IEEE DOTNET PROJECT LIST 2015-2016
CLOUD COMPUTING
SNO | Projects List |
---|---|
1 | A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data |
2 | Cloud-Based Multimedia Content Protection System |
3 | Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
4 | Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds |
5 | Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data |
6 | Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem |
7 | Identity-Based Distributed Provable Data Possession in Multicloud Storage |
8 | Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud |
9 | PSMPA Patient Self-Controllable and Multi-Level Privacy-Preserving |
10 | A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud |
11 | Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage |
DATA MINING
1 | Discovery of Ranking Fraud for Mobile Apps |
2 | PAGE A Partition Aware Engine for Parallel Graph Computation |
3 | Real-time Twitter sentiment analysis with Stream Analytics |
4 | Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
5 | Query Aware Determinization of Uncertain Objects |
6 | COMIC Cost Optimization for Internet Content Multihoming |
NETWORKING
1 | Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization |
2 | Universal Network Coding-Based Opportunistic Routing for Unicast |
IMAGE PROCESSING
1 | Multiview Alignment Hashing for Efficient Image Search |
2 | Single Image Super Resolution Based on Gradient Profile Sharpness |
3 | Steganography Using Reversible Texture Synthesis |
4 | Robust Watermark Technique for Relational Data |
SECURE COMPUTING
1 | Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems |
2 | Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints |
3 | Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System |
4 | Continuous and Transparent User Identity Verification for Secure Internet |
MOBILE COMPUTING
1 | A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
2 | Friend book A Semantic-Based Friend Recommendation System for Social Networks |
3 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
PARALLEL AND DISTRIBUTED SYSTEM
1 | Authenticated Key Exchange Protocols for Parallel Network File Systems |