Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
S.NO IEEE PROJECTS LIST DOMAIN YEAR 1 Data mining 2015 Data mining 2015 Data mining Data mining 2015 2015 Data mining 2015 Data mining 2015 Data mining Data mining 2015 2015 Data mining Data mining Data mining Data mining Data mining 2015 2015 2015 2015 2015 Data mining Data mining Data mining 2014 2014 2014 Data mining Data mining 2014 2014 Data mining 2014 Data mining 2014 Data mining 2014 Data mining 2014 Data mining 2014 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Anonym zing Collections of Tree Struct Data- Data Engg Co-Extracting Opinion Targets and Opinion Making Digital Artifacts_Data Engg Query Aware Determinization of Uncertain Objects Reverse Keyword Search for SpatioTextual Towards Effective Bug Triage with Software Data Reduction Techniques Context-Based Diversification PAGE A Partition Aware Engine for Parallel Graph Computation Privacy Policy Inference of User-Uploaded Rule Based Method for Entity Resolution Tweet Segmentation and Its Application Scalable Constrained Spectral Clustering Discovery of Ranking Fraud for Mobile Apps Discovering Emerging Topics in Social Facilitating Document Annotation Using Fast Nearest Neighbor Search with Keywords Privacy-Preserving and Contentprotecting Supporting Privacy Protection in Personalized Towards Online Shortest Path Computation Web Image Re-Ranking Using QuerySpecific Semantic Signatures Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation Online Feature Selection and Its Applications 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 AFast Clustering-Based Feature Subject Selection Algorithm For High Dimensional Data Cloud MOV: CloudBased Mobile Social PMSE:Apersonalized Mobile Search Engine A System To Filter Unwanted Messages From OSN User Walls Clustering Sentence-Level Text Using a Novel Efficient Algorithms for Mining High Utility Optimal Route Queries with Arbitrary Order Constraints Privacy-preserving Mining of Association Rules Mobi-Context A Context-aware CloudBased Venue Recommendation Framework Privacy Preserving Ranked MultiKeyword Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem Smart Crawler :A Two-stage Crawler for Data mining 2013 Data mining 2013 Data mining 2013 Data mining 2013 Data mining 2013 Data mining 2013 Data mining 2013 Data mining 2013 Cloud computing 2015 Cloud computing Cloud computing 2015 Cloud computing A Hybrid Cloud Approach for Secure Cloud Authorized. computing Building Confidential and Efficient Query Cloud computing Decentralized Access Control with Cloud Anonymous Authentication of Data Stored computing in Clouds Key-Aggregate Cryptosystem for Scalable Cloud computing PACK Prediction-Based Cloud Cloud Bandwidth. computing Privacy-Preserving Multi-Keyword Cloud Ranked computing 2015 2015 2014 2014 2014 2014 2014 2014 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 Scalable Distributed Service Integrity Cloud computing Performance and cost evaluation of an Cloud adaptive encryption architecture for cloud computing databases Data Security the Challenge of Cloud Cloud Computing computing Security as a Service Model for Cloud Cloud Environment computing Privacy-Preserving Public Auditing For Cloud Secure Cloud Storage Computing Winds Of Change From Vendor Lock-In Cloud To The Meta Cloud Computing AMES-Cloud: Aframe Work Of Adaptive Cloud Mobile Video streaming And Efficient Computing Social Video Sharing In The Clouds Maximizing P2P File Access Availability Networks A Lightweight Secure Scheme for Networks Detecting Provenance Forgery and Packet Drop Attacks A Secure Addressing Scheme for LargeNetworks Scale An Evalutionary Game Theory Networks Data Collection in Multi-Application Networks Sharing Defending Against Collaborative Attacks Networks Secure and Reliable Routing Protocols Networks Automatic Test Packet Generation Networks Secure Data Retrieval for Decentralized Networks Disruption-Tolerant Military Networks On False Data-Injection Attacks against P Networks Securing Broker-Less Publish Subscribe Networks Systems Using Identity-Based Encryption Behavioral Malware Detection in Delay Networks Tolerant Networks Secure and Efficient Data Transmission Networks for Cluster-based Wireless Sensor Networks 2014 2014 2014 2014 2013 2013 2013 2015 2015 2015 2015 2015 2015 2015 2014 2014 2014 2014 2014 2014 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data RRE A Game-Theoretic Intrusion A Fast Re-Route Method A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Bad Data Injection Attack and Defense in Electricity Fully Anonymous Profile Matching in Mobile Social Networks Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks Two tales of privacy in online social networks A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes An Attribute-assisted Re-ranking Model for Web Steganography_Using_Reversible_Texture Networks 2014 Networks Networks Networks 2014 2013 2013 Networks 2013 Networks 2013 Networks 2013 Networks 2013 Image Processing Image Processing Image Processing Fingerprint Compression Based on Sparse Image Representation Processing Captcha as Graphical Passwords—A New Image Security Primitive Based on Hard AI Processing Problems Personalized Geo-Specific Tag Image Recommendation for Photos on Social Processing Websites Click Prediction for Web Image Image Reranking Processing Offline Text-Independent Writer Image Identification Based on Scale Invariant Processing Feature Transform Visibility Restoration of Single Hazy Image Images Captured in Real-World Weather Processing Conditions 2015 2015 2015 2014 2014 2014 2014 2014 2014 79 80 81 82 83 84 85 86 87 88 Extracting Spread-Spectrum Hidden Data from Digital Media Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability An Incentive Framework Image Processing Image Processing 2013 Mobile Computing Mobile Computing Cooperative Caching for Efficient Data Mobile Computing A Scalable Server Architecture for Mobile Mobile Presence Services in Social Network Computing Applications Stochastic Decision Making for Adaptive Hadoop Crowdsourcing On Traffic-Aware Partition and Big data Aggregation in PAGE A Partition Aware Engine for Big data Parallel Graph Computation Cast Shadow Detection and Removal of java cv Moving Objects from Video Based on HSV Color Space 2014 2013 2014 2014 2014 2015 2015 2015 2015