IEEE 2016 _ 2016 DOTNET PROJECT TITLES

 

DOTNET PROJECT TITLES 2015

 

S.NO

TITLES

DOMAIN

1.      

A Distributed Three-Hop Routing Protocol
to Increase the Capacity of Hybrid
Wireless Networks

Mobile computing

2.      

Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

Wireless communications

3.      

Continuous and Transparent User Identity
Verification for Secure Internet Services

Dependable and secure computing

4.      

A Methodology for Extracting Standing Human
Bodies From Single Images

Human-machine systems

5.      

Fiducial Facial Point Extraction Using
a Novel Projective Invariant

Image processin

6.      

Data Collection in Multi-Application Sharing
Wireless Sensor Networks

Parallel and distributed systems

7.      

Defeating Jamming With the Power of Silence:
A Game-Theoretic Analysis

Wireless communications

8.      

Detection and Rectification
of Distorted Fingerprints

Pattern analysis and machine intelligence

9.      

Discovery of Ranking Fraud for Mobile Apps

Knowledge and data engineering,

10.                   

DROPS: Division and Replication of Data in
Cloud for Optimal Performance and Security

Cloud computing

11.                   

Effective Key Management in Dynamic
Wireless Sensor Networks

Information forensics and security

12.                   

Efficient Top-k Retrieval on Massive Data

Knowledge and data engineering

13.                   

EMR: A Scalable Graph-based Ranking Model
for Content-based Image Retrieval

Knowledge and data engineering

14.                   

Eye Gaze Tracking With a Web Camera in a Desktop Environment

Human-machine systems

15.                   

Face Recognition Across Non-Uniform Motion
Blur, Illumination, and Pose

Image processing

16.                   

Friendbook: A Semantic-Based Friend
Recommendation System for Social Networks

Mobile computing,

17.                   

GDCluster: A General Decentralized
Clustering Algorithm

Knowledge and data engineering

18.                   

Head Pose Estimation From a 2D Face Image
Using 3D Face Morphing With
Depth Parameters

Image processing

19.                   

Improved Privacy-Preserving P2P Multimedia
Distribution Based on Recombined Fingerprints

Dependable and secure computing

20.                   

IncreSTS: Towards Real-Time Incremental Short
Text Summarization on Comment Streams from
Social Network Services

Knowledge and Data Engineering

21.                   

Integrated Foreground Segmentation and
Boundary Matting for Live Videos

Image processing

22.                   

Lossless and Reversible Data Hiding in Encrypted Images with
Public Key Cryptography

Circuits and Systems for Video Technology

23.                   

Malware Propagation in Large-Scale Networks

Knowledge and data engineering,

24.                   

Mobile Data Gathering with Load Balanced
Clustering and Dual Data Uploading in Wireless
Sensor Networks

Mobile computing

25.                   

OPoR: Enabling Proof of Retrievability in Cloud
Computing with Resource-Constrained Devices

Cloud computing

26.                   

Optimal Configuration of Network
Coding in Ad Hoc Networks

Technology

27.                   

Passive IP Trace back: Disclosing the Locations
of IP Spoofers From Path Backscatter

Information forensics and security,

28.                   

Privacy-Preserving and Truthful Detection
of Packet Dropping Attacks in Wireless
Ad Hoc Networks

Mobile computing

29.                   

Provable Multicopy Dynamic Data Possession
in Cloud Computing Systems

Information forensics and security

30.                   

PSMPA: Patient Self-Controllable
and Multi-Level Privacy-Preserving
Cooperative Authentication in Distributed
m-Healthcare Cloud Computing System

Parallel and distributed systems

31.                   

Real-Time Path Planning Based on
Hybrid-VANET-Enhanced Transportation System

Vehicular technology

32.                   

Secure Distributed Deduplication Systems with
Improved Reliability

Computers

33.                   

Single Image Super-Resolution Based on Gradient
Profile Sharpness

Image processing

34.                   

Steganography Using Reversible Texture Synthesis

Image processing

35.                   

TEES: An Efficient Search Scheme over
Encrypted Data on Mobile Cloud

Cloud computing

36.                   

Universal Network Coding-Based
Opportunistic Routing for Unicast

Parallel and distributed systems

37.                   

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

Dependable and secure computing

38.                   

Energy aware Web Browsing on smartphones

Parallel and distributed systems

39.                   

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

Knowledge and data engineering,

 



Place your Enquiry...

Captcha  Can't read click to refresh

OFFER


SPECIAL LINKS


LATEST NEWS