Saturday, 5 December 2015

Latest IEEE 2014-2015-2016 Dotnet Project List for ME/ MCA/MSc/BE/BSc Students



Latest IEEE 2014-2015-2016 Dotnet Project List for ME/ MCA/MSc/BE/BSc Students
CLOUD COMPUTING
  1. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
  2. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
  3. ENDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
  4. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
  5. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  6. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
  7. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
  8. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
  9. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
  10. DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
  11. OPOR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
  12. Secure Distributed Deduplication Systems withImproved Reliability
13.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
14.  A secure data self-destructing scheme in cloud computing
15.  A Dynamic Secure Group Sharing Framework in Public Cloud Computing
16.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
17.  An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
18.  Secure kNN Query Processing in Untrusted Cloud Environments
19.  Exploiting Rateless Codes in Cloud Storage Systems
20.  Fuzzy Authorization for Cloud Storage
21.  Planning vs. dynamic control Resource allocation in corporate clouds
22.  Automatic Scaling of Internet Applications for Cloud Computing Services
23.  Strategy-proof Pricing for Cloud Service Composition
24.  Privacy Preserving Delegated Access Control in Public Clouds
25.  A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
26.  Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
27.  Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
28.  Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
29.  A Mechanism Design Approach to Resource Procurement in Cloud Computing
30.  Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
31.  Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
32.  A Scientometric Analysis of Cloud Computing Literature
33.  Consistency as a Service Auditing Cloud Consistency
34.  A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
35.  Cloud-Based Multimedia Content Protection System
36.  Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
37.  Enabling Fine-grained Multi-keyword Search Supporting Classified Subdictionaries over Encrypted Cloud Data
38.  Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem Identity-Based Distributed Provable Data Possession in Multicloud Storage
39.  Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
  1. PSMPA: Patient Self-Controllable and Multi-Level Privacy- Preserving
  2. Cooperative Authentication in Distributed m- Healthcare Cloud Computing System
  3. SelCSP: A Framework to Facilitate Selection of Cloud Service Providers



KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1.      Context-based Diversification for Keyword Queries over XML Data
2.      Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
3.      Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
4.      Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
5.      Tweet Segmentation and Its Application to Named Entity Recognition
6.      EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
7.      Automatic Group Happiness Intensity Analysis
8.      RRW - A Robust and Reversible Watermarking Technique for Relational Data
9.      Query Aware Determinization of Uncertain Objects
10.  PAGE: A Partition Aware Engine for Parallel Graph Computation
11.  Discovery of Ranking Fraud for Mobile Apps
12.  PAGE: A Partition Aware Engine for Parallel Graph Computation
13.  Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
14.  BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
15.  Secure Mining of Association Rules in Hor izontally Distributed Databases
16.  Dynamic Query Forms for Database Queries
17.  Secure kNN Query Processing in Untrusted Cloud Environments
18.  An Empirical Performance Evaluation of Relational Keyword Search Systems
19.  Keyword Query Routing
20.  Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
21.  Demand Bidding Program and Its Application in Hotel Energy Management
22.  An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
23.  Incremental Detection of Inconsistencies in Distributed Data
24.  A Cocktail Approach for Travel Package Recommendation
25.  The Role of Hubness in Clustering High-Dimensional Data
26.  Efficient Community Formation for Web Services

NETWORKING
  1. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
  2. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
  3. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
  4. Cross-Domain Feature Learning in Multimedia
  5. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
  6. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
  7. . Saliency-based color accessibility
  8. Contextual Online Learning for Multimedia Content Aggregation
  9. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
  10. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
  11. An Attribute-assisted Reranking Model for Web Image Search
  12. RRW - A Robust and Reversible Watermarking
  13. Steganography Using Reversible Texture Synthesis
  14. Single Image Super-Resolution Based on Gradient Profile Sharpness
  15. Detection and Rectification of Distorted Fingerprints
  16. Learning Fingerprint Reconstruction: From Minutiae to Image
  17. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
  18. Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
  19. Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis
  20. Universal Network Coding-Based Opportunistic Routing for Unicast
21.  Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
22.  On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
23.  Designing Truthful Spectrum Double Auctions with Local Markets
24.  Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
25.  Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
26.  Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
27.  Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
28.  D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
29.  Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
SECURE COMPUTING
  1. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
  2. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
  3. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
  4. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
  5. Hacking is not random: a case-control study of webser ver-compromise risk
  6. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
  7. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
  8. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
  9. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
  10. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
  11. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
  12. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
  13. Time-Delayed Broadcasting for Defeating Inside Jammers
  14. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
  15. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
  16. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
  17. Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System
SERVICES COMPUTING
1.      Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
2.      Diversifying Web Service Recommendation Results via Exploring Service Usage History
3.      A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
4.      Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
  1. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
  2. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
  3. Authenticated Key Exchange Protocols for Parallel Network File Systems
  4. Data Collection in Multi-Application Sharing Wireless Sensor Networks
  5. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
  6. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
  7. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
  8. A Hybrid Cloud Approach for Secure Authorized Deduplication
  9. PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System
  10. A Random Decision Tree Framework for Privacy-Preserving Data Mining
  11. Analysis of Field Data on Web Security Vulnerabilities
  12. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
  13. A Reliability Improvement Method for SOA-Based Applications
  14. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
  15. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
  16. Web Service Recommendation via Exploiting Location and QoS Information
  17. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
  18. Exploiting Rateless Codes in Cloud Storage Systems
  19. COMIC:Cost Optimization for Internet Content Multihoming
  20. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
  21. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
  22. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
  23. Uniform Embedding for Efficient JPEG Steganography
  24. Secure Deduplication with Efficient and Reliable Convergent Key Management
  25. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
  26. Link Quality Aware Code Dissemination in Wireless Sensor Networks
  27. Exploiting Service Similarity for Privacy in Location Based Search Queries
MOBILE COMPUTING - WIRELESS COMMUNICATION
28.  Optimum Power Allocation in Sensor Networks for Active Radar Applications
29.  A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
30.  Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
31.  Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks
32.  Keylogging-resistant Visual Authentication Protocols
33.  A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
34.  Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks
35.  Optimal Configuration of Network Coding in Ad Hoc Networks
36.  Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
37.  Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
IMAGE PROCESSING – MULTIMEDIA
1.      A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
2.      Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
3.      Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
4.      FeatureMatch: A General ANNF Estimation Technique and its Applications
5.      Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
6.      Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
7.      As-Projective-As-Possible Image Stitching with Moving DLT
8.      Sharing Visual Secrets in Single Image Random Dot Stereograms
9.      Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
10.  Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
11.  A New Iterative Triclass Thresholding Technique in Image Segmentation
12.  How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
13.  Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
14.  An Iranian License Plate Recognition System Based on Color Features
15.  Learning Layouts for Single-Page Graphic Designs
16.  Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
17.  Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
18.  Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
19.  Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
20.  Fingerprint Compression Based on Sparse Representation
21.  Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
22.  LBP-Based Edge-Texture Features for Object Recoginition
23.  A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
24.  Toward Experiential Mobile Media Processing
25.  Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
26.  . Corruptive Artifacts Suppression for Example-Based Color Transfer
INTERNATIONAL CONFERENCE
1.      A Study on Clinical Prediction Using Data Mining Techniques
2.      Online Payment System using Steganography and Visual Cryptography
3.      Efficient Instant-Fuzzy Search with Proximity Ranking
4.      Attribute Based Encryption with Privacy Preserving In Clouds
5.      A Secure Client Side Deduplication Scheme in Cloud Storage Environments

EG Technologies
No: 26F Second Floor, Opp Town EB Office,
Narasimmachari Street, Dharmapuri, pin: 636 701
Contact: 9843360513, 9894473196