IEEE projects 2014

GET LATEST IEEE PROJECTS TITLES

Name
Email
Mobile
Technology
College Name
Department
Degree
Comments

ieee projects

ieee projects 2014

CLICK BELOW LINK DOWNLOAD IEEE 2014 PROJECT TITLE FROM HERE

 

DOWNLOAD IEEE 2014 JAVA/J2EE/DOT NET PROJECT LIST

DOWNLOAD IEEE 2014 NS2 PROJECT LIST

 

CONTACT ADDRESS

 

DATA ALCOTT SYSTEMS

No.11/26, First Floor,
Bazaar Street,
Saidapet
Chennai – 600015
Landmark: Near Saidapet Police Station, Next to STAR Xerox

PH: (0) 9600095046 / 47

Mail:  ieeedata@gmail.com

 

IEEE Projects 2014 JAVA / J2EE / Dot Net Titles List

 

KNOWLEDGE AND DATA ENGINEERING / DATA MINING

 

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Facilitating Document Annotation Using Content and Querying Value

Supporting Privacy Protection in Personalized Web Search

LARS: An Efficient and Scalable Location-Aware Recommender System

Fast Nearest Neighbor Search with Keywords

Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme

Dynamic Query Forms for Database Queries

m-Privacy for Collaborative Data Publishing

A Comparative Study of Implementation Techniques for Query Processing in Multicore Systems

An Empirical Performance Evaluation of Relational Keyword Search Techniques

Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices

Preserving Location Privacy in Geosocial Applications

A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud

Exploiting Service Similarity for Privacy in Location-Based Search Queries

WIRELESS COMMUNICATIONS

Incentive Based Data Sharing in Delay Tolerant Mobile Networks

NETWORKING

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

NETWORK SECURITY

Hiding in the Mobile Crowd: Location Privacy through Collaboration

IMAGE PROCESSING

 

Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation

Fingerprint Compression Based on Sparse Representation

CLOUD COMPUTING

 

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

Privacy Preserving Delegated Access Control in Public Clouds

Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation

Dynamic Authentication with Sensory Information for the Access Control Systems

Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage

An Error-Minimizing Framework for Localizing Jammers in Wireless Networks

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation

A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks

Behavioral Malware Detection in Delay Tolerant Networks

Enabling P2P One-View Multiparty Video Conferencing

Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage

MOBILE COMPUTING

Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks

Video Dissemination over Hybrid Cellular and Ad Hoc Networks

Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

SECURITY AND PRIVACY

 

Bandwidth Distributed Denial of Service: Attacks and Defenses

 

PARALLEL DISTRIBUTED SYSTEMS

 

Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

Traffic pattern-based content leakage detection for trusted content delivery networks