Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
IEEE 2013 PROJECTS S.NO. DOMAIN TECH Cloud Computing .NET Cloud Computing .NET Cloud Computing .NET Cloud Computing .NET Cloud Computing .NET Cloud Computing .NET Cloud Computing .NET Cloud Computing .NET Data Mining .NET 10. A Survey of XML Tree Patterns Data Mining .NET 11. Annotating-Search-Results-from-Web-Databases Data Mining .NET 12. Cost – Based Optimization of Service Compositions Data Mining .NET 13. Dynamic Personalized Recommendation on Sparse Data Data Mining .NET 14. Dynamic Query Forms for Database Queries Data Mining .NET 15. Ginix Generalized Inverted Index for Keyword Search. Data Mining .NET 1. 2. 3. 4. 5. 6. 7. 8. 9. PROJECT TITLE A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks. Cloud Based SQL Query Processor Cloud Computing For Mobile Users: Can Offloading Computation Save Energy Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing. Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model 16. Mining Order-Preserving Sub Matrices From Data With Repeated Measurements Data Mining .NET 17. Secure Mining of Association Rules in Horizontally Distributed Databases. Data Mining .NET 18. SeDas A Self – Destructing Data System Based on Active Storage Framework Data Mining .NET Data Mining .NET Data Mining .NET Image Processing .NET Image Processing .NET 19. SUSIE: Search Using Services and Information Extraction 20. 21. 22. 23. 24. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development LLSURE Local Linear SURE-Based Edge-Preserving Image Filtering Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting ELCA Evaluation for Keyword Search on Probabilistic XML Data G-Match secure and Privacy preserving Group Matching in Social Networks Knowledge & Data Engineering Knowledge & Data Mining CONTACT: Lakshmi (8008169169,0866-2487655) MAIL ID: [email protected] WEBSITE: www.visioncomputers.in .NET .NET IEEE 2013 PROJECTS 25. Supporting-Search-As-You-Type-Using-SQL-in-Databases 26. 27. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks Infrastructure Networks. Mobile Computing .NET Mobile Computing .NET Mobile Computing .NET Mobile Computing .NET Networking .NET Networking .NET Networking .NET Optimal Multicast Capacity and Delay Tradeoffs in MANETs. 30. Latency Equalization as a New Network Service Primitive 31. .NET On Quality of Monitoring for Multi-channel Wireless 28. Optimal Content Downloading in Vehicular Networks. 29. Knowledge & Data Engineering Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks 32. The Target Tracking in Mobile Sensor Networks. A Secure Payment Scheme with Low Communication and Processing Overhead for Multi hop Wireless Networks Mobi-Sync: Efficient Time Synchronization for Mobile 34. Underwater Sensor Networks. Secure and Efficient Data Transmission for Cluster Based 35. Wireless Sensor Networks Parallel & Distributed Systems Parallel & Distributed Systems Parallel & Distributed Systems SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. Parallel and Distributed Systems .NET Secure Computing .NET Secure Computing .NET Secure Computing .NET Secure Computing .NET Secure Computing .NET Secure Computing .NET 33. 36. 37. EAACK—A Secure Intrusion-Detection System for MANETs Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Privacy Preserving Data Sharing With Anonymous ID 39. Assignment. 38. 40. Privacy Preserving Delegated Access Control in Public Cloud Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption SORT: A Self-Organizing Trust Model for Peer-to-Peer 42. Systems 41. CONTACT: Lakshmi (8008169169,0866-2487655) MAIL ID: [email protected] WEBSITE: www.visioncomputers.in .NET .NET .NET