You are on page 1of 17

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

IEEE PROJECT 2014 2015 PROJECTS LIST


DOTNET
MOBILE COMPUTING - WIRELESS COMMUNICATION
1. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
2. Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc
Networks
3. Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless
Networks
4. Keylogging-resistant Visual Authentication Protocols
5. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless
Ad Hoc Networks
6. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
SECURITY AND PRIVACY
7. Bandwidth Distributed Denial of Service: Attacks and Defenses
SOFTWARE ENGINEERING
8. A Cocktail Approach for Travel Package Recommendation
9. A Comparative Study of Implementation Techniques for Query Processing in
Multicore Systems
10. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization
Using MapReduce on Cloud
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

11. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
12. An Empirical Performance Evaluation of Relational Keyword Search Systems
13. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark
Scheme
14. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
15. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
16. Demand Bidding Program and Its Application in Hotel Energy Management
17. Dynamic Query Forms for Database Queries
18. Exploiting Service Similarity for Privacy in Location-Based Search Queries
19. Facilitating Document Annotation Using Content and Querying Value
20. Fast Nearest Neighbor Search with Keywords
21. Governing Software Process Improvements in Globally Distributed Product
Development
22. Incremental Detection of Inconsistencies in Distributed Data
23. Keyword Query Routing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
24. LARS: An Efficient and Scalable Location-Aware Recommender System
25. m-Privacy for Collaborative Data Publishing
26. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous
Devices
27. Preserving Location Privacy in Geosocial Applications
28. Secure kNN Query Processing in Untrusted Cloud Environments
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

29. Secure Mining of Association Rules in Horizontally Distributed Databases


30. Supporting Privacy Protection in Personalized Web Search
31. The Role of Hubness in Clustering High-Dimensional Data
32. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
2. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient
Verifiable Fine-Grained Updates
3. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber
Physical Systems
4. COMIC:Cost Optimization for Internet Content Multihoming
5. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
6. Exploiting Rateless Codes in Cloud Storage Systems
7. Exploiting Service Similarity for Privacy in Location Based Search Queries
8. Link Quality Aware Code Dissemination in Wireless Sensor Networks
9. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
10. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
11. Secure Deduplication with Efficient and Reliable Convergent Key Management
12. Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
13. Trafc Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
14. Uniform Embedding for Efficient JPEG Steganography
15. Web Service Recommendation via Exploiting Location and QoS Information
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

CLOUD COMPUTING
1. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
2. A Mechanism Design Approach to Resource Procurement in Cloud Computing
3. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in
Delay-Tolerant Networks
4. A Scientometric Analysis of Cloud Computing Literature
5. A secure data self-destructing scheme in cloud computing
6. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social
Networks
7. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
8. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over
Encrypted Cloud Data Supporting Synonym Query
9. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
10. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
11. Automatic Scaling of Internet Applications for Cloud Computing Services
12. Behavioral Malware Detection in Delay Tolerant Networks
13. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
14. Consistency as a Service Auditing Cloud Consistency
15. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
16. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error
Clustering and Random Permutation
17. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

18. Dynamic Authentication with Sensory Information for the Access Control Systems
19. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory
and Implementation
20. Enabling P2P One-View Multiparty Video Conferencing
21. Exploiting Rateless Codes in Cloud Storage Systems
22. Fuzzy Authorization for Cloud Storage
23. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
24. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
25. On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme

in

Multicloud Storage
26. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
27. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
28. Planning vs. dynamic control Resource allocation in corporate clouds
29. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with
Cloud Computing
30. Privacy Preserving Delegated Access Control in Public Clouds
31. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
32. Secure kNN Query Processing in Untrusted Cloud Environments
33. Securing the cloud storage audit service: defending against frame and collude attacks of
third party auditor
34. Strategy-proof Pricing for Cloud Service Composition
IMAGE PROCESSING MULTIMEDIA

MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.


WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

1. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving


Storage Framework
2. A New Iterative Triclass Thresholding Technique in Image Segmentation
3. An Iranian License Plate Recognition System Based on Color Features
4. As-Projective-As-Possible Image Stitching with Moving DLT
5. Corruptive Artifacts Suppression for Example-Based Color Transfer
6. Designing an Efficient Image Encryption-Then-Compression System via Prediction
Error Clustering and Random Permutation
7. FeatureMatch: A General ANNF Estimation Technique and its Applications
8. Fingerprint Compression Based on Sparse Representation
9. Fingerprint Compression Based on Sparse Representation
10. Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image
Compression
11. How to Estimate the Regularization Parameter for Spectral Regression Discriminant
Analysis and its Kernel Version?
12. Image Classification Using Multiscale Information Fusion Based on Saliency Driven
Nonlinear Diffusion Filtering
13. LBP-Based Edge-Texture Features for Object Recoginition
14. Learning Layouts for Single-Page Graphic Designs
15. Localization of License Plate Number Using Dynamic Image Processing Techniques
And Genetic Algorithms
16. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
17. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its
Application
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

18. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object


Detection for Intelligent Service Robotics
19. Offline Text-Independent Writer Identification Based on Scale Invariant Feature
Transform
20. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
21. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration
Behaviors
22. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video
Sequences for 2D to Stereoscopic 3D Conversion
23. Sharing Visual Secrets in Single Image Random Dot Stereograms
24. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional
Brownian Motion
25. Toward Experiential Mobile Media Processing
26. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field
Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
NETWORKING
1. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA
Relay Networks
2. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
3. Designing Truthful Spectrum Double Auctions with Local Markets
4. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
5. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

6. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers


Rationality and Fairness
7. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
8. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
NETWORK SECURITY
9. Hiding in the Mobile Crowd: Location Privacy through Collaboration
INTERNATIONAL CONFERENCE
10. A Secure Client Side Deduplication Scheme in Cloud Storage Environments
11. Attribute Based Encryption with Privacy Preserving In Clouds
12. Efficient Instant-Fuzzy Search with Proximity Ranking
13. Online Payment System using Steganography and Visual Cryptography

JAVA
MOBILE COMPUTING - WIRELESS COMMUNICATION
14. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
15. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
16. Preserving Location Privacy in Geo-Social Applications
17. Efficient Authentication for Mobile and Pervasive Computing
18. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
19. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental
Study
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

20. Incentive Based Data Sharing in Delay Tolerant Mobile Networks


KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
21. A Cocktail Approach for Travel Package Recommendation
22. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
23. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data
Anonymization
24. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational
Data
25. Active Learning of Constraints for Semi-Supervised Clustering
26. An Efcient Recommendation Method for Improving Business Process Modeling
27. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark
Scheme
28. Best Keyword Cover Search
29. BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
30. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
31. Capturing Telic/Atelic Temporal Data Semantics: Generalizing Conventional
Conceptual Models
32. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
33. Data Mining with Big Data
34. Dealing With Concept Drifts in Process Mining
35. Dealing With Concept Drifts in Process Mining
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

36. Determining Process Model Precision and Generalization with Weighted Articial
Negative Events
37. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
38. Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
39. Efcient Prediction of Difcult Keyword Queries over Databases
40. Efficient Ranking on Entity Graphs with Personalized Relationships
41. Facilitating Document Annotation using Content and Querying Value
42. Fast Nearest Neighbor Search with Keywords
43. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
44. Incremental Affinity Propagation Clustering Based on Message Passing
45. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
46. Interpreting the Public Sentiment Variations
47. Keyword Query Routing
48. Malware Propagation in Large-Scale Networks
49. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
50. On Skyline Groups
51. On the use of Side Information for Mining Text Data
52. Online Feature Selection and Its Applications
53. Personalized Recommendation Combining User Interest and Social Circle
54. Privacy Preserving and Content Protecting Location based Queries
55. Privacy-Preserving Enhanced Collaborative Tagging
56. Secure kNN Query Processing in Untrusted Cloud Environments
57. Secure Outsourced Attribute-Based Signatures
58. Security Evaluation of Pattern Classifiers under Attack
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

59. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
60. Supporting Privacy Protection in Personalized Web Search
61. Task Trail: An Effective Segmentation of User Search Behavior
62. Towards Differential Quer y Ser vices in Cost-Efficient Clouds
63. Towards Online Shortest Path Computation
64. XSPath Navigation on XML Schemas Made Easy

PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING


65. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
66. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
67. A Two-stage Deanonymization Attack Against Anonymized Social Networks
68. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of
Personal Storage
69. Asymmetric Social Proximity Based Private Matching Protocols for Online Social
Networks
70. Behavioral Malware Detection in Delay Tolerant Networks
71. Behavioral Malware Detection in Delay Tolerant Networks
72. Community-home-based Multi-copy Routing in Mobile Social Networks
73. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
74. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

75. Exploiting Service Similarity for Privacy in Location-Based Search Queries


76. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
77. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor
Networks
78. LocaWard: A Security and Privacy Aware Location-Based Rewarding System
79. Nothing is for Free: Security in Searching Shared and Encrypted Data
80. On False Data-Injection Attacks against Power System State Estimation: Modeling
and Countermeasures
81. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
82. On the Security of Trustee-Based Social Authentications
83. Private Searching on Streaming Data Based on Keyword Frequency
84. RRE: A Game-Theoretic Intrusion Response and Recovery Engine
85. Secure Outsourced Attribute-based Signatures
86. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
87. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud
Computing
88. SocialTube: P2P-assisted Video Sharing in Online Social Networks
89. SOS: A Distributed Mobile Q&A System Based on Social Networks
90. The Client Assignment Problem for Continuous Distributed Interactive Applications:
Analysis, Algorithms, and Evaluation
91. The Design and Evaluation of An Information Sharing System for Human Networks
92. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery
Networks
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

CLOUD COMPUTING
1. A Hybrid Cloud Approach for Secure Authorized Deduplication
2. A Novel Model for Competition and Cooperation Among Cloud Providers
3. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe
Systems
4. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization
Using MapReduce on Cloud
5. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud
Computing Systems
6. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of
Personal Storage
7. Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
8. CLOUDQUAL: A Quality Model for Cloud Services
9. Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds
10. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
11. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
12. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
13. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
14. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud

MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.


WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

15. Performance and cost evaluation of an adaptive encryption architecture for cloud
databases
16. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
17. Scalable architecture for multi-user encrypted SQL operations on cloud database
services
18. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
19. Secure kNN Query Processing in Untrusted Cloud Environments
20. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud
Computing
21. Towards Differential Query Services in Cost-Efficient Clouds
IMAGE PROCESSING MULTIMEDIA
22. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI
Problems
23. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View
Images
24. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
NETWORKING
1. A Cloud Enviroment for Backup and Data Storage
2. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding
Cryptographic Scheme and Evaluating Its Performance
3. Automatic Test Packet Generation
4. Boundary Cutting for Packet Classification
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

5. Cost-Effective Resource Allocation of Overlay Routing RelayNodes


6. Data Security the Challenge of Cloud Computing
7. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute
Based Encryption
8. Decentralized Queue Balancing and Differentiated Service Scheme Based on
Cooperative Control Concept
9. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
10. Operational Pattern Revealing Technique in Text Mining
11. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
12. Personalized web search using Browsing history and domain Knowledge
13. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
14. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers
Impact
15. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
16. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted
Data
SECURE COMPUTING
17. A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless
Sensor Network
18. A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks
19. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data
Anonymization
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

20. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation


Analysis
21. Abductive Analysis of Administrative Policies in Rule-Based Access Control
22. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over
Encrypted Cloud Data Supporting Syn
23. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
24. Asymmetric Social Proximity Based Private Matching Protocols for Online Social
Networks
25. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient
Verifiable Fine-Grained Updates
26. Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI
Problems
27. Dynamic Query Forms for Database Queries
28. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
29. Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection
30. Image Search Reranking With Query-Dependent Click-Based Relevance Feedback
31. K-Anonymity for Crowdsourcing Database
32. LARS*: An Efficient and Scalable Location-Aware Recommender
33. Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor
Networks
34. Malware Propagation in Large-Scale Networks
35. m-Privacy for Collaborative Data Publishing
36. Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks
37. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.
WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

micansinfotech

+91 90036 28940 +91 94435 11725

IEEE Projects 100% WORKING CODE + DOCUMENTATION+ EXPLAINATION BEST PRICE

LOW PRICE GUARANTEED

38. Privacy Preserving Delegated Access Control in Public Clouds


39. Privacy-Enhanced Web Service Composition
40. Probabilistic Aspect Mining Model for Drug Reviews
41. PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
42. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service
Recommendation Systems
43. SocialTube: P2P-Assisted Video Sharing in Online Social Networks
44. Top-k Query Result Completeness Verification in Tiered Sensor Networks
45. Web Service Recommendation via Exploiting Location and QoS Information
46. XSPath: Navigation on XML Schemas Made Easy

MICANS INFOTECH, NO: 8 , 100 FEET ROAD,PONDICHERRY.


WWW.MICANSINFOTECH.COM ; MICANSINFOTECH@GMAIL.COM

+91 90036 28940; +91 94435 11725

You might also like