SN.NO | PROJECT TITLES | DOMAIN |
---|---|---|
1 | A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional DataA Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data | Data Mining |
2 | A Probabilistic Approach to String Transformation | Data Mining |
3 | Comparable Entity Mining from Comparative Questions | Data Mining |
4 | Crowdsourcing Predictors of Behavioral Outcomes | Data Mining |
5 | Facilitating Document Annotation using Content and Querying Value | Data Mining |
6 | Incentive Compatible Privacy-Preserving Data Analysis | Data Mining |
7 | m-Privacy for Collaborative Data Publishing | Data Mining |
8 | Spatial Approximate String Search | Data Mining |
9 | Mining Contracts for Business Events and Temporal Constraints in Service Engagements | Data Mining |
10 | Ranking on Data Manifold with Sink Points | Data Mining |
11 | The Generalization Ability of Online Algorithms for Dependent Data | Data Mining |
12 | A Load Balancing Model Based on Cloud Partitioning for the Public Cloud | Cloud Computing |
13 | AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds | Cloud Computing |
14 | Cloud computing for mobile users: can offloading computation save energy? | Cloud Computing |
15 | Collaboration in Multicloud Computing Environments: Framework and Security Issues | Cloud Computing |
16 | Mining Contracts for Business Events and Temporal Constraints in Service Engagements | Cloud Computing |
17 | Privacy-Preserving Public Auditing for Secure Cloud Storage | Cloud Computing |
18 | Winds of Change: From Vendor Lock-In to the Meta Cloud | Cloud Computing |
19 | A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud | Cloud Computing |
20 | Cloud Implementation of a Full Hyperspectral Unmixing Chain Within the NASA Web Coverage Processing Service for EO-1 | Cloud Computing |
21 | CloudMoV: Cloud-based Mobile Social TV | Cloud Computing |
22 | Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment | Cloud Computing |
23 | Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems | Cloud Computing |
24 | Optimizing Cloud Resources for Delivering IPTV Services through Virtualization | Cloud Computing |
25 | Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption | Cloud Computing |
26 | A Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing | Cloud Computing |
27 | The Power of Prediction: Cloud Bandwidth and Cost Reduction | Cloud Computing |
28 | Super-Resolution-based Inpainting | Image Processing |
29 | Casual Stereoscopic Photo Authoring | Image Processing |
30 | Estimating Information from Image Colors: An Application to Digital Cameras and Natural Scenes | Image Processing |
31 | Extracting Spread-Spectrum Hidden Data from Digital Media | Image Processing |
32 | Interactive Segmentation for Change Detection in Multispectral Remote-Sensing Images | Image Processing |
33 | Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords | Image Processing |
34 | A Scalable Server Architecture for Mobile Presence Services in Social Network Applications | Web Service |
35 | Mobile Relay Configuration in Data-intensive Wireless Sensor Networks | Networking |
36 | Towards a Statistical Framework for Source Anonymity in Sensor Networks | Networking |
37 | Vampire attacks: Draining life from wireless ad-hoc sensor networks | Networking |
38 | Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks | Networking |
39 | Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks with Joint Voltage and Modulation Scaling | Networking |
40 | Participatory Privacy: Enabling Privacy in Participatory Sensing | Networking |
41 | Price Differentiation for Communication Networks | Networking |
42 | Detection and Localization of Multiple Spoofing Attackers in Wireless Networks | Networking |
43 | Secure Encounter-based Mobile SocialNetworks: Requirements, Designs, and Tradeoffs | Web Service |
44 | Two tales of privacy in online social networks | Web Service |
45 | Fully Anonymous Profile Matching in Mobile Social Networks | Web Service |
FINAL YEAR PROJECTS IN PONDICHERRY FOR BE/ BTECH/ MCA/ B.SC /M.Sc STUDENTS.Latest IEEE pr|IEEE 2013 Final Year Projects,IEEE 2013 Final Year ENGINEERING projects,IEEE 2013 Final Year Mtech projects,IEEE 2013-2014 Final Year BE projects,IEEE 2013 Final Year Embedded Projects,IEEE 2013 Final Year JAVA projects,IEEE 2013 Final Year J2EE projects,IEEE 2013 Final Year DOT NET projects,IEEE 2013 Final Year VLSI projects,IEEE 2013 Final Year MATLAB Projects,
IEEE Projects 2013
Subscribe to:
Posts (Atom)
No comments:
Post a Comment