Download Document

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
S.NO IEEE PROJECTS LIST
DOMAIN
YEAR
1
Data mining
2015
Data mining
2015
Data mining
Data mining
2015
2015
Data mining
2015
Data mining
2015
Data mining
Data mining
2015
2015
Data mining
Data mining
Data mining
Data mining
Data mining
2015
2015
2015
2015
2015
Data mining
Data mining
Data mining
2014
2014
2014
Data mining
Data mining
2014
2014
Data mining
2014
Data mining
2014
Data mining
2014
Data mining
2014
Data mining
2014
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Anonym zing Collections of Tree Struct
Data- Data Engg
Co-Extracting Opinion Targets and
Opinion
Making Digital Artifacts_Data Engg
Query Aware Determinization of
Uncertain Objects
Reverse Keyword Search for SpatioTextual
Towards Effective Bug Triage with
Software Data Reduction Techniques
Context-Based Diversification
PAGE A Partition Aware Engine for
Parallel Graph Computation
Privacy Policy Inference of User-Uploaded
Rule Based Method for Entity Resolution
Tweet Segmentation and Its Application
Scalable Constrained Spectral Clustering
Discovery of Ranking Fraud for Mobile
Apps
Discovering Emerging Topics in Social
Facilitating Document Annotation Using
Fast Nearest Neighbor Search with
Keywords
Privacy-Preserving and Contentprotecting
Supporting Privacy Protection in
Personalized
Towards Online Shortest Path
Computation
Web Image Re-Ranking Using QuerySpecific Semantic Signatures
Building Confidential and Efficient Query
Services in the Cloud with RASP Data
Perturbation
Mining Weakly Labeled Web Facial
Images for Search-Based Face Annotation
Online Feature Selection and Its
Applications
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
AFast Clustering-Based Feature Subject
Selection Algorithm For High Dimensional
Data
Cloud MOV: CloudBased Mobile Social
PMSE:Apersonalized Mobile Search
Engine
A System To Filter Unwanted Messages
From OSN User Walls
Clustering Sentence-Level Text Using a
Novel
Efficient Algorithms for Mining High
Utility
Optimal Route Queries with Arbitrary
Order Constraints
Privacy-preserving Mining of Association
Rules
Mobi-Context A Context-aware CloudBased Venue Recommendation
Framework
Privacy Preserving Ranked MultiKeyword
Energy-aware Load Balancing and
Application Scaling for the Cloud
Ecosystem
Smart Crawler :A Two-stage Crawler for
Data mining
2013
Data mining
2013
Data mining
2013
Data mining
2013
Data mining
2013
Data mining
2013
Data mining
2013
Data mining
2013
Cloud
computing
2015
Cloud
computing
Cloud
computing
2015
Cloud
computing
A Hybrid Cloud Approach for Secure
Cloud
Authorized.
computing
Building Confidential and Efficient Query Cloud
computing
Decentralized Access Control with
Cloud
Anonymous Authentication of Data Stored computing
in Clouds
Key-Aggregate Cryptosystem for Scalable Cloud
computing
PACK Prediction-Based Cloud
Cloud
Bandwidth.
computing
Privacy-Preserving Multi-Keyword
Cloud
Ranked
computing
2015
2015
2014
2014
2014
2014
2014
2014
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
Scalable Distributed Service Integrity
Cloud
computing
Performance and cost evaluation of an
Cloud
adaptive encryption architecture for cloud computing
databases
Data Security the Challenge of Cloud
Cloud
Computing
computing
Security as a Service Model for Cloud
Cloud
Environment
computing
Privacy-Preserving Public Auditing For
Cloud
Secure Cloud Storage
Computing
Winds Of Change From Vendor Lock-In
Cloud
To The Meta Cloud
Computing
AMES-Cloud: Aframe Work Of Adaptive
Cloud
Mobile Video streaming And Efficient
Computing
Social Video Sharing In The Clouds
Maximizing P2P File Access Availability
Networks
A Lightweight Secure Scheme for
Networks
Detecting Provenance Forgery and Packet
Drop Attacks
A Secure Addressing Scheme for LargeNetworks
Scale
An Evalutionary Game Theory
Networks
Data Collection in Multi-Application
Networks
Sharing
Defending Against Collaborative Attacks
Networks
Secure and Reliable Routing Protocols
Networks
Automatic Test Packet Generation
Networks
Secure Data Retrieval for Decentralized
Networks
Disruption-Tolerant Military Networks
On False Data-Injection Attacks against P Networks
Securing Broker-Less Publish Subscribe
Networks
Systems Using Identity-Based Encryption
Behavioral Malware Detection in Delay
Networks
Tolerant Networks
Secure and Efficient Data Transmission
Networks
for Cluster-based Wireless Sensor
Networks
2014
2014
2014
2014
2013
2013
2013
2015
2015
2015
2015
2015
2015
2015
2014
2014
2014
2014
2014
2014
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
Privacy-Preserving Multi-keyword
Ranked Search over Encrypted Cloud
Data
RRE A Game-Theoretic Intrusion
A Fast Re-Route Method
A Scalable Server Architecture for Mobile
Presence Services in Social Network
Applications
Bad Data Injection Attack and Defense in
Electricity
Fully Anonymous Profile Matching in
Mobile Social Networks
Mobi-Sync Efficient Time
Synchronization for Mobile Underwater
Sensor Networks
Two tales of privacy in online social
networks
A Regularization Approach to Blind
Deblurringand Denoising of QR Barcodes
An Attribute-assisted Re-ranking Model
for Web
Steganography_Using_Reversible_Texture
Networks
2014
Networks
Networks
Networks
2014
2013
2013
Networks
2013
Networks
2013
Networks
2013
Networks
2013
Image Processing
Image Processing
Image Processing
Fingerprint Compression Based on Sparse Image
Representation
Processing
Captcha as Graphical Passwords—A New Image
Security Primitive Based on Hard AI
Processing
Problems
Personalized Geo-Specific Tag
Image
Recommendation for Photos on Social
Processing
Websites
Click Prediction for Web Image
Image
Reranking
Processing
Offline Text-Independent Writer
Image
Identification Based on Scale Invariant
Processing
Feature Transform
Visibility Restoration of Single Hazy
Image
Images Captured in Real-World Weather Processing
Conditions
2015
2015
2015
2014
2014
2014
2014
2014
2014
79
80
81
82
83
84
85
86
87
88
Extracting Spread-Spectrum Hidden Data
from Digital Media
Reversible Data Hiding in Encrypted
Images by Reserving Room Before
Encryption
Cloud-Assisted Mobile-Access of Health
Data With Privacy and Auditability
An Incentive Framework
Image
Processing
Image
Processing
2013
Mobile
Computing
Mobile
Computing
Cooperative Caching for Efficient Data
Mobile
Computing
A Scalable Server Architecture for Mobile Mobile
Presence Services in Social Network
Computing
Applications
Stochastic Decision Making for Adaptive
Hadoop
Crowdsourcing
On Traffic-Aware Partition and
Big data
Aggregation in
PAGE A Partition Aware Engine for
Big data
Parallel Graph Computation
Cast Shadow Detection and Removal of
java cv
Moving Objects from Video Based on
HSV Color Space
2014
2013
2014
2014
2014
2015
2015
2015
2015
Related documents