Professional Documents
Culture Documents
MMDA
COLONY,
ARUMBAKKAM
CHENNAI-600106
Web: www.ieeeproject.in
E-Mail: ieeeproject@hotmail.com
Trichy
Chennai
Mobile:- 09003012150
Mobile:- 09944361169
Phone:- 0431-4013174
SBGC Provides IEEE 2013 -2014 projects for all Final Year Students. We do assist the students
with Technical Guidance for two categories.
IEEE
Papers.
Category 2: Students selecting from our project list.
When you register for a project we ensure that the project is implemented to your fullest
satisfaction and you have a thorough understanding of every aspect of the project.
SEABIRDS PROVIDES YOU THE LATEST IEEE 2012 PROJECTS / IEEE 2013 PROJECTS
FOR FOLLOWING DEPARTMENT STUDENTS
B.E, B.TECH, M.TECH, M.E, DIPLOMA, MS, BSC, MSC, BCA, MCA, MBA, BBA, PHD,
B.E (ECE, EEE, E&I, ICE, MECH, PROD, CSE, IT, THERMAL, AUTOMOBILE,
MECATRONICS, ROBOTICS) B.TECH(ECE, MECATRONICS, E&I, EEE, MECH , CSE, IT,
ROBOTICS) M.TECH(EMBEDDED SYSTEMS, COMMUNICATION SYSTEMS, POWER
ELECTRONICS,
COMPUTER
ELECTRONICS,
VLSI
SYSTEMS,
POWER
Design)
SCIENCE,
SOFTWARE
M.E(EMBEDDED
ELECTRONICS,
ENGINEERING,
SYSTEMS,
COMPUTER
APPLIED
COMMUNICATION
SCIENCE,
SOFTWARE
ENGINEERING, APPLIED ELECTRONICS, VLSI Design) DIPLOMA (CE, EEE, E&I, ICE,
MECH, PROD, CSE, IT)
We also have training and project, R & D division to serve the students and make them job
oriented professionals.
shots)
TECHNOLOGY: JAVA
DOMAIN: CLOUD COMPUTING
S. No.
1.
IEEE TITLE
ABSTRACT
Decentralized
Access
IEEE YEAR
with Anonymous in
clouds
that
supports
anonymous
Stored
are
able
to
decrypt
the
stored
centralized.
The
communication,
2014
2.
Modeling
Distributed
attention
recently.
Delivering
Systems
Practical
Performance
Analysis
processing
middleware.
Evaluating
the
way.
What
distinguish
our
2014
existing
works
measurements
rely
under
on
performance
variety
of
models
and systematically
of
HDFS
on
EC2
to
Balancing
AbstractIn
Performance,
database
distributed
systems
transactional
deployed
over
cloud
Accuracy,
Precision
Secure
Transactions
enforcement
approaches
to
2014
Two-Phase
Validation
Commit
bringing
privacy
concerns.
Data
Anonymization
Using
MapReduce
Cloud
2014
computation
in
highly
improved
over
existing
approaches.
5.
Dynamic
By
leveraging
virtual
machine
(VM)
Optimization
Multiattribute
Resource
Allocation
2013
Self-Organizing
Clouds
computing
power
over
the
allocation
scheme
to
manage
that
mitigates
the
contention
among
algorithms
can
make
an
Scalable
privacy
concerns
as
personal
health
Encryption
achieving
fine-grained,
2013
cryptographically
enforced
data
access
that
greatly
reduces
the
key
simultaneously
by
exploiting
revocation
and
break-glass
and
experimental
presented
which
show
results
the
are
security,
patterns to
2013
whereby
conducting
extensive
TECHNOLOGY: JAVA
DOMAIN: Data Mining
S. No.
IEEE TITLE
1.
Facilitating
ABSTRACT
IEEE YEAR
Document
Using
Content
Querying Value
unstructured
text.
While
information
2014
evaluation
shows
that
our
An
Performance
of
Relational
Keyword
Search
proposed,
but
despite
numerous
Techniques
of
relational
keyword
search
do
not
provide
acceptable
2014
previous
claims
regarding
the
predicates
in
SQL
become
Formed Groups
aggregate
function-based
2014
The
experiments
verified
its
Keyword
Routing
keyword-element
that
relationship
compactly
represents
mentioning
them.
multilevel
2014
Rough
Hypercuboid
for
Approximation
Spaces
partition
matrix,
novel
the
relevance,
dependency,
and
measures
of
to
describe
approximate
the
classification.
of
classification
computational
complexity
accuracy,
is
and
established
2014
6.
Active Learning of
Constraints
for
Semi-Supervised
Clustering
and
cannot-link
constraints
for
neighborhoods
contain
labeled
expands
the
neighborhoods
by
data
sets
consistent
and
and
the
results
substantial
2014
7.
in
2014
Personalized Web
Search
that
personalization
evaluate
the
and
privacy risk
the
utility
of
of
Privacy-Preserving
Enhanced
Collaborative
2014
Tagging
collaborative
tagging
Event
Characterization
phase
and
Prediction
space
multivariate
(MRPS)
temporal
for
patterns
identifying
that
are
in
Dynamic
System
Data
extends
the
original
univariate
on
fuzzy
unsupervised
clustering
2014
We
performed
experimental
Discovering
Emerging Topics in
between
users
that
are
generated
measured
through
the
model.
we
gathered
from
Twitter.
The
2014
experiments show that the proposed mentionanomaly-based approaches can detect new
topics at least as early as text-anomaly-based
approaches, and in some cases much earlier
when the topic is poorly identified by the
textual contents in posts.
11.
2013
Facilitating
Effective
Improvement
have
been
proposed
to
relink
2013
on
large
synthetic
data
sets
to
Building a Scalable
Database-Driven
Reverse Dictionary
2013
provide
significant
improvements
in
of
the
result.
Our
experiments
TECHNOLOGY: JAVA
DOMAIN: DEPENDABLE & SECURE COMPUTING
S. No.
IEEE TITLE
ABSTRACT
1.
IEEE YEAR
2014
Differentially
Private
Release
Vertically
provides
one
of
the
strongest
privacy
Partitioned Data
we
present
an
algorithm
for
2.
Bandwidth
denial-of-service
2014
(BW-DDoS)
have
employed
relatively
crude,
Vulnerabilities
the
vulnerabilities
security
has
risk
been
of
unknown
considered
as
2014
of
vulnerabilities
having
available,
more
unknown
applicable,
and
network
security
practices
may
necessarily
known
beforehand.
Several
2014
with
faithful
ones.
Verifiable
Thanks
to
game
theory,
the
XML Documents
from
the
actual
XML
2013
modified
according to
the
SORT:A
Self-
Organizing
Trust
2013
TECHNOLOGY: JAVA
DOMAIN: IMAGE PROCESSING
S. No.
IEEE TITLE
ABSTRACT
1.
Large
Discriminative
context-based
prediction
IEEE YEAR
and
structural
Structured
Prediction
Modeling
Max-Margin
Markov
for Lossless Image sense of the least code length. It not only
2014
Coding
interdependencies
to
make
the
error
is
asymptotically
upper
Multi-Illuminant
AbstractMost
existing
color
constancy
2014
Estimation
With algorithms
assume
uniform
illumination.
Conditional
Random Fields
this
problem
as
an
energy
Saliency-Aware
AbstractIn
region-of-interest
(ROI)-
Video
Compression
2014
to
reduce
in
non-ROI
parts.
Translation
Invariant
Directional
Framelet
structure
Transform
Combined
is
developed
to
maintain
the
2014
invariant
directional
framelet
minimization
of
residuals.
capability
incorporating
multivariate
of
the
image
MAP
exponential
denoising,
estimator
for
distribution.
denoising
methods,
such
as
Vector-Valued
Image
2014
2013
Efficient
for
Content
construction
Re reconstruction
problem
in
self-embedding
Self-Embedding
2013
system.
We
perform
an
performance.
The
reference
and
Security
Implications
2013
algorithm,
which
can
often
be
experimental
results
indicate
that,
knowledge
of
advanced
image
Degraded
Document Images
by different
types
of
document
2013
dataset
that
consists
of
several
Per-ColorantChannel
Barcodes
Mobile
Applications:
2013
Interference
Cancellation
Framework
in
the
data
rate
by encoding
we
develop
an
algorithm
for
required
for
cross-channel
methodologies:
pilot
block
the
synchronization
expectation
maximization
blocks
and
approach
an
that
the
proposed
framework
using
specific
QR
and
Aztec
codes.
TECHNOLOGY: JAVA
DOMAIN: MOBILE COMPUTING
S. No.
IEEE TITLE
1.
Cooperative
ABSTRACT
IEEE YEAR
Contract-Based dynamic
Approach
spectrum
access.
Cooperative
2014
where
SUs
wireless
does
not
completely
know
In
the
weakly
incomplete
incomplete
information
scenario,
(DC)
approximate
and
the
strongly
incomplete
Energy-Aware
Resource
framework
for
energy
efficient
resource
Allocation
Synchronous
HARQ Constraints
2014
we
approaches
to
propose
two
minimize
suboptimal
average
power
Preserving
Applications
significantly
improved
location
user-specific,
distance-preserving
2014
Snapshot
Continuous
Collection
Probabilistic
Wireless
Networks
and
Data operation
of
Wireless
Sensor
Networks
paper,
more
reasonable
model,
2014
process
by
forming
data
of
N
times
better
QoS-Oriented
AbstractAs
wireless
communication
2014
Distributed
Routing
for
Wireless Networks
and
wireless
infrastructure
By
directly
adopting
resource
of
hybrid
networks.
Taking
reduce
transmission
delay,
3)
to
increase
and
5)
the
transmission
data
redundancy
the
redundant
data
to
further
Cooperative
AbstractDisruption
tolerant
networks
Caching
Efficient
Access
2014
Networks
overhead.
simulations
Extensive
show
that
our
trace-driven
approach
Real-Time
Misbehavior
the
wireless
IEEE
protocols,
802.11
for
distributed
2014
An
Approach
ratio
under
detection
delay
Coverage-Based
Probabilistic
Rebroadcast
neighbor
coverage-based
2013
probability.
Our
approach
Forwarding
Sleep-Wake
Cycling
Sensor Networks
2013
optimal
forwarding
algorithm
Toward
Preserving
Collusion
Resistance
in
Location
Updating System
2013
approaches
for
outlier
significantly
privacy,
colluding attacks.
preserve
and
the
source
effectively
detect
11.
Distributed
Cooperation
and Cooperation
Diversity
Hybrid
Networks
and
Diversity
Combining
Combining
(PMRC)
2013
Toward
Statistical
the
indistinguishability
notion
and
of
interval
provides
hypothesis
testing
with
nuisance
2013
source
anonymity
to
binary
the
effect
of
the
nuisance
Vampire
2013
TECHNOLOGY: JAVA
DOMAIN: NETWORKING
S. No.
IEEE TITLE
1.
Fast
Regular
ABSTRACT
AbstractRegular
IEEE YEAR
expression
(RE)
2014
Expression
Matching
Small TCAM
We
propose
three
novel
TCAM
encoding
scheme
that
Green Networking
With
Processing
2014
consumption
while
coping
with
data
from
software
router
On
Sample-Path
Optimal
Scheduling
Sum-Queue
Minimization
Forests
in roots (sinks) of the forest. We consider a timeslotted system and a primary (or one-hop)
interference
existence
model.
of
causal
We
characterize
sample-path
the
optimal
2014
policies
exist
in
restricted
forest
an
equivalent
linear
network
and
4.
PACK: PredictionBased
Bandwidth
Cost
System
costs
induced
by
the
TRE
suitable
for
pervasive
computation
2014
present
fully
functional
PACK
Secure
Data
Retrieval
Decentralized
Disruption-
Tolerant
Networks
Military Disruption-tolerant
network
(DTN)
is
promising
cryptographic
problem
of
applying
CP-ABE
in
2014
revocation,
key
escrow,
and
DTNs
where
authorities
manage
multiple
their
key
attributes
manage
the
confidential
data
of
fluid
flow
model
2013
Utilizing
Correlation
Wireless
Networks
2013
System
evaluation
and
extensive
the
total
number
of
packet
Complexity
Analysis
Bandwidth
Scheduling
Dedicated
Networks
2013
and
then
tackled
by
Efficient
Algorithms
Neighbor
Discovery
2013
Wireless Networks
Semi-Random
in
contention-based
wireless
LANs.
The
the
equivalence
of
resource
2013
modification
to
the
implementations.
existing
Theoretical
Maximization
Frame
work
Multicarrier
Wireless
Networks
efficient
utilization
of
spectrum
2013
multiplexing
(OFDM)
cellular
scenarios:
namely,
when
users
experience
different
path
losses,
TECHNOLOGY: JAVA
DOMAIN: PARALLEL & DISTRIBUTED SYSTEM
S. No.
IEEE TITLE
1.
Enabling
ABSTRACT
In
this
paper,
IEEE YEAR
we
propose
Trustworthy Service
Evaluation
in
Service-Oriented
Mobile
networks
Networks
Social
(S-MSNs).
Each
service
about
its
services
without
reviews
can
then
be
made
2014
attacks,
and
develop
to
deal
Specifically,
enables
with
the
users
these
attacks.
TSE
(bTSE)
basic
to
distributedly
and
chain
hierarchical
and
techniques.
It
form
by
aggregate
restricts
the
using
signature
service
Thus,
the
integrity
and
Tag
Scheme
Encoding
Network
coding
allows
against
Pollution Attack to
Linear
Coding
Network
2014
security of KEPTE
with
regard to
the
existing
key
Exploiting
Service
Similarity
for
Privacy in Location-
Based
Queries
Search
2014
requirement
without
location
based
service
Network
Aware
Coding
Ad
Network
several
coding,
packets
which
together
for
throughput.
Introducing
network
while
serving
its
own
traffic
2014
Misbehavior
Detection
toward
Networks
routing
toward
efficient
trust
2014
setting
an
appropriate
investigation
simulation
results
demonstrate
the
AbstractInterconnected
systems,
Correlation Analysis
most common and aggressive means, denialof-service (DoS) attacks cause serious impact
on these computing systems. In this paper, we
present a DoS attack detection system that
uses multivariate correlation analysis (MCA)
for accurate network traffic characterization
by extracting the geometrical correlations
between network traffic features. Our MCA-
2014
ReDS: A Framework
for
AbstractDistributed
hash
tables
Enhanced DHTs
2014
for
enhancing
lookups
in
extensive
simulations,
we
8.
operations.
For
cheating
nodes
with
requesting
few
2013
Cluster-Based
Certificate
Revocation
Vindication
Capability
Mobile
Networks
2013
accurate
propose
certificate
the
Revocation
revocation,
Cluster-based
with
Vindication
we
Certificate
Capability
and
vindicate
warned
nodes
as
Fused
Structures
2013
2013
number
of
control
messages
High
Resource Allocation
Strategies
Computational
Economies
of
resource
allocation,
however
2013
Several
diverse
synthetic
benefits
and
economic
Optimal
Server
for
Distributed Systems
2013
Scheduling
2013
data
collection
often
changes
patterns.
TECHNOLOGY: JAVA
DOMAIN: SOFTWARE ENGINEERING
S. No.
IEEE TITLE
1.
Ant
ABSTRACT
Optimization
Software
Scheduling
Staffing with
Event-Based
Scheduler
IEEE YEAR
2013
scheduler
(EBS)
and
an
ant
colony
of
resource
conflict
and
task
TECHNOLOGY: DOTNET
DOMAIN: CLOUD COMPUTING
S. No.
IEEE TITLE
ABSTRACT
1.
paper
presents
IEEE YEAR
a
novel
2014
UCONABC
Resilient
Authorization
tracking
fine-grained
user
service
authorization
environments
like
2014
(periodical)
reevaluation,
an
resilience
to
the
UCONABC
Distributed,
Concurrent,
2014
cloud
database
services
with
data
and
including those
independent
operations
analyses
and
extensive
Key-Aggregate
Cryptosystem
Scalable
Sharing
AbstractData
sharing
is
an
in
2014
Storage
that
produce
constant-size
TECHNOLOGY: DOTNET
DOMAIN: DATA MINING
S. No.
IEEE TITLE
1.
A Group Incremental
Approach to Feature
ABSTRACT
Many
Applying
real
data
increase
2014
Selection
IEEE YEAR
in
economics,
several
fields
population
including
studies,
and
entropy.
When
multiple
in
much
shorter
time.
Consensus-Based
2014
Ranking
Count,
and
develop
efficient
and
Spatiotemporal
Outlier Detection
spatiotemporal
data
set.
The
approximations.
We
have
also
2014
Discovering
Temporal
Patterns
Change technique
Presence
in
Taxonomies
the recurrent
that
focuses
correlations
on
among
discovering
data.
The
2013
pattern,
namely
the
History
its
frequent
generalizations
approach.
To
focus
the
InformationTheoretic
Detection for Large- set, those objects that do not conform to wellScale
Data
sets.
This
problem
is
especially
definition
of
outliers
and
an
and
total
correlation
into
2013
Robust
Based
Management
Module- The current trend for building an ontologyData based data management system (DMS) is to
capitalize on efforts made to design a
preexisting well-established DMS (a reference
system). The method amounts to extracting
from the reference DMS a piece of schema
relevant to the new application needs-a
module
-,
possibly personalizing
it
with
extra
2013
constraints
w.r.t.
the
application
under
DMS.
We
carry
out
our
of
the
DL-lite
family,
which
in
Network
Anonymization
2013
node
reidentification
through
structure
anonymization
TECHNOLOGY: DOTNET
DOMAIN: PARALLEL & DISTRIBUTED SYSTEM
S. No.
IEEE TITLE
1.
Behavioral
ABSTRACT
IEEE YEAR
distributed
nature
of
DTNs
for
behavioral
characterization
of
2014
LocaWard:
Security
Privacy
Location-Based
Rewarding System
recently.
Unfortunately,
current
2014
rewarding
system,
called
in
the
meantime.
We
finally
Power
Cost
Reduction
AbstractThis
in stochastic
Distributed
paper
optimization
considers
approach
for
2014
job
Workloads
guarantees.
The
performance
and
Traffic
Pattern-
AbstractDue
Based
Content popularity
of
to
the
multimedia
increasing
streaming
undesirable
content-leakage
has,
indeed,
2014