IEEE 2011 Projects
Titles are listed below:1.A Machine Learning Approach to TCP Throughput Prediction
2.Feedback-Based Scheduling for Load-Balanced Two-Stage Switches
3.Trust management in mobile ad hoc networks using a scalable maturity based model
4.Online social networks
5.Sharing location in online social networks
6.Fuzzy Data Standardization
7.Computing With Words With the Ontological Self-Organizing Map
8.On the Quality of Service of Crash-Recovery Failure Detectors
9.Including both static and dynamic typing in the same programming language
10.Design principles of web-based distance education system and sample application in Afyon Kocatepe University
11.Privacy-Preserving Sharing of Sensitive Information
12.Preserving Privacy Based on Semantic Policy Tools
13.The Phish-Market Protocol: Secure Sharing Between Competitors
14.Internet Filtering Issues and Challenges
15.Can Public-Cloud Security Meet Its Unique Challenges?
16.Encrypting Keys Securely
17.Auto-Context and Its Application to High-Level Vision Tasks and 3D Brain Image Segmentation
18.Accurate Image Search Using the Contextual Dissimilarity Measure
19.Feature Analysis and Evaluation for Automatic Emotion Identification in Speech
20.A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization
21.Automatic Detection of Off-Task Behaviors in Intelligent Tutoring Systems with Machine Learning Techniques
22.Predictive Network Anomaly Detection and Visualization
23.PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects
24.Web-Application Security: From Reactive to Proactive
26.Trust and Reputation Management
27.Multi-body Structure-and-Motion Segmentation by Branch-and-Bound Model Selection
28.Active Image Re ranking
29.Content Based Image Retrieval using PSO
30.A Managerial community of Web Services for management of communities of Web Services
31.Automatic Composition of Semantic Web Services an Enhanced State Space Search Approach
32.Knowledge-first web services an E-Government example
33.The Applied Research of Cloud Computing Platform Architecture In the E-Learning Area
34.Cloud Computing System Based on Trusted Computing Platform
35.IT Auditing to Assure a Secure Cloud Computing
36.Performance Evaluation of Cloud Computing Offerings
37.Providing Privacy Preserving in cloud computing
38.Ontology for E-Learning: A Bayesian Approach
39.Assessing Student Learning in a Virtual Laboratory Environment
40.VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks
41.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
42.Aging Bloom Filter with Two Active Buffers for Dynamic Sets
43.Bayesian Classifiers Programmed in SQL
44.Juggler: Virtual Networks for Fun and Profit
45.A Personalized Ontology Model For Web Information Gathering
46.Adaptive Provisioning Of Human Expertise In Service-Oriented Systems
47.Bridging Socially-Enhanced Virtual Communities
48.Data Integrity Proofs In Cloud Storage
49.Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries
50.Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud
51.Exploring Application-Level Semantics For Data Compression
52.Optimal Service Pricing For A Cloud Cache
53.Digital Image hiding using curve let transform
54.Publishing Search Logs – A Comparative Study Of Privacy Guarantees
55.The Awareness Network, To Whom Should I Display My Actions And, Whose Actions
56.Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
57.Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
58.Integration Of Sound Signature In Graphical Password Authentication System
59.Monitoring Service Systems From A Language-Action Perspective
60.One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases
61.Data Integrity Proofs In Cloud Storage
62.The World In A Nutshell: Concise Range Queries
63.Intrusion detection: An Energy efficient approach in heterogeneous WSN
64.NABS Novel Approaches for Biometric Systems
65.A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm
66.A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification
67.Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
68.Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
69.Throughput Optimization in High Speed Downlink Packet Access
70.A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm
71.A Web Search Engine Based Approach to Measure Semantic Similarity Between Words
72.Weighted Energy Detection for Noncoherent Ultra-Wideband Receiver Design
73.Problems and Solutions of Web Search Engines
74.Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
75.Live Streaming with Receiver-based Peer-division Multiplexing
76.Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection