Menu
IEEE MASTER – IEEE PROJECTS IN PONDICHERRY
Java IEEE Projects 2015-2016 We are offering ieee projects 2015-2016 in latest technology like Java, dot net, android, embedded, matlab, vlsi, hadoop, power elctronics, power system, mechanical, civil projects. IEEE Master is a unit of LeMeniz Technologies. We guide all final year M.E/M.Tech, B.E/B.Tech, MPhil, MCA, BCA, M.Sc, B.Sc, and Diploma students for their Academic Projects to get best results
| S.NO | Code | Title | Domain | Year |
|---|---|---|---|---|
| 1 | LM_J015_01 | Efficient Filtering Algorithms for Location-Aware Publish/Subscribe | Data Mining | April 2015 |
| 2 | LM_J015_02 | Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-Dimensional Space | Data Mining | March 2015 |
| 3 | LM_J015_03 | CrowdOp: Query Optimization for Declarative Crowdsourcing Systems | Knowledge and Data Engineering | Feb 2015 |
| 4 | LM_J015_04 | Disease Inference from Health-Related Questions via Sparse Deep Learning | Knowledge and Data Engineering | March 2015 |
| 5 | LM_J015_05 | Real-Time City-Scale Taxi Ridesharing | Knowledge and Data Engineering | May 2015 |
| 6 | LM_J015_06 | t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation | Knowledge and Data Engineering | July 2015 |
| 7 | LM_J015_07 | A Proximity-aware Interest-clustered P2P File Sharing System | Parallel and Distributed Systems | Jun 2015 |
| 8 | LM_J015_08 | Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce | Parallel and Distributed Systems | March 2015 |
| 9 | LM_J015_09 | Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud | Parallel Distributed Systems | Preprint |
| 10 | LM_J015_10 | Neighbor Discovery in Wireless Networks with Multipacket Reception | Parallel Distributed Systems | July 2015 |
| 11 | LM_J015_11 | Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds | Parallel Distributed Systems | Feb 2015 |
| 12 | LM_J015_12 | VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments | Parallel Distributed Systems | April 2015 |
| 13 | LM_J015_13 | A Hybrid Cloud Approach for Secure Authorized Deduplication | Parallel Distributed Systems | May 2015 |
| 14 | LM_J015_14 | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | Parallel Distributed Systems | April 2015 |
| 15 | LM_J015_15 | Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment | Dependable and Secure Computing | Aug 2015 |
| 16 | LM_J015_16 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | Dependable and Secure Computing | Jun 2015 |
| 17 | LM_J015_17 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | Dependable Secure Computing | Feb 2015 |
| 18 | LM_J015_18 | Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers | Dependable Secure Computing | Feb 2015 |
| 19 | LM_J015_19 | Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System | Dependable Secure Computing | June 2015 |
| 20 | LM_J015_20 | Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing | Networking | Preprint |
| 21 | LM_J015_21 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | Computers | April 2015 |
| 22 | LM_J015_22 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | Computers | Preprint |
| 23 | LM_J015_23 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | Computers | Preprint |
| 24 | LM_J015_24 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | Mobile Computing | April 2015 |
| 25 | LM_J015_25 | Tracking Message Spread in Mobile Delay Tolerant Networks | Mobile Computing | Aug 2015 |
| 26 | LM_J015_26 | A privacy-preserving framework for managing mobile ad requests and billing information | Mobile Computing | Aug 2015 |
| 27 | LM_J015_27 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks | Mobile Computing | Feb 2015 |
| 28 | LM_J015_28 | Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image Retrieval | Image Processing | Feb 2015 |
| 29 | LM_J015_29 | Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage | Information Forensics and Security | Feb 2015 |
| 30 | LM_J015_30 | Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption | Information Forensics and Security | Jan 2015 |
- Abstract
- Introduction
- Existing System
- Disadvantages
- Proposed System
- Advantages
- System Requirement
- References
- Power Point Presentation
- Abstract
- Modules Description
- System Architecture
- Data Flow Diagram
- Litreature Survey
- Referece Papers
- Power Point Presentation
Sample Coding
Sample Screen Shots
Power Point Presentation
Table Design
Screen Shot
Conclusiton
Final Document
Complete Source Code
Project Execution Video
+91 9566355386 | +91 9962588976 | projects@lemenizinfotech.com