Download M.Tech IEEE Projects 2014 IEEE Transactions Journal

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
M.Tech IEEE Projects 2014
IEEE Transactions Journal
Flat # 702, Tirumala Shah Residency, 8-3-940, Yellareddyguda,
Lane Opp. Fantosh, Old Ameerpet X Roads, Hyderabad - 500073,
Phone: 7729905740, 9885495740
Email: [email protected], [email protected]
Web Site: http://www.softlect.in
We Exercise Skills
Softlect Technologies
Ph: 9885495740, 7729905740
[email protected]
JAVA
Cloud Computing / Big Data
Privacy-Preserving Public Auditing for Shared Data in the Cloud - (CC-2014)
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
- (PDS-2014)
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data - (PDS-2014)
Consistency as a Service Auditing Cloud Consistency - (NSM-2014)
Flexible Architecture for Service Management in the Cloud
- (NSM-2014)
Information Flow Control for Secure Cloud Computing - (NSM-2014)
Security as a Service Model for Cloud Environment - (NSM-2014)
CoRE A Context-Aware Relation Extraction Method for Relation Completion
- (KDE-2014)
Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds - (KDE-2014)
Mobile Computing / Wireless Security
Cooperative Key Agreement for Wireless Networking - (IFS-2014)
Online Signature Verification on Mobile Devices
- (IFS-2014)
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices - (IFS-2014)
Secure Data Aggregation in Wireless Sensor Networks - (IFS-2014)
Efficient Data Collection for Large-Scale Mobile Monitoring Applications
- (PDS-2014)
FLAP An Efficient WLAN Initial Access Authentication Protocol - (PDS-2014)
Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks - (PDS-2014)
Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless
Networks - (PDS-2014)
LocaWard A Security and Privacy Aware Location-Based Rewarding System - (PDS-2014)
Secure Deduplication with Efficient and Reliable Convergent Key Management - (PDS-2014)
Secure Time Synchronization in Wireless Sensor Networks A Maximum Consensus-Based Approach
(PDS-2014)
Efficient Authentication for Mobile and Pervasive Computing - (MC-2014)
Efficient Privacy-Preserving Authentication in Wireless Mobile Networks - (MC-2014)
Novel Approach to Trust Management in Unattended Wireless Sensor Networks - (MC-2014)
Traffic Signature-Based Mobile Device Location Authentication
- (MC-2014)
Web Services
Investigating QoS of Real-World Web Services - (SC-2014)
Privacy-Enhanced Web Service Composition
- (SC-2014)
Scalable Architecture for Automatic Service Composition
- (SC-2014)
-
Softlect Technologies
Ph: 9885495740, 7729905740
[email protected]
Mobile Computing / Wireless Network
Localization-Oriented Network Adjustment in Wireless Ad Hoc and Sensor Networks - (PDS-2014)
Context-Aware Energy Enhancements for Smart Mobile Devices - (MC-2014)
Energy-Efficient Relaying via Store-Carry and Forward within the Cell - (MC-2014)
Evaluating Service Disciplines for On-Demand Mobile Data Collection in Sensor Networks - (MC-2014)
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs - (MC-2014)
Preserving Location Privacy in Geosocial Applications - (MC-2014)
Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks
- (MC-2014)
TagSense Leveraging Smartphones for Automatic Image Tagging - (MC-2014)
TurfCast A Service for Controlling Information Dissemination in Wireless Networks
- (MC-2014)
Image Processing
Cascade Category-Aware Visual Search
- (IP-2014)
Norm IDF for Scalable Image Retrieval
- (IP-2014)
Online Signature Verification on Mobile Devices
- (IFS-2014)
TagSense Leveraging Smartphones for Automatic Image Tagging - (MC-2014)
Network Security/Information Security
On the Security of Trustee-Based Social Authentications - (IFS-2014)
Privacy-Preserving Authenticated Key-Exchange Over Internet - (IFS-2014)
Protocol for End-to-End Secure Transmission of SMS - (IFS-2014)
Secure Deduplication with Efficient and Reliable Convergent Key Management - (PDS-2014)
Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
Signature Searching in a Networked Collection of Files
- (PDS-2014)
- (PDS-2014)
Towards Safe Cities A Mobile and Social Networking Approach
- (PDS-2014)
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data - (KDE-2014)
Authentication of k Nearest Neighbor Query on Road Networks
- (KDE-2014)
Privacy-Preserving and Content-Protecting Location Based Queries
- (KDE-2014)
Privacy-Preserving Enhanced Collaborative Tagging - (KDE-2014)
Secure Mining of Association Rules in Horizontally Distributed Databases
Supporting Privacy Protection in Personalized Web Search
- (KDE-2014)
- (KDE-2014)
Softlect Technologies
Ph: 9885495740, 7729905740
[email protected]
Data Mining / Web Mining
Characterizing Web Page Complexity and Its Impact - (N-2014)
SeLeCT Self-Learning Classifier for Internet Traffic - (NSM-2014)
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data - (KDE-2014)
Approximate Shortest Distance Computing A Query-Dependent Local Landmark Scheme - (KDE-2014)
Automatic Generation of the Domain Module from Electronic Textbooks Method and Validation (KDE-2014)
CoRE A Context-Aware Relation Extraction Method for Relation Completion
- (KDE-2014)
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
- (KDE-2014)
Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds - (KDE-2014)
Efficient Prediction of Difficult Keyword Queries over Databases - (KDE-2014)
Efficient Ranking on Entity Graphs with Personalized Relationships
- (KDE-2014)
Empirical Performance Evaluation of Relational Keyword Search Techniques - (KDE-2014)
Evaluation of Range Queries with Predicates on Moving Objects
- (KDE-2014)
Facilitating Document Annotation Using Content and Querying Value - (KDE-2014)
Fast Nearest Neighbor Search with Keywords - (KDE-2014)
Graph Derivation Based Approach for Measuring and Comparing Structural Semantics of Ontologies
(KDE-2014)
Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
Interpreting the Public Sentiment Variations on Twitter
- (KDE-2014)
- (KDE-2014)
OCCT A One-Class Clustering Tree for Implementing One-to-Many Data Linkage - (KDE-2014)
On the Influence Propagation of Web Videos - (KDE-2014)
Online Feature Selection and Its Applications
- (KDE-2014)
Personalized Recommendation Combining User Interest and Social Circle - (KDE-2014)
Privacy-Preserving and Content-Protecting Location Based Queries
- (KDE-2014)
Privacy-Preserving Enhanced Collaborative Tagging - (KDE-2014)
Secure Mining of Association Rules in Horizontally Distributed Databases
- (KDE-2014)
Semisupervised Wrapper Choice and Generation for Print-Oriented Documents
- (KDE-2014)
Similarity Measure for Text Classification and Clustering - (KDE-2014)
Supporting Privacy Protection in Personalized Web Search
- (KDE-2014)
Two-Level Topic Model Towards Knowledge Discovery from Citation Networks - (KDE-2014)
Typicality-Based Collaborative Filtering Recommendation - (KDE-2014)
Uncertain One-Class Learning and Concept Summarization Learning on Uncertain Data Streams (KDE-2014)
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection - (KDE-2014)
-
Softlect Technologies
Ph: 9885495740, 7729905740
[email protected]
.NET
Cloud Computing
Privacy-Preserving Public Auditing for Shared Data in the Cloud
- (CC-2014)
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
- (PDS-2014)
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data - (PDS-2014)
Consistency as a Service Auditing Cloud Consistency - (NSM-2014)
Flexible Architecture for Service Management in the Cloud
- (NSM-2014)
Information Flow Control for Secure Cloud Computing - (NSM-2014)
Image Processing
Cascade Category-Aware Visual Search
- (IP-2014)
Cross-Indexing of Binary SIFT Codes for Large-Scale Image Search
- (IP-2014)
Decomposition and Extraction New Framework for Visual Classification
Norm IDF for Scalable Image Retrieval
- (IP-2014)
- (IP-2014)
Information Security
On the Security of Trustee-Based Social Authentications - (IFS-2014)
Privacy-Preserving Authenticated Key-Exchange Over Internet - (IFS-2014)
Supporting Privacy Protection in Personalized Web Search
- (KDE-2014)
Data Mining / Web Mining / Web Services
Characterizing Web Page Complexity and Its Impact - (N-2014)
SeLeCT Self-Learning Classifier for Internet Traffic - (NSM-2014)
Automatic Generation of the Domain Module from Electronic Textbooks Method and Validation
-
(KDE-2014)
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
- (KDE-2014)
Efficient Prediction of Difficult Keyword Queries over Databases - (KDE-2014)
Efficient Ranking on Entity Graphs with Personalized Relationships
- (KDE-2014)
Empirical Performance Evaluation of Relational Keyword Search Techniques - (KDE-2014)
Evaluation of Range Queries with Predicates on Moving Objects
- (KDE-2014)
Facilitating Document Annotation Using Content and Querying Value - (KDE-2014)
Fast Nearest Neighbor Search with Keywords - (KDE-2014)
Graph Derivation Based Approach for Measuring and Comparing Structural Semantics of Ontologies
(KDE-2014)
Similarity Measure for Text Classification and Clustering - (KDE-2014)
Supporting Privacy Protection in Personalized Web Search
- (KDE-2014)
Investigating QoS of Real-World Web Services - (SC-2014)
Privacy-Enhanced Web Service Composition
- (SC-2014)
Scalable Architecture for Automatic Service Composition
- (SC-2014)
-
Softlect Technologies
Ph: 9885495740, 7729905740
[email protected]
NS 2
Adhoc Networks/MANETS Routing
Minimum Length Scheduling With Packet Traffic Demands in Wireless Ad Hoc Networks - (WC-2014)
Efficient Time Synchronization in a Wireless Sensor Network by Adaptive Value Tracking - (WC-2014)
Distributed Multiuser Scheduling for Improving Throughput of Wireless LAN
- (WC-2014)
Data Rate and Concurrency Balanced Approach for Broadcast in Wireless Mesh Networks
- (WC-2014)
Localization-Oriented Network Adjustment in Wireless Ad Hoc and Sensor Networks - (PDS-2014)
Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks
- (PDS-2014)
QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks - (PDS-2014)
Towards Comprehensive Path Quality Measurement in Wireless Sensor Networks
- (PDS-2014)
Towards Providing Scalable and Robust Privacy in Vehicular Networks - (PDS-2014)
Economic Framework for Routing and Channel Allocation in Cognitive Wireless Mesh Networks (NSM-2014)
Leveraging MPLS Backup Paths for Distributed Energy-Aware Traffic Engineering - (NSM-2014)
Performance–Cost Trade-Off Strategic Evaluation of Multipath TCP Communications
- (NSM-2014)
Fully Distributed Algorithms for Minimum Delay Routing Under Heavy Traffic - (MC-2014)
Joint Optimization of User-Experience and Energy-Efficiency in Wireless Multimedia Broadcast (MC-2014)
Novel Channel-Hopping Schemes for Cognitive Radio Networks - (MC-2014)
WhiteRate A Context-Aware Approach to Wireless Rate Adaptation
- (MC-2014)
Throughput-Efficient Scheduling and Interference Alignment for MIMO Wireless Systems
- (WC-2014)
Wireless Sensor Networks
Secure Data Aggregation in Wireless Sensor Networks - (IFS-2014)
Contiguous Link Scheduling for Data Aggregation in Wireless Sensor Networks - (PDS-2014)
Distributed Channel Allocation Protocols for Wireless Sensor Networks - (PDS-2014)
Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
- (PDS-2014)
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - (PDS-2014)
Secure Continuous Aggregation in Wireless Sensor Networks - (PDS-2014)
Softlect Technologies
Ph: 9885495740, 7729905740
[email protected]
Adhoc Networks/MANETS Security
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices - (IFS-2014)
Secure Data Aggregation in Wireless Sensor Networks - (IFS-2014)
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks - (PDS2014)
Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
- (PDS-2014)
Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks - (PDS-2014)
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - (PDS-2014)
Secure Continuous Aggregation in Wireless Sensor Networks - (PDS-2014)
Towards Providing Scalable and Robust Privacy in Vehicular Networks
Traffic Signature-Based Mobile Device Location Authentication
- (PDS-2014)
- (MC-2014)
Efficient Authentication for Mobile and Pervasive Computing - (MC-2014)
Adhoc Networks/MANETS Energy and Power
Practical Energy-Aware Link Adaptation for MIMO-OFDM Systems - (WC-2014)
Power Allocation Strategies in Energy Harvesting Wireless Cooperative Networks
- (WC-2014)
Minimum Energy Data Transmission for Wireless Networked Control Systems - (WC-2014)
Energy Efficient Distributed Reservation Multiple Access with Adaptive Switching Requests for Wireless
Networks - (WC-2014)
Design of a Probability Density Function Targeting Energy-Efficient Node Deployment in Wireless
Sensor Networks - (NSM-2014)
Adaptive and Energy Efficient Context Representation Framework in Mobile Sensing - (MC-2014)
Distributed Algorithms for Energy-Efficient Even Self-Deployment in Mobile Sensor Networks - (MC2014)
Energy-Aware Resource Allocation Strategies for LTE Uplink with Synchronous HARQ Constraints (MC-2014)
Energy-Efficient Relaying via Store-Carry and Forward within the Cell - (MC-2014)
Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks
2014)
- (MC-
Softlect Technologies
Ph: 9885495740, 7729905740
[email protected]
Dear Candidate,
Softlect Technologies offers IEEE Projects for B.Tech/B.E/M.Tech Students. When you join
Softlect you are provided with complete assistant from selecting the Abstract till completion of
your Viva. Student Benefit Includes: Complete Running Code and Full Documentation. We will
assist you in deploying the code in your system as well as at the college through remote desktop
sharing. The Full Documentation includes:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Introduction
Literature Survey
Feasibility Study
Cost Estimation
IEEE Format Software Requirement Specifications (SRS)
OOSD ( which includes Use Case Diagram, Activity Diagrams, Sequence Diagrams,
Collaboration Diagrams and Class Diagram)
Implementation
Screen Shots / Reports
Testing and Test Cases
Conclusion
Bibliography / References
Data Dictionary
Note: We also assist students in Project Seminars conducted by the colleges from time to time, as
well as help in research paper publication for Conference and Journals, Monthly Progress Letters,
For further assistance please feel free to visit our office between 4:00 pm to 7:00 pm or take an
appointment with the Project coordinator at your convenience.
Related documents