Latest IEEE 2014-2015-2016 Dotnet Project List for ME/
MCA/MSc/BE/BSc Students
SECURE COMPUTING
- Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
- Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
- Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
- An Efficient Lattice Based Multi-stage Secret Sharing Scheme
- Hacking is not random: a case-control study of webser ver-compromise risk
- VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
- Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
- My Privacy My Decision: Control of Photo Sharing on Online Social Networks
- Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
- Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
- Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
- Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
- Time-Delayed Broadcasting for Defeating Inside Jammers
SERVICES COMPUTING
1. Trustworthy Parking Communities:
Helping Your Neighbor to Find a Space
2. Diversifying Web Service
Recommendation Results via Exploring Service Usage History
3. A Highly Accurate Prediction
Algorithm for Unknown Web Service QoS Values
4. Location-Aware and Personalized
Collaborative Filtering for Web Service Recommendation
NETWORKING
- Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
- A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
- Interactive Streaming of Sequences of High Resolution JPEG2000 Images
- Cross-Domain Feature Learning in Multimedia
- A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
- Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
- . Saliency-based color accessibility
- Contextual Online Learning for Multimedia Content Aggregation
- A Probabilistic Approach for Color Correction in Image Mosaicking Applications
- A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
- An Attribute-assisted Reranking Model for Web Image Search
- RRW - A Robust and Reversible Watermarking
- Steganography Using Reversible Texture Synthesis
- Single Image Super-Resolution Based on Gradient Profile Sharpness
- Detection and Rectification of Distorted Fingerprints
- Learning Fingerprint Reconstruction: From Minutiae to Image
- A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
CLOUD COMPUTING
- Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
- Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
- EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
- Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
- Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
- Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
- Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
- Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
- Audit-Free Cloud Storage via Deniable Attribute-based Encryption
- DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
- OPOR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
- Secure Distributed Deduplication Systems withImproved Reliability
PARALLEL AND DISTRIBUTED
SYSTEMS WITH SECURE COMPUTING
- Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
- A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
- Authenticated Key Exchange Protocols for Parallel Network File Systems
- Data Collection in Multi-Application Sharing Wireless Sensor Networks
- Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
- A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
- Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
- A Hybrid Cloud Approach for Secure Authorized Deduplication
- PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System
MOBILE COMPUTING -
WIRELESS COMMUNICATION
- Optimum Power Allocation in Sensor Networks for Active Radar Applications
- A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
- Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
- Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks
KNOWLEDGE AND DATA
ENGINEERING - (DATA MINING)
- Context-based Diversification for Keyword Queries over XML Data
- Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
- Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
- Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
- Tweet Segmentation and Its Application to Named Entity Recognition
- EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
- Automatic Group Happiness Intensity Analysis
- RRW - A Robust and Reversible Watermarking Technique for Relational Data
- Query Aware Determinization of Uncertain Objects
- PAGE: A Partition Aware Engine for Parallel Graph Computation
MOBILE COMPUTING -
WIRELESS COMMUNICATION
- Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1.
Governing
Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA
ENGINEERING - (DATA MINING)
1.
BestPeer++
A Peer-to-Peer based Large-scale Data Processing Platform
2.
Secure
Mining of Association Rules in Hor izontally Distributed Databases
3.
Dynamic
Query Forms for Database Queries
4.
Secure
kNN Query Processing in Untrusted Cloud Environments
5.
An
Empirical Performance Evaluation of Relational Keyword Search Systems
6.
Keyword
Query Routing
7.
Web
Image Re-Ranking UsingQuery-Specific Semantic Signatures
8.
Demand
Bidding Program and Its Application in Hotel Energy Management
9.
An
Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
10.
Incremental
Detection of Inconsistencies in Distributed Data
11.
A
Cocktail Approach for Travel Package Recommendation
12.
The
Role of Hubness in Clustering High-Dimensional Data
- Efficient Community Formation for Web Services
PARALLEL AND DISTRIBUTED
SYSTEMS WITH SECURE COMPUTING
1.
A
Random Decision Tree Framework for Privacy-Preserving Data Mining
2.
Analysis
of Field Data on Web Security Vulnerabilities
3.
The
Client Assignment Problem for Continuous Distributed Interactive Applications
Analysis, Algorithms, and Evaluation
4.
A
Reliability Improvement Method for SOA-Based Applications
5.
Authorized
Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable
Fine-Grained Updates
6.
Efficient
and Privacy-Aware Data Aggregation in Mobile Sensing
7.
Web
Service Recommendation via Exploiting Location and QoS Information
8.
Traffic
Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
9.
Exploiting
Rateless Codes in Cloud Storage Systems
10.
COMIC:Cost
Optimization for Internet Content Multihoming
11.
Behavior
Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber
Physical Systems
12.
Privacy-Preserving
Multi-keyword Ranked Search over Encrypted Cloud Data
13.
An
Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
14.
Uniform
Embedding for Efficient JPEG Steganography
15.
Secure
Deduplication with Efficient and Reliable Convergent Key Management
16.
QoS
Aware Geographic Opportunistic Routing in Wireless Sensor Networks
17.
Link
Quality Aware Code Dissemination in Wireless Sensor Networks
18.
Exploiting
Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1.
Oruta:
Privacy-Preserving Public Auditing for Shared Data in the Cloud
2.
A
secure data self-destructing scheme in cloud computing
3.
A
Dynamic Secure Group Sharing Framework in Public Cloud Computing
4.
Privacy-Preserving
Multi-keyword Ranked Search over Encrypted Cloud Data
5.
An
Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
6.
Secure
kNN Query Processing in Untrusted Cloud Environments
7.
Exploiting
Rateless Codes in Cloud Storage Systems
8.
Fuzzy
Authorization for Cloud Storage
9.
Planning
vs. dynamic control Resource allocation in corporate clouds
10.
Automatic
Scaling of Internet Applications for Cloud Computing Services
11.
Strategy-proof
Pricing for Cloud Service Composition
12.
Privacy
Preserving Delegated Access Control in Public Clouds
13.
A
Social Compute Cloud: Allocating and Sharing Infrastructure Resources via
Social Networks
14.
Securing
the cloud storage audit service: defending against frame and collude attacks of
third party auditor
15.
Compatibility-Aware
Cloud Service Composition under Fuzzy Preferences o f Users
16.
Achieving
Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted
Cloud Data Supporting Synonym Query
17.
A
Mechanism Design Approach to Resource Procurement in Cloud Computing
18.
Panda
Public Auditing for Shared Data with Efficient User Revocation in the Cloud
19.
Identity-Based
Distributed Provable Data Possession in Multi-Cloud Storage
20.
A
Scientometric Analysis of Cloud Computing Literature
21.
Consistency
as a Service Auditing Cloud Consistency
IMAGE PROCESSING –
MULTIMEDIA
1.
A
Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image
Inpainting
2.
Visibility
Restoration of Single Hazy Images Captured in Real-World Weather Conditions
3.
Image
Search Re-ranking with Query-dependent Click-based Relevance Feedback
4.
FeatureMatch:
A General ANNF Estimation Technique and its Applications
5.
Robust
Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences
for 2D to Stereoscopic 3D Conversion
6.
Multisensor
Fusion-Based Concurrent Environment Mapping and Moving Object Detection for
Intelligent Service Robotics
7.
As-Projective-As-Possible
Image Stitching with Moving DLT
8.
Sharing
Visual Secrets in Single Image Random Dot Stereograms
9.
Photometric
Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
10.
Image
Classification Using Multiscale Information Fusion Based on Saliency Driven
Nonlinear Diffusion Filtering
11.
A
New Iterative Triclass Thresholding Technique in Image Segmentation
12.
How
to Estimate the Regularization Parameter for Spectral Regression Discriminant
Analysis and its Kernel Version?
13.
Localization
of License Plate Number Using Dynamic Image Processing Techniques And Genetic
Algorithms
14.
An
Iranian License Plate Recognition System Based on Color Features
15.
Learning
Layouts for Single-Page Graphic Designs
16.
Weighted
KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition
Model for Salient Contour Extraction in Low-Light-Level Image
17.
Single-Image
Superresolution of Natural Stochastic Textures Based on Fractional Brownian
Motion
18.
Model-Based
Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
19.
Offline
Text-Independent Writer Identification Based on Scale Invariant Feature
Transform
20.
Fingerprint
Compression Based on Sparse Representation
21.
Modeling
of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
22.
LBP-Based
Edge-Texture Features for Object Recoginition
23.
A
Compressive Sensing based Secure Watermark Detection and Privacy Preserving
Storage Framework
24.
Toward
Experiential Mobile Media Processing
25.
Quality
Assessment of Stereoscopic 3D Image Compression by Binocular Integration
Behaviors
26.
.
Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1.
Cost-Effective
Resource Allocation of Overlay Routing Relay Nodes
2.
On
the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers
Rationality and Fairness
3.
Designing
Truthful Spectrum Double Auctions with Local Markets
4.
Secure
Data Retrieval for Decentralized Disruption-Tolerant Military Networks
5.
Retransmission
Delays With Bounded Packets: Power-Law Body and Exponential Tail
6.
Message
Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
7.
Distributed
Mobile Sink Routing for Wireless Sensor Networks: A Survey
8.
D2P:
Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
9.
Cooperation
Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1.
A
Study on Clinical Prediction Using Data Mining Techniques
2.
Online
Payment System using Steganography and Visual Cryptography
3.
Efficient
Instant-Fuzzy Search with Proximity Ranking
4.
Attribute
Based Encryption with Privacy Preserving In Clouds
5.
A
Secure Client Side Deduplication Scheme in Cloud Storage Environments
EG Technologies
No:
26F Second Floor, Opp Town EB Office,
Narasimmachari
Street, Dharmapuri, pin: 636 701
Contact:
9843360513, 9894473196
Mail:
egtechproject@gmail.com
No comments:
Post a Comment