we are published title for the academic year 2015-2016. we are deals with java, j2ee, dot.net, ns2, matlab simulation, ieee power system and power electronics simulation and hardware projects, embedded, plc and vlsi projects. ieee projects in pondicherry
S.NO |
TITLE |
CODE |
DOWNLOAD |
KNOWLEDGE AND DATA ENGINEERING / DATA MINING |
|||
1 | Efficient Filtering Algorithms for Location-Aware Publish/Subscribe | LM_J015_01 | ABSTRACT |
2 | Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-Dimensional Space | LM_J015_02 | ABSTRACT |
3 | CrowdOp: Query Optimization for Declarative Crowdsourcing Systems | LM_J015_03 | ABSTRACT |
4 | Disease Inference from Health-Related Questions via Sparse Deep Learning | LM_J015_04 | ABSTRACT |
5 | Real-Time City-Scale Taxi Ridesharing | LM_J015_05 | ABSTRACT |
6 | t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation | LM_J015_06 | ABSTRACT |
PARALLEL DISTRIBUTED SYSTEM |
|||
7 | A Proximity-aware Interest-clustered P2P File Sharing System | LM_J015_07 | ABSTRACT |
8 | Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce | LM_J015_08 | ABSTRACT |
9 | Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud | LM_J015_09 | ABSTRACT |
10 | Neighbor Discovery in Wireless Networks with Multipacket Reception | LM_J015_10 | ABSTRACT |
11 | Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds | LM_J015_11 | ABSTRACT |
12 | VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments | LM_J015_12 | ABSTRACT |
13 | A Hybrid Cloud Approach for Secure Authorized Deduplication | LM_J015_13 | ABSTRACT |
14 | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | LM_J015_14 | ABSTRACT |
Dependable and Secure Computing |
|||
15 | Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment | LM_J015_15 | ABSTRACT |
16 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | LM_J015_16 | ABSTRACT |
17 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | LM_J015_17 | ABSTRACT |
18 | Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers | LM_J015_18 | ABSTRACT |
19 | Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System | LM_J015_19 | ABSTRACT |
NETWORKING |
|||
20 | Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing | LM_J015_20 | ABSTRACT |
COMPUTERS |
|||
21 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | LM_J015_21 | ABSTRACT |
22 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | LM_J015_22 | ABSTRACT |
23 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | LM_J015_23 | ABSTRACT |
MOBILE COMPUTING |
|||
24 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | LM_J015_24 | ABSTRACT |
25 | Tracking Message Spread in Mobile Delay Tolerant Networks | LM_J015_25 | ABSTRACT |
26 | Tracking Message Spread in Mobile Delay Tolerant Networks | LM_J015_26 | ABSTRACT |
27 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks | LM_J015_27 | ABSTRACT |
28 | Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage | LM_J015_28 | ABSTRACT |
INFORMATION FORENSICS AND SECURITY |
|||
29 | Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage | LM_J015_29 | ABSTRACT |
30 | Privacy-Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption |
we are offering ieee projects, ns2 projects, android project, final year projects for ME/MTECH,BE/BTECh,MCA/MSCStudents. we are offering java/j2ee projects, dotnet projects,ns2 projects and ieee project