An Incentive Framework for Cellular Traffic Offloading


Cooperative Caching for Efficient Data Access in
Disruption Tolerant Networks
Efficient Authentication for Mobile and Pervasive
Computing

Captcha as Graphical PasswordsA New Security


Primitive Based on Hard AI Problems
Efficient and Privacy Aware Data Aggregation in
Mobile Sensing
PROFILR Toward Preserving Privacy and Functionality
in Geo social Networks
Top-k Query Result Completeness Verification in
Tiered Sensor Networks
Automatic Test Packet Generation
Cost Effective Resource Allocation of Overlay Routing
Relay Nodes
Boundary Cutting for Packet Classification
Secure Data Retrieval For Decentralized DisruptionTolerant Military Networks

Data Mining

JAVA

Secure Computing

JAVA

Secure Computing

JAVA

Secure Computing

JAVA

Secure Computing

JAVA

Networking

JAVA

Networking

JAVA

Networking

JAVA

Networking

JAVA

Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Mobile Computing

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA
JAVA

Mobile Computing

JAVA

Mobile Computing

JAVA

IEEE 2014 PROJECTS


Friend book A Semantic-based Friend
Recommendation System for Social Networks
Optimal Distributed Malware Defense in Mobile
Networks with Heterogeneous Devices

50

LSJ1450

51

LSJ1451

52

LSJ1452

Privacy-Enhanced Web Service Composition

53

LSJ1453

Web Service Recommendation via Exploiting Location


and QoS Information

54

LSJ1454

A System for Denial-of-Service Attack Detection


Based on Multivariate Correlation Analysis

55

LSJ1455

56

LSJ1456

57

LSJ1457

58

LSJ1458

59

LSJ1459

60

LSJ1460

61

LSJ1461

62

LSJ1462

63
64
65

LSJ1463
LSJ1464
LSJ1465

66

LSJ1466

67

LSJ1467

68

LSJ1468

69

LSJ1469

70

LSJ1470

71

LSJ1471

Multi-Path Routing and Forwarding in Non-Cooperative


Wireless Networks

72

LSJ1472

A Lightweight Encryption Scheme for Network-Coded


Mobile Ad Hoc Networks

73

LSJ1473

Secure Mining of Association Rules in Horizontally


Distributed Databases
Privacy Preserving Delegated Access Control in Public
Clouds
m-Privacy for Collaborative Data Publishing
Personalized Web Search Using Browsing History and
Domain
Knowledge
SocialTube: P2P-Assisted Video Sharing in Online
Social Networks
An Efficient Certificate less Encryption for Secure
Data Sharing in Public Clouds
Authorized Public Auditing of Dynamic Big Data
Storage on Cloud with Efficient Verifiable Fine-Grained
Updates
Achieving Effective Cloud Search Services: Multikeyword Ranked Search over Encrypted Cloud Data
Supporting Synonym Query
XSPath: Navigation on XML Schemas Made Easy
Dynamic Query Forms for Database Queries
K-Anonymity for Crowdsourcing Database
A Supermodularity-Based Differential Privacy
Preserving
Algorithm for Data Anonymization
Adductive Analysis of Administrative Policies in RuleBased
Access Control
Low-Priced and Energy-Efficient Detection of Replicas
for
Wireless Sensor Networks
Evaluation of Web Security Mechanisms Using
Vulnerability &
Attack Injection
Malware Propagation in Large-Scale Networks

Asymmetric Social Proximity Based Private Matching


Protocols

Mobile Computing

JAVA

Mobile Computing

JAVA

Service Computing
(Web Service)
Service Computing
(Web Service)
Parallel &
Distributed
Systems

JAVA
JAVA
JAVA

Data Mining

JAVA

Cloud Computing

JAVA

Data Mining

JAVA

Intelligent
Computing

JAVA

Parallel &
Distributed
Systems

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Cloud Computing

JAVA

Data Mining
Data Mining
Data Mining

JAVA
JAVA
JAVA

Data Mining

JAVA

Secure Computing

JAVA

Secure Computing

JAVA

Secure Computing

JAVA

Secure Computing
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed

JAVA
JAVA

JAVA
JAVA

IEEE 2014 PROJECTS

74

LSJ1474

75

LSJ1475

76

LSJ1476

77

LSJ1477

78

LSJ1478

79

LSJ1479

80

LSJ1480

81

LSJ1481

82

LSJ1482

83

LSJ1483

84

LSJ1484

85

LSJ1485

86

LSJ1486

87

LSD1401

88

LSD1402

89

LSD1403

90

LSD1404

91

LSD1405

92

LSD1406

93

LSD1407

94

LSD1408

95

LSD1409

96

LSD1410

97

LSD1411

for Online Social Networks


A General Self-Organized Tree-Based Energy-Balance
Routing
Protocol for Wireless Sensor Network
Personalized Geo-Specific Tag Recommendation for
Photos on
Social Websites
Reputation Measurement and Malicious Feedback
Rating
Prevention in Web Service Recommendation Systems
Image Search Reranking With Query-Dependent ClickBased
Relevance Feedback
Probabilistic Aspect Mining Model for Drug Reviews
LARS*: An Efficient and Scalable Location-Aware
Recommender
System
A Two-stage Deonoymization Attack Against
Anonymized Social Networks
Privacy Preserving Enhance Collaborative Tagging
Shared Authority Based Privacy-preserving
Authentication Protocol in Cloud Computing
Performance and cost evaluation of an adaptive
encryption architecture for cloud databases
Behaviour Malware detection in Delay Tolerant
Network
Privacy-Preserving Optimal Meeting Location
Determination on Mobile Devices
Preserving location privacy in geo social application
Balancing Performance, Accuracy, and Precision for
Secure Cloud Transactions
Building Confidential and Efficient Query Services in
the Cloud with RASP Data Perturbation
Consistency as a Service: Auditing Cloud Consistency
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases
Enabling Data Integrity Protection in RegeneratingCoding-Based Cloud Storage: Theory and
Implementation
Identity-Based Distributed Provable Data Possession
in Multi- Cloud Storage
Key-Aggregate Cryptosystem for Scalable Data
Sharing in Cloud Storage
Panda: Public Auditing for Shared Data with Efficient
User Revocation in the Cloud
Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data
Scalable Distributed Service Integrity Attestation for
Software as a Service Clouds

Systems
Networking

JAVA

Multimedia

JAVA

Service Computing

JAVA

Image processing

JAVA

Data Mining

JAVA

Data Mining

JAVA

Parallel &
Distributed
Systems
Data Mining
Parallel &
Distributed
Systems

JAVA
JAVA
JAVA

Cloud Computing

JAVA

Parallel &
Distributed
Systems

JAVA

Mobile Computing

JAVA

Mobile Computing

JAVA

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

Cloud Computing

.NET

IEEE 2014 PROJECTS


A Cocktail Approach for Travel Package
Recommendation
An Empirical Performance Evaluation of Relational
Keyword Search Techniques
LARS*: An Efficient and Scalable Location-Aware
Recommender System
Product Aspect Ranking and Its Applications
Secure Mining of Association Rules in Horizontally
Distributed Databases
Supporting Privacy Protection in Personalized Web
Search
Trusted DB: A Trusted Hardware-Based Database with
Privacy and Data Confidentiality
Typicality-Based Collaborative Filtering
Recommendation
Captcha as Graphical PasswordsA New Security
Primitive Based on Hard AI Problems
Content Caching and Scheduling in Wireless Networks
With Elastic and Inelastic Traffic
Secure Data Retrieval for Decentralized DisruptionTolerant Military Networks
A Probabilistic Misbehavior Detection Scheme toward
Efficient Trust Establishment in Delay-Tolerant
Networks

98

LSD1412

99

LSD1413

100

LSD1414

101

LSD1415

102

LSD1416

103

LSD1417

104

LSD1418

105

LSD1419

106

LSD1420

107

LSD1421

108

LSD1422

109

LSD1423

110

LSD1424

A System for Denial-of-Service Attack Detection


Based on Multivariate Correlation Analysis

111

LSD1425

An Error-Minimizing Framework for Localizing


Jammers in Wireless Networks

112

LSD1426

Certificate less Remote Anonymous Authentication


Schemes for Wireless Body Area Networks

113

LSD1427

Efficient Data Query in Intermittently-Connected


Mobile Ad Hoc Social Networks

114

LSD1428

Multicast Capacity in MANET with Infrastructure


Support

115

LSD1429

Secure and Efficient Data Transmission for ClusterBased Wireless Sensor Networks

116

LSD1430

Transmission-Efficient Clustering Method for Wireless


Sensor Networks Using Compressive Sensing

117

LSD1431

118

LSD1432

119

LSD1433

120

LSD1434

121
122

LSD1435
LSD1436

A QoS-Oriented Distributed Routing Protocol for


Hybrid Wireless Networks
Autonomous Mobile Mesh Networks
DA-Sync: A Doppler-Assisted Time-Synchronization
Scheme for Mobile Underwater Sensor Networks
Leveraging Social Networks for P2P Content-Based
File Sharing in Disconnected MANETs
Preserving Location Privacy in Geo social Applications
Web Image Re Ranking Using Query-Specific

Data Mining

.NET

Data Mining

.NET

Data Mining

.NET

Data Mining

.NET

Data Mining

.NET

Data Mining

.NET

Data Mining

.NET

Data Mining

.NET

Secure Computing

.NET

Networking

.NET

Networking

.NET

Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems

.NET

.NET

.NET

.NET

.NET

.NET

.NET

.NET

Mobile Computing

.NET

Mobile Computing

.NET

Mobile Computing

.NET

Mobile Computing

.NET

Mobile Computing
Pattern Analysis &

.NET
.NET

IEEE 2014 PROJECTS


Semantic Signatures
123

LSD1437

124

LSD1438

125
126

LSD1439
LSD1440

127

LSD1441

128

LSD1442

129

LSD1443

130

LSD1444

131

LSD1445

132

LSD1446

133

LSD1447

Click Prediction for Web Image Re ranking Using


Multimodal Sparse Coding
Designing an Efficient Image Encryption-ThenCompression System via Prediction Error Clustering
and Random Perm
Fast Nearest Neighbor Search with Keywords
Dynamic Query Forms for Database Queries
Privacy Preserving Delegated Access Control in Public
Clouds
Achieving Effective Cloud Search Services
Multikeyword Ranked Search over Encrypted Cloud
Data Supporting Syn
Collaborative Online Multitask Learning
Personalized Recommendation Combining User
Interest and Social Circle
Optimal Coordination of Mobile Sensors for Target
Tracking Under Additive and Multiplicative Noises
Retransmission Delays With Bounded Packets: PowerLaw Body and Exponential Tail
Fault Tolerant Localization and Tracking of Multiple
Sources in WSNs Using Binary Data

134

LSD1448

A Lightweight Encryption Scheme for Network-Coded


Mobile Ad Hoc Networks

135

LSD1449

Distributed Channel Allocation Protocols for Wireless


Sensor Networks

136

LSD1450

137

LSD1451

138

LSD1452

139

LSD1453

140

LSD1454

141

LSD1455

142

LSD1456

143

LSD1457

144

LSD1458

145

LSD1459

146

LSD1460

147

LSD1461

148

LSD1462

A Food Recognition System for Diabetic Patients


Based on an Optimized Bag-of-Features Model
Keylogging-resistant Visual Authentication Protocols
Online Payment System using Steganography and
Visual Cryptography
Sharing Visual Secrets in Single Image Random Dot
Stereograms
Uniform Embedding for Efficient JPEG Steganography
Mining Weakly Labeled Web Facial Images for SearchBased Face Annotation
An Overlay-Based Data Mining Architecture Tolerant
to Physical Network Disruptions
Streaming Solutions for Fine-Grained Network Traffic
Measurements and Analysis
Localization-Oriented Network Adjustment in Wireless
Ad Hoc and Sensor Networks
A Hybrid Cloud Approach for Secure Authorized
Deduplication
Message Authentication Using Proxy Vehicles in
Vehicular Ad Hoc Networks
A Secure Client Side De duplication Scheme in Cloud
Storage Environments
Corruptive Artifacts Suppression for Example-Based
Color Transfer

Machine
Intelligence
Image Processing

.NET

Image Processing

.NET

Data Mining
Data Mining

.NET
.NET

Cloud Computing

.NET

Cloud Computing

.NET

Data mining

.NET

Data mining

.NET

Networking

.NET

Networking

.NET

Mobile Computing

.NET

Parallel &
Distributed
Systems
Parallel &
Distributed
Systems

.NET

.NET

Image Processing

.NET

Image Processing

.NET

Image Processing

.NET

Image Processing

.NET

Image Processing

.NET

Data Mining

.NET

Networking

.NET

Networking

.NET

Parallel &
Distributed
Systems

.NET

Cloud Computing

.NET

VANET

.NET

Secure Computing

.NET

Image Processing

.NET

IEEE 2014 PROJECTS


149

LSD1463

150

LSD1464

Quality Assessment of Stereoscopic 3D Image


Compression by Binocular Integration Behaviors
Cooperation Versus Multiplexing Multicast Scheduling
Algorithms OFDMA Relay Networks

Image Processing

.NET

Networking

.NET

Das könnte Ihnen auch gefallen