Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Android 2019-2020
Real Time Projects
Cloud Computing
Image Processing
Network Security
Mobile Computing
Data Mining
Parallel Distributed
NS2 Projects
Application Projects
MCA Projects
Wireless Communication
Diploma Projects
MBA Projects
IEEE Projects 2011
IEEE Projects 2019-2020
IEEE Projects 2015
  • Home
  • IEEE Projects 2019-2020
  • Home
  • IEEE Projects 2019-2020
IEEE Projects Java Dotnet 2011


1 PXJ01 Online Intrusion Alert Aggregation with Generative Data Stream Modeling. Abstract
2 PXJ02 Embedded Extended Visual Cryptography Schemes Abstract
3 PXJ03 Towards Situational Awareness of Large-Scale Botnet Probing Events Abstract
4 PXJ04 Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding Abstract
5 PXJ05 A Competitive Study of Cryptography Techniques over Block Cipher. Abstract
6 PXJ06 Analysis on Credit Card Fraud Detection Methods Abstract
7 PXJ07 Text Clustering with Seeds Affinity Propagation Abstract
8 PXJ08 Clustering with Multi-Viewpoint based Similarity Measure Abstract
9 PXJ09 Computational Perceptual Features for Texture Representation and Retrieval Abstract
10 PXJ10 Subspace-Based Striping Noise Reduction in Hyper-spectral Images Abstract
11 PXJ11 Ontology Based Business Process Customization for Composite Web Services Abstract
12 PXJ12 Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks Abstract
13 PXJ13 A new approach for FEC decoding based on the BP algorithm in LTE and Wi-MAX systems Abstract
14 PXJ14 Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes Abstract
15 PXJ15 Denial of Service Attacks in Wireless Networks:  The Case of Jammers Abstract
16 PXJ16 A Unified Approach to Optimizing Performance in Networks Serving Heterogeneous Flows Abstract
17 PXJ17 Optimal Bandwidth Assignment for Multiple-Description-Coded Video Abstract
18 PXJ18 Caching Strategies Based on Information Density Abstract
19 PXJ19 Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing Abstract
20 PXJ20 Effective Navigation of Query Results Based on Concept Hierarchies Abstract
21 PXJ21 Nymble- Blocking Misbehaving Users in Anonymizing Networks Abstract
22 PXJ22 Modeling and Detection of Camouflaging Worm Abstract
23 PXJ23 Buffer Sizing for 802.11 Based Networks Abstract
24 PXJ24 SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks Abstract
25 PXJ25 Discovering Conditional Functional Dependencies Abstract
26 PXJ26 Ranking Spatial Data by Quality Preferences Abstract
27 PXJ27 Extended XML Tree Pattern Matching: Theories and Algorithms Abstract
28 PXJ28 Cloud Computing for Agent-Based Urban Transportation Systems Abstract
29 PXJ29 Secure and Practical Outsourcing of Linear Programming in Cloud Computing Abstract
30 PXJ30 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks Abstract
31 PXJ31 ProgME: Towards Programmable Network Measurement Abstract
32 PXJ32 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks Abstract
33 PXJ33 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Abstract
34 PXJ34 Local greedy approximation for scheduling in Multi-hop wireless networks Abstract
35 PXJ35 A Privacy - Preserving location monitoring system for wireless sensor networks Abstract
36 PXJ36 Selfish overlay network creation and maintenance Abstract
37 PXJ37 Digital Image Authentication from JPEG Headers Abstract
38 PXJ38 Robust image watermarking based on multi scale gradient direction quantization Abstract
39 PXJ39 Stability analysis of reservation based / policies in wireless networks Abstract
40 PXJ40 Efficient communication algorithms in hexagonal mesh interconnection networks Abstract
41 PXJ41 Edge strength filter based color filter array interpolation Abstract
42 PXJ42 Model- guided adaptive recovery of compressing sensing Abstract
43 PXJ43 Generalized random walks for fusion of multi exposure images Abstract
44 PXJ44 Improving utilization of infrastructure clouds Abstract
45 PXJ45 Secure and practical outsourcing of linear programming in cloud computing Abstract
46 PXJ46 Going back and forth :Efficient multi deployment and multi snapshotting on clouds Abstract
47 PXD47 A More Secure Steganography Method in Spatial Domain. Abstract
48 PXD48 A Web Search Engine-Based Approach to Measure Semantic Similarity between Words. Abstract
49 PXD49 Detecting Kernel-Level Rootkits Using Data Structure Invariants Abstract
50 PXD50 NABS Novel Approaches for Biometric Systems Abstract
51 PXD51 Blind Image Watermarking Using a Sample Projection Approach Abstract
52 PXD52 Improving Offline Handwritten Text Recognition with Hybrid HMM/ANN Models Abstract
53 PXD53 A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks Abstract
54 PXD54 Human Motion Tracking by Temporal-Spatial Local Gaussian Process Experts Abstract
55 PXD55 Fuzzy-Zoning-Based Classification for Handwritten Characters Abstract
56 PXD56 Adaptive Spectral Transform for Wavelet-Based Color Image Compression Abstract
57 PXD57 Facial Expression Recognition Using Facial Movement Features Abstract
58 PXD58 A New Color Filter Array With Optimal Properties  for Noiseless and Noisy Color Image Acquisition Abstract
59 PXD59 Histogram Specification: A Fast and Flexible Method to Process Digital Images Abstract
60 PXD60 On Combining Shortest-Path and Back-Pressure Routing Over Multi-hop Wireless Networks Abstract
61 PXD61 Data Leakage Detection Abstract
62 PXD62 Data integrity proofs in cloud storage Abstract
63 PXD63 Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data Abstract
64 PXD64 Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud Abstract
65 PXD65 Optimal service pricing for a cloud cache Abstract
66 PXD66 Personalized Ontology Model for Web Information Gathering Abstract
67 PXD67 Efficient Computation of Range Aggregates against uncertain location based queries Abstract
68 PXD68 Scalable Learning of Collective Behavior Abstract
69 PXD69 The World in a Nutshell Concise Range Queries Abstract
70 PXD70 The Awareness Network, To Whom Should I Display My Actions And, Whose Actions Abstract
71 PXD71 Publishing Search Logs – A Comparative Study of Privacy Guarantees Abstract
72 PXD72 One Size Does Not Fit All Towards User- and Query-Dependent Ranking For Web Databases Abstract
73 PXD73 >Monitoring Service Systems from a Language-Action Perspective Abstract
74 PXD74 Adaptive Provisioning of Human Expertise in Service-oriented Systems Abstract
75 PXD75 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Abstract
76 PXD76 Exploring Application-Level Semantics for Data Compression Abstract
77 PXD77 Bridging Socially-Enhanced Virtual Communities Abstract
78 PXD78 Horizontal Aggregations in SQL to prepare Data Sets for Data Mining Analysis Abstract
79 PXD79 Vulnerability Analysis in SOA-based Business Processes Abstract
80 PXD80 Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. Abstract
81 PXD81 Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection Abstract
82 PXD82 Continuous Neighbor Discovery in Asynchronous Sensor Networks Abstract
83 PXD83 The Geometric Efficient Matching Algorithm for Firewalls Abstract
84 PXD84 Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems Abstract
85 PXD85 Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks Abstract
86 PXD86 Integration of Sound Signature in Graphical Password Authentication System Abstract
87 PXD87 Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks Abstract
88 PXD88 Optimizing the Calculation of ConditionalProbability Tables in Hybrid BayesianNetworks using Binary Factorization Abstract
89 PXD89 Optimizing Multiway Joins in a Map-Reduce Environment Abstract
90 PXD90 Wireless Multicast optimization:A Cross-layer Approach Abstract
91 PXD91 STORM:A Fremework for integrated Routing,Scheduling and traffic management in Ad Hoc Networks Abstract
92 PXD92 Cost of Not Splitting in Routing: Characterization and Estimation Abstract
93 PXD93 A Game Theoretic Approach to the Formation of Clustered Overlay Networks Abstract
94 PXD94 Cooperative Profit Sharing in Coalition-Based Resource Allocation in Wireless Networks Abstract
95 PXD95 Constrained Function-Based Message Authentication for Sensor Networks Abstract
96 PXD96 The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach Abstract
97 PXD97 Embedded Extended Visual Cryptography Schemes Abstract
98 PXD98 Leveraging Prediction to Improve the Coverage of Wireless Sensor Networks Abstract
99 PXD99 Traffic-Aware Dynamic Routing to Alleviate Congestion in
Wireless Sensor Networks
100 PXD100 A Lightweight Multi-dimensional Index for Complex
over DHTs
101 PXD101 Motion Segmentation in the Presence of Outlying, Incomplete, or Corrupted Trajectories Abstract
102 PXD102 Robust Relative Location Estimation in Wireless Sensor Networks with Inexact Position Problems Abstract