Skip to main content

IEEE PROJECT TITLE 2014 FOR B.E/M.E (CSE,IT)

SOFTWARE PROJECT TITLE 2014-15


CLOUD COMPUTING


1.    Object-Oriented Shadow Detection and Removal From Urban High-Resolution Remote Sensing Images(2014)
2.      Consistency as a Service: Auditing Cloud Consistency(2014)
3.      Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions(2014)
4.      A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud(2014)
5.      Proactive Workload Management in Hybrid Cloud Computing(2014)
.     Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing Environments(2014)
7. KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications(2014)
8.      Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases(2014)
9.      A Hybrid Cloud Approach for Secure Authorized Deduplication(2014)
10.   Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
11.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
12.  Resource Availability Characteristics and Node Selection in Cooperatively Shared Computing Platforms
13.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
14.  Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
15.  Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing

IMAGE PROCESSING

1.   Fuzzy Clustering with a modified MRF Energy function for change detection in synthetic aperture radar images(2014)
2.      Measures of Effective Video Tracking(2014)
3.  Image Quality Assessment for Fake Biometric Detection: Application to IRIS, Fingerprint, and Face Recognition(2014)
4. Object-Oriented Shadow Detection and Removal From Urban High-Resolution Remote Sensing Images(2014)
DATA MINING
1.      A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
2.      Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
3.      Scalable Keyword Search on Large RDF Data
4.      Adaptive Replica Synchronization for Distributed File Systems
5.      OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
6.      Probabilistic Aspect Mining Model for Drug Reviews
7.      Efficient Range-Based Storage Management for Scalable Data stores
8.      PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System
9.      Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation
10.  Task Trail: An Effective Segmentation of User Search Behavior
11.  Supporting Privacy Protection in Personalized Web Search
12.  An Empirical Performance Evaluation of Relational Keyword Search Techniques
13.  Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data

NETWORK SECURITY

1.      Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
2.      Private Searching on Streaming Data Based on Keyword Frequency
3.      Building a Scalable System for Stealthy P2P-Botnet Detection
4.  The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluations
5.      An Empirical Study of Ontology-Based Multi-Document Summarization in Disaster Management
6.      PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications
7.      Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

NETWORKING

1.      Evolving Fuzzy Rules for Anomaly Detection in Data Streams
2.      Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
3.      List Scheduling Algorithm for Heterogeneous Systems by an Optimistic Cost Table
4.      Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network
5.      Breaking the Barrier to Transferring Link Information across Networks
6.      Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
7.      Network Aware Scheduling for Virtual Machine Workloads with Interference Models
8.      A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices





Comments

Popular posts from this blog

Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search

Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search ABSTRACT: In this paper, With advances in geo-positioning technologies and geo-location services, there are a rapidly growing amount of spatiotextual objects collected in many applications such as location based services and social networks, in which an object is described by its spatial location and a set of keywords (terms). Consequently, the study of spatial keyword search which explores both location and textual description of the objects has attracted great attention from the commercial organizations and research communities. In the paper, we study two fundamental problems in the spatial keyword queries: top k spatial keyword search (TOPK-SK), and batch top k spatial keyword search (BTOPK-SK). Given a set of spatio-textual objects, a query location and a set of query keywords, the TOPK-SK retrieves the closest k objects each of which contains all keywords in the query. BTOPK-SK is the batch processing of sets...

A simple and reliable touch sensitive security system CODING

#include <REGX51.H> #include "lcd.c" #define MAX_DELAY() delay(65000) sbit Vibra_Sense=P3^1; sbit Buz=P1^0; void intro() {  lcd_init();  lcd_str("Touch Sensitive ",0x80);  lcd_str("Security System ",0xc0);  MAX_DELAY();MAX_DELAY();  lcd_clr();  }  void main()  { unsigned int i = 0, j= 0; intro();    while(1)    { lcd_str("Security Syst On",0x80); lcd_str("No Vibra Detectd",0xc0); Buz = 1; if(Vibra_Sense == 1) { while(Vibra_Sense == 1) delay(1000); } else { while(Vibra_Sense == 0) delay(1000); } Buz = 0; lcd_str("Vibraton Detectd",0xc0);delay(65000); while(1);    }  }

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud Abstract                                                                                                                                                      ...