ieee 2014 title's list for computer science students
DESCRIPTION
Gagner Technologies offers M.E projects based on IEEE 2014 . M.Phil Research projects,Final Year Projects, M.E projects 2014-2015, mini projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT IEEE 2013 Projects in Data Mining, Distributed System, Mobile Computing, Networks, Networking. IEEE2014-2015 projects. Final Year Projects at Chennai, IEEE Software Projects, Engineering Projects, MCA projects, BE projects, JAVA projects, J2EE projects, .NET projects, Students projects, Final Year Student Projects, IEEE Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT, MCA, B TECH, ME, M SC (IT), BCA, BSC CSE, IT,software Engineering For more details contact below Address No 1,South Dhandapani street(opposite to T.Nagar Bus Stand),T.Nagar,chennai-17TRANSCRIPT
IEEE 2014 PROJECTS
CLOUD COMPUTING
CODE TITLES
GC001 A combinatorial auction-based mechanism for dynamic vm provisioning and allocation in clouds
GC002 A Hyper-Heuristic Scheduling Algorithm for Cloud
GC003 Adaptive Algorithm for Minimizing Cloud Task Length with Prediction Errors
GC004 Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud
GC005 Cloud migration research: a systematic review
GC006 Compatibility-aware Cloud Service Composition Under Fuzzy Preferences of Users
GC007 Deadline based Resource Provisioning and Scheduling Algorithm for Scientific Workflows on Clouds
GC008 Decreasing Impact of SLA Violations A Proactive Resource Allocation Approach for Cloud Computing Environments
GC009 Dynamic cloud pricing for revenue maximization
GC010 Hybrid attribute and re-encryption based key management for secure and scalable mobile applications in clouds
GC011 Integrity for join queries in the cloud
GC012 Is the same instance type created equal? Exploiting heterogeneity of public clouds
GC013 Multi objective Game Theory-based Schedule Optimization for Bags-of-Tasks on Hybrid Clouds
GC014 Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
GC015 Performance and cost evaluation of an adaptive encryption architecture for cloud database services
GC016 Probabilistic consolidation of virtual machines in self-organizing cloud data centers
GC017 QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment
GC018 Scalable Analytics for IaaS Cloud Availability
GC019 Thermal-Aware Scheduling of Batch Jobs in Geographically Distributed Data Centers
GC020 Transformation-based Monetary Cost Optimizations for Workflows in the Cloud
GC021 Virtualization Technology for TCPIP Offload Engine
GC022 Workload-Aware Credit Scheduler for Improving Network IO Performance in Virtualization Environment
DATA MINING
CODE TITLES
GD001 A two-level topic model towards knowledge discovery from citation networks
GD002 Accuracy-constrained privacy-preserving access control mechanism for relational data
GD003 Active learning without knowing individual instance labels: a pair wise label homogeneity query approach
GD004 An automated framework for incorporating news into stock trading strategies
GD005 Classifier ensembles with the extended space forest
GD006 Core: a context-aware relation extraction method for relation completion
GD007 Data mining with big data
GD008 Effectively indexing the multidimensional uncertain objects
GD009 Efficient ranking on entity graphs with personalized relationships
GD010 Extended sub tree: a new similarity function for tree structured data
GD011 Fast nearest neighbor search with keywords
GD012 Identity protection in sequential releases of dynamic networks
GD013 Improving activity recognition by segmental pattern mining
GD014 Local Thresholding in general network graphs
GD015 Multi comm.: finding community structure in multi-dimensional networks
GD016 Online feature selection and its applications
GD017 Robust perceptual image hashing based on ring partition and nmf
GD018 Searching dimension incomplete databases
DISTRIBUTED SYSTEM
CODE TITLES
GDS01 A Model Approach to the Estimation of Peer-to-Peer Traffic Matrices
GDS02 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
GDS03 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
GDS04 A Survey of Performance Modeling and Simulation Techniques for Accelerator-based Computing
GDS05 Achieving Asymmetric Sensing Coverage for Duty Cycled Wireless Sensor Networks
GDS06 An Iterative Method for Calculating Robust Rating Scores
GDS07 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
GDS08 Bit Torrent Locality and Transit Traffic Reduction When, Why, and at What Cost
GDS09 BURSE A Bursty and Self-similar Workload Generator for Cloud Computing
GDS10 Cooperative Positioning and Tracking in Disruption Tolerant Networks
GDS11 D2P Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
GDS12 Data Gathering with Compressive Sensing in Wireless Sensor Networks A Random Walk Based Approach
GDS13 Distributed Sensing for High-Quality Structural Health Monitoring using WSNs
GDS14 Distributed Smart-home Decision-making in a Hierarchical Interactive Smart Grid Architecture
GDS15 Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
GDS16 Efficient Range-Based Storage Management for Scalable Data stores
GDS17 Efficient Virtual Backbone Construction without a Common Control Channel in Cognitive Radio Networks
GDS18 Enhancing Internet-scale Video Service Deployment Using Microblog-based Prediction
GDS19 Free Market of Crowd sourcing Incentive Mechanism Design for Mobile Sensing
GDS20 Impact of Brooks-Iyengar Distributed Sensing Algorithm on Real Time Systems
GDS21 Improving Update-Intensive Workloads on Flash Disks Through Exploiting Multi-Chip Parallelism
GDS22 KASR A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Application
GDS23 Maximizing the Throughput of Hash Tables in Network Devices with Combined SRAMDRAM Memory
GDS24 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
GDS25 Omni directional Coverage for Device-free Passive Human Detection
GDS26 Order-Optimal Information Dissemination in MANETs via Network Coding
GDS27 OTrack Towards Order Tracking for Tags in Mobile RFID System
GDS28 Parallel Simulation of Complex Evacuation Scenarios with Adaptive Agent Models
GDS29 Performance-Oriented Partitioning for Task Scheduling of Parallel Reconfigurable Architectures
GDS30 Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph
GDS31 Signature Searching in a Networked Collection of Files
GDS32 Social-Aware Replication in Geo-Diverse Online Systems
GDS33 SPOC A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
GDS34 TAMES A Truthful Double Auction for Multi-Demand Heterogeneous Spectrums
GDS35 Time Synchronization Based on Slow-Flooding in Wireless Sensor Networks
GDS36 TMC Exploiting Trajectories for Multicast in Sparse Vehicular Networks
GDS37 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds
GDS38 Web Service Recommendation via Exploiting Location and QoS Information
MOBILE COMPUTING
CODE TITLES
GM001 A Two-Phase Dispatch Heuristic to Schedule the Movement of Multi-Attribute Mobile Sensors in a Hybrid Wireless Sensor Network
GM002 An Automatic, Robust, and Efficient Multi-User Breadcrumb System for Emergency Response Applications
GM003 Calibrating Indoor Positioning Systems
GM004 Capacitive Touch Communication A Technique to Input Data through Devices' Touch Screen
GM005 Data Retrieval Scheduling for Multi-Item Requests in Multi-Channel Wireless Broadcast Environments
GM006 DOTS A Propagation Delay-Aware Opportunistic MAC Protocol for Mobile Underwater Networks
GM007 Efficient Authentication for Mobile and Pervasive Computing
GM008 Efficient Rekeying Framework for Secure
GM009 Evaluating Service Disciplines for On-Demand Mobile Data Collection in Sensor Networks
GM010 Face-to-Face Proximity Estimation Using Bluetooth on Smart phones
GM011 Investigating the Privacy versus Forwarding Accuracy Tradeoff in Opportunistic Interest-Casting
GM012 Minimum Latency Multiple Data MULE Trajectory Planning in Wireless Sensor Networks
GM013 Opportunistic Channel Sharing in Cognitive Radio Networks
GM014 Optimizing Spatial and Temporal Reuse in Wireless Networks by Decentralized Partially Observable Markov Decision Processes
GM015 Profiling aquatic diffusion process using robotic sensor networks
GM016 Radio Resource Allocation and Green Operation for Mobile Access Networks Based on Radio-over-Fiber
GM017 RF-Sensing of Activities from Non-Cooperative Subjects in Device-Free Recognition Systems Using Ambient and Local Signals
GM018 Security Analysis of Handover Key Management in 4G LTESAE Networks
GM019 Two-Tier Het Nets with Cognitive Femto cells Downlink Performance Modeling and Analysis in a Multichannel Environment
GM020 White Rate A Context-Aware Approach to Wireless Rate Adaptation
NETWORK SECURITY
CODE TITLES
GNS01 A Computational Dynamic Trust Model for User Authorization
GNS02 A Large-Scale Study of the Time Required to Compromise a Computer System
GNS03 A Note On Orchestrating an Ensemble of Map Reduce Jobs for Minimizing Their Make span
GNS04 A Random Decision Tree Framework for Privacy-preserving Data Mining
GNS05 Analysis of field data on web security vulnerabilities
GNS06 Cipher SXRay Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution
GNS07 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
GNS08 Continuous and Transparent User Identity Verification for Secure Internet Services
GNS09 Control Flow-based Malware Variant Detection
GNS10 Effective Risk Communication for Android Apps
GNS11 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
GNS12 Efficient Tagging of Remote Peers During Child Pornography Investigations
GNS13 Enforcing Obligations within Relational Database Management Systems
GNS14 Evaluation of Web Security Mechanisms using Vulnerability and Attack Injection
GNS15 Extending the Agile Development Approach to Develop Acceptably Secure Software
GNS16 Fault-Tolerant Network Interfaces for Networks-on-Chip
GNS17 Generating Summary Risk Scores for Mobile Applications
GNS18 HBFT Speculative Byzantine Fault Tolerance With Minimum Cost
GNS19 Hiding in the Mobile Crowd Location Privacy through Collaboration
GNS20 Human Effects of Enhanced Privacy Management Models
GNS21 Hyper Check A Hardware-Assisted Integrity Monitor
GNS22 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
GNS23 k-Zero Day Safety A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities
GNS24 Meeting Cardinality Constraints in Role Mining
GNS25 MFTS A Multi-level Fault-tolerant Archiving Storage with Optimized Maintenance Bandwidth
GNS26 MINT A Reliability Modeling Framework for Energy-Efficient Parallel Disk
Systems
GNS27 MOSES Supporting and Enforcing Security Profiles on Smart phones
GNS28 On the Hardness of Adding Non masking Fault Tolerance
GNS29 PPTP Privacy-Preserving Traffic Padding in Web-Based Applications
GNS30 PRGA Privacy-preserving Recording & Gateway-assisted Authentication of Power Usage Information for Smart Grid
GNS31 Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
GNS32 Private Searching on Streaming Data Based on Keyword Frequency
GNS33 Pushing Java Type Obfuscation to the Limit
GNS34 Secure Ordered Bucketization
GNS35 Security Analysis and Related Usability of Motion-based CAPTCHAs Decoding Code words in Motion
GNS36 SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design
GNS37 Software-Level Approaches to Implementing Fault-Tolerant Systems on Coarse-Grained Reconfigurable Architecture
GNS38 STARS A Statistical Traffic Pattern Discovery System for MANETs
NETWORKING
CODE TITLES
GN001 A Study on the Performance of a Three-Stage Load-Balancing Switch
GN002 Algorithms for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE HetNets
GN003 An Urn Occupancy Approach for Modeling the Energy Consumption of Distributed Beaconing
GN004 AP Association for Proportional Fairness in Multi rate WLANs
GN005 Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
GN006 Fast Regular Expression Matching Using Small TCAM
GN007 Graceful Convergence in Link-State IP Networks A Lightweight Algorithm Ensuring Minimal Operational Impact
GN008 Green Networking With Packet Processing Engines Modeling and Optimization
GN009 ISP-Friendly Live P2P Streaming
GN010 Joint Routing and Medium Access Control in Fixed Random Access Wireless Multi hop Networks
GN011 Learning-Based Uplink Interference Management in 4G LTE Cellular Systems
GN012 Max-Weight Scheduling in Queuing Networks with Heavy-Tailed Traffic
GN013 Multipath Wireless Network Coding An Augmented Potential Game Perspective
GN014 On Sample-Path Optimal Dynamic Scheduling for Sum-Queue Minimization in Forests
GN015 On the Multiple Uncast Capacity of 3-Source, 3-Terminal Directed Acyclic Networks
GN016 Optimal Wave banding in WDM Ring Networks
GN017 Optimally Adaptive Power-Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System
GN018 Optimization Decomposition for Scheduling and System Configuration in Wireless Networks
GN019 PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
GN020 Reliable and Timely Event Notification for Publish Subscribe Services Over the Internet
GN021 Retransmission Delays with Bounded Packets Power-Law Body and Exponential Tail
GN022 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
GN023 Temporal Traffic Dynamics Improve the Connectivity of Ad Hoc Cognitive Radio Networks
GN024 The Wide-Area Virtual Service Migration Problem A Competitive Analysis Approach
SOFTWARE ENGNEERING
CODE TITLES
GS001 A Model-Driven Methodology for Developing Secure Data-Management Applications
GS002 A Study of Variability Models and Languages in the Systems Software Domain
GS003 An Observe-Model-Exercise Paradigm to Test Event-Driven Systems with Undetermined Input Spaces
GS004 Analyzing Critical Decision-Based Processes
GS005 Automated Fixing of Programs With Contracts
GS006 Automatic Summarization of Bug Reports
GS007 Conservation of Information Software's Hidden Clockwork
GS008 Dealing with traceability in the MDD of model transformations
GS009 Effects of developer experience on learning and applying Unit Test-Driven Development
GS010 Formulating Cost-Effective Monitoring Strategies for Service-based Systems
GS011 Governing Software Process Improvementsin Globally Distributed Product Development
GS012 Identifying Code of Individual Features in Client-Side Web Applications
GS013iTree- Efficiently Discovering High-Coverage Configurations Using Interaction Trees
GS014 Methodbook- Recommending Move Method Refactorings via Relational Topic
Models
GS015 Modular Software Model Checking for Distributed Systems
GS016 On the Asymptotic Behavior of Adaptive Testing Strategy for Software Reliability Assessment
GS017 REPENT Analyzing the Nature of Identifier Renamings
GS018 Specification and Verification of Normative Texts using C-O Diagrams
GS019 Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings
GS020 Supporting the Combined Selection of Model-based Testing Techniques
GS021 Symbolic Crosschecking of Data-Parallel Floating-Point Code
GS022 Synthesizing Multithreaded Code from Real-Time Object-Oriented Models via Schedulability-Aware Thread Derivation
GS023 Task Environment Complexity, Global Team Dispersion, Process Capabilities, and Coordination in Software Development
GS024 Usability through Software Design
GS025 Variability in Software Systems—A Systematic Literature Review
GS026 Verifying Protocol Conformance Using Software Model Checking for the Model-Driven Development of Embedded Systems
GS027 You Are the Only Possible Oracle- Effective Test Selection for End Users of
Interactive Machine Learning Systems