Skip to main content

IEEE PROJECT TITLE 2014 FOR B.E/M.E (CSE,IT)

SOFTWARE PROJECT TITLE 2014-15


CLOUD COMPUTING


1.    Object-Oriented Shadow Detection and Removal From Urban High-Resolution Remote Sensing Images(2014)
2.      Consistency as a Service: Auditing Cloud Consistency(2014)
3.      Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions(2014)
4.      A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud(2014)
5.      Proactive Workload Management in Hybrid Cloud Computing(2014)
.     Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing Environments(2014)
7. KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications(2014)
8.      Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases(2014)
9.      A Hybrid Cloud Approach for Secure Authorized Deduplication(2014)
10.   Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
11.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
12.  Resource Availability Characteristics and Node Selection in Cooperatively Shared Computing Platforms
13.  Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
14.  Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
15.  Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing

IMAGE PROCESSING

1.   Fuzzy Clustering with a modified MRF Energy function for change detection in synthetic aperture radar images(2014)
2.      Measures of Effective Video Tracking(2014)
3.  Image Quality Assessment for Fake Biometric Detection: Application to IRIS, Fingerprint, and Face Recognition(2014)
4. Object-Oriented Shadow Detection and Removal From Urban High-Resolution Remote Sensing Images(2014)
DATA MINING
1.      A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
2.      Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
3.      Scalable Keyword Search on Large RDF Data
4.      Adaptive Replica Synchronization for Distributed File Systems
5.      OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
6.      Probabilistic Aspect Mining Model for Drug Reviews
7.      Efficient Range-Based Storage Management for Scalable Data stores
8.      PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System
9.      Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation
10.  Task Trail: An Effective Segmentation of User Search Behavior
11.  Supporting Privacy Protection in Personalized Web Search
12.  An Empirical Performance Evaluation of Relational Keyword Search Techniques
13.  Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data

NETWORK SECURITY

1.      Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
2.      Private Searching on Streaming Data Based on Keyword Frequency
3.      Building a Scalable System for Stealthy P2P-Botnet Detection
4.  The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluations
5.      An Empirical Study of Ontology-Based Multi-Document Summarization in Disaster Management
6.      PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications
7.      Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

NETWORKING

1.      Evolving Fuzzy Rules for Anomaly Detection in Data Streams
2.      Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
3.      List Scheduling Algorithm for Heterogeneous Systems by an Optimistic Cost Table
4.      Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network
5.      Breaking the Barrier to Transferring Link Information across Networks
6.      Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
7.      Network Aware Scheduling for Virtual Machine Workloads with Interference Models
8.      A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices





Comments

Popular posts from this blog

Jio

Reliance Jio planning its own  cryptocurrency called JioCoin  elder son Akash Ambani leading the JioCoin project, Reliance Jio plans to build a 50-member team of young professionals to work on blockchain technology, which can also be used to develop applications such as smart contracts and supply chain management logistics

PUNCHING MACHINE

ACCIDENT AVOIDING SYSTEM FOR PUNCHING MACHINE SYNOPSIS The aim of our project is to take a system-wide approach to preventing the machine accident. The system includes not just the machine and the operator; but rather, it includes everything from the initial design of the machine to the training of everyone that is responsible for any aspect of it, to the documentation of all changes, to regular safety audits and a finally a corporate culture of safety-first. Design is the part of a machine's life where the greatest impact can be made in relation to avoiding accidents. The designer should ensure that the machine is safe to set up and operate, safe to install, safe to maintain, safe to repair, and safe to decommission. Although safe operation is usually at the forefront of a designer's mind, safe maintenance and repair should also be a high priority. Around 50% of fatal accidents involving industrial equipment are associated with maintenance activities, and design...