IEEE 2011 Projects

IEEE 2011 Projects 

Titles are listed below:

1.A Machine Learning Approach to TCP Throughput Prediction

2.Feedback-Based Scheduling for Load-Balanced Two-Stage Switches

3.Trust management in mobile ad hoc networks using a scalable maturity based model

4.Online social networks

5.Sharing location in online social networks

6.Fuzzy Data Standardization

7.Computing With Words With the Ontological Self-Organizing Map

8.On the Quality of Service of Crash-Recovery Failure Detectors

9.Including both static and dynamic typing in the same programming language

10.Design principles of web-based distance education system and sample application in Afyon Kocatepe University

11.Privacy-Preserving Sharing of Sensitive Information

12.Preserving Privacy Based on Semantic Policy Tools

13.The Phish-Market Protocol: Secure Sharing Between Competitors

14.Internet Filtering Issues and Challenges

15.Can Public-Cloud Security Meet Its Unique Challenges?

16.Encrypting Keys Securely

17.Auto-Context and Its Application to High-Level Vision Tasks and 3D Brain Image Segmentation

18.Accurate Image Search Using the Contextual Dissimilarity Measure

19.Feature Analysis and Evaluation for Automatic Emotion Identification in Speech

20.A Stochastic Approach to Image Retrieval Using Relevance Feedback and Particle Swarm Optimization

21.Automatic Detection of Off-Task Behaviors in Intelligent Tutoring Systems with Machine Learning Techniques

22.Predictive Network Anomaly Detection and Visualization

23.PAM: An Efficient and Privacy-Aware Monitoring Framework for Continuously Moving Objects

24.Web-Application Security: From Reactive to Proactive

26.Trust and Reputation Management

27.Multi-body Structure-and-Motion Segmentation by Branch-and-Bound Model Selection

28.Active Image Re ranking

29.Content Based Image Retrieval using PSO

30.A Managerial community of Web Services for management of communities of Web Services

31.Automatic Composition of Semantic Web Services an Enhanced State Space Search Approach

32.Knowledge-first web services an E-Government example

33.The Applied Research of Cloud Computing Platform Architecture In the E-Learning Area

34.Cloud Computing System Based on Trusted Computing Platform

35.IT Auditing to Assure a Secure Cloud Computing

36.Performance Evaluation of Cloud Computing Offerings

37.Providing Privacy Preserving in cloud computing

38.Ontology for E-Learning: A Bayesian Approach

39.Assessing Student Learning in a Virtual Laboratory Environment

40.VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks

41.Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes

42.Aging Bloom Filter with Two Active Buffers for Dynamic Sets

43.Bayesian Classifiers Programmed in SQL

44.Juggler: Virtual Networks for Fun and Profit

45.A Personalized Ontology Model For Web Information Gathering

46.Adaptive Provisioning Of Human Expertise In Service-Oriented Systems

47.Bridging Socially-Enhanced Virtual Communities

48.Data Integrity Proofs In Cloud Storage

49.Efficient Computation Of Range Aggregates Against Uncertain Location Based Queries

50.Exploiting Dynamic Resource Allocation For Efficient Parallel Data Processing In The Cloud

51.Exploring Application-Level Semantics For Data Compression

52.Optimal Service Pricing For A Cloud Cache

53.Digital Image hiding using curve let transform

54.Publishing Search Logs – A Comparative Study Of Privacy Guarantees

55.The Awareness Network, To Whom Should I Display My Actions And, Whose Actions

56.Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems

57.Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

58.Integration Of Sound Signature In Graphical Password Authentication System

59.Monitoring Service Systems From A Language-Action Perspective

60.One Size Does Not Fit All: Towards User- And Query-Dependent Ranking For Web Databases

61.Data Integrity Proofs In Cloud Storage

62.The World In A Nutshell: Concise Range Queries

63.Intrusion detection: An Energy efficient approach in heterogeneous WSN

64.NABS Novel Approaches for Biometric Systems

65.A Fast Multiple Longest Common Subsequence (Mlcs) Algorithm

66.A Fuzzy Self-Constructing Feature Clustering Algorithm For Text Classification

67.Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks

68.Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design

69.Throughput Optimization in High Speed Downlink Packet Access

70.A User-oriented Image Retrieval System Based on Interactive Genetic Algorithm

71.A Web Search Engine Based Approach to Measure Semantic Similarity Between Words

72.Weighted Energy Detection for Noncoherent Ultra-Wideband Receiver Design

73.Problems and Solutions of Web Search Engines

74.Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems

75.Live Streaming with Receiver-based Peer-division Multiplexing

76.Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection