IEEE 2016 - 2017 DOTNET TITLES

IEEE DOTNET PROJECT TITLES 2016 - 2017

S.NO

TITLES

DOMAIN

1.    

EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud

CLOUD COMPUTING

2.    

Model-Driven Development Patterns for Mobile Services in Cloud of Things

CLOUD COMPUTING

3.    

Follow-Me Cloud: When Cloud Services Follow Mobile Users

CLOUD COMPUTING

4.    

Stochastic Load Balancing for Virtual Resource Management in  Datacenters

CLOUD COMPUTING

5.    

Providing User Security Guarantees in Public Infrastructure Clouds

CLOUD COMPUTING

6.    

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

CLOUD COMPUTING

7.    

Crowd sourcing based Description of Urban Emergency Events using Social Media Big Data

CLOUD COMPUTING

8.    

Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics

CLOUD COMPUTING

9.    

Using Socio-Spatial Context in Mobile Cloud Offload Process for Energy Conservation in Wireless Devices

CLOUD COMPUTING

10.                       

Using Crowd sourcing to Provide QoS for Mobile Cloud Computing

CLOUD COMPUTING

11.                       

A  Novel Statistical Cost Model and an Algorithm for Efficient Application Offloading to Clouds

CLOUD COMPUTING

12.                       

A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing

CLOUD COMPUTING

13.                       

A Data and Task  Co-scheduling Algorithm for Scientific Cloud Workflows

CLOUD COMPUTING

14.                       

Achieving Energy Efficiency in Data Centers Using an Artificial Intelligence Abstraction Model

CLOUD COMPUTING

15.                       

Assurance of Security and Privacy Requirements for Cloud Deployment Model

CLOUD COMPUTING

16.                       

 On the Performance Impact of Data Access Middleware for Data Stores

CLOUD COMPUTING

17.                       

Identity-Based Private Matching over Outsourced Encrypted Datasets

CLOUD COMPUTING

18.                       

ADON: Application-Driven Overlay Network-as-a-Service for Data-Intensive Science

CLOUD COMPUTING

19.                       

Chaotic Searchable Encryption for Mobile Cloud Storage

CLOUD COMPUTING

20.                       

Cypher DB: A Novel Architecture for Outsourcing Secure Database Processing

CLOUD COMPUTING

21.                       

Architectural Protection of Application Privacy Against Software and Physical Attacks in Un trusted Cloud Environment

CLOUD COMPUTING

22.                       

A Context-aware Service Evaluation Approach over Big Data for  Cloud Applications

CLOUD COMPUTING

23.                       

A Decision-Theoretic Rough Set Approach for Dynamic Data Mining

DATA MINING

24.                       

TelCoVis: Visual Exploration of Co-occurrence in Urban Human Mobility Based on Telco Data

DATA MINING

25.                       

Interactive Visual Discovering of Movement Patterns from Sparsely Sampled Geo-tagged Social Media Data

DATA MINING

26.                       

ecoSense: Minimize Participants' Total 3G Data Cost in Mobile Crowdsensing Using Opportunistic Relays

DATA MINING

27.                       

A Kind of Novel ITS Based on Space-Air-Ground Big-Data

DATA MINING

28.                       

Recent Development in Big Data Analytics for Business Operations and Risk Management

DATA MINING

29.                       

Online Ensemble Learning of Data Streams with Gradually Evolved Classes

DATA MINING

30.                       

Diplo Cloud: Efficient and Scalable Management of RDF Data in the  Cloud

DATA MINING

31.                       

Graph Regularized Feature Selection with Data Reconstruction

DATA MINING

32.                       

NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks

DATA MINING

33.                       

Nearest Keyword Set Search in Multi-Dimensional Datasets

DATA MINING

34.                       

Online Mode Switch Algorithms for Maintaining Data Freshness in Dynamic Cyber-Physical Systems

DATA MINING

35.                       

Data-driven Soft  Decoding of Compressed Images in Dual Transform-Pixel Domain

IMAGE PROCESSING

36.                       

Double-Tip Artefact Removal from Atomic Force Microscopy Images

IMAGE PROCESSING

37.                       

Weakly Supervised Fine-Grained Categorization with Part-Based Image Representation

IMAGE PROCESSING

38.                       

Robust Visual Tracking via Convolutional Networks without Training

IMAGE PROCESSING

39.                       

Learning Invariant Color Features for Person Re-Indentification

IMAGE PROCESSING

40.                       

A Diffusion and Clustering-based Approach for Finding Coherent Motions and Understanding Crowd Scenes

IMAGE PROCESSING

41.                       

Automatic Design of Color Filter Arrays in The Frequency Domain

IMAGE PROCESSING

42.                       

Learning Iteration-wise Generalized Shrinkage-Thre sholding  Operators for Blind Deconvolution

IMAGE PROCESSING

43.                       

Image Segmentation Using Parametric Contours With Free Endpoints

IMAGE PROCESSING

44.                       

CASAIR: Content and Shape-Aware Image Retargeting and Its  Applications

IMAGE PROCESSING

45.                       

Texture classification using Dense Micro-block Difference

IMAGE PROCESSING

46.                       

Statistical performance analysis of a fast super-resolution technique using noisy translations

IMAGE PROCESSING

47.                       

Internet-based Indoor Navigation Services

WEB SERVICES

48.                       

Tools Enabling Online Contributions by Older Adults

WEB SERVICES

49.                       

Social media interaction and analytics for enhanced educational experiences

WEB SERVICES

50.                       

Crowdsourcing processes: a survey of approaches and opportunities

WEB SERVICES

51.                       

GWMEP: Task-Manager-as-a-Service in Apache CloudStack

WEB SERVICES

52.                       

Service Provisioning in Content-Centric Networking: Challenges, Opportunities, and Promising Directions

WEB SERVICES

53.                       

Distributed Data Management Service for VPH Applications

WEB SERVICES

54.                       

Ensembling Classifiers for Detecting User's Intentions behind Web Queries

WEB SERVICES

55.                       

Techniques for Defending from Buffer Overflow Vulnerability Security Exploits

WEB SERVICES

56.                       

Separating Operational and Control Behaviors: A New Approach to Web Services Modeling

WEB SERVICES

57.                       

Incentive Mechanisms in P2P Media Streaming Systems

WEB SERVICES

58.                       

An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks

NETWORKING

59.                       

An Optimization Framework for Mobile Data Collection in Energy- Harvesting Wireless Sensor Networks

NETWORKING

60.                       

Distributed and Fair Beaconing Rate Adaptation for Congestion  Control in Vehicular Networks

NETWORKING

61.                       

Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering

NETWORKING

62.                       

Unlicensed Spectra Fusion and Interference Coordination for LTE  Systems

NETWORKING

63.                       

On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment

NETWORKING

64.                       

A Super process With Upper Confidence Bounds for Cooperative  Spectrum Sharing

NETWORKING

65.                       

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

 

 

66.                       

Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates

 

 

67.                       

Providing User Security Guarantees in Public Infrastructure Clouds

 

 

68.                       

Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps

 

 

69.                       

Text Mining the Contributors to Rail Accidents

 

 

70.                       

PiCode: a New Picture-Embedding 2D Barcode

 

 

71.                       

Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases

 

 

72.                       

Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation

 

 

73.                       

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection

 

 

74.                       

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

 

 

75.                       

Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm

 

 

76.                       

Cloud workflow scheduling with deadlines and time slot availability

 

 

77.                       

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

 

 

78.                       

 Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing.

 

 

79.                       

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

 

 

80.                       

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing

 

 

81.                       

CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal

 

 

82.                       

Cloud workflow scheduling with deadlines and time slot availability

 

 

83.                       

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

 

 

84.                       

Dynamic Proofs of Retrievability for Coded Cloud Storage Systems

 

 

85.                       

Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates

 

 

86.                       

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

 

 

87.                       

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

 

 

88.                       

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection

 

 

89.                       

Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud

 

 

90.                       

Providing User Security Guarantees in Public Infrastructure Clouds

 

 

91.                       

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys

 

 

92.                       

Reversible Data Hiding in Encrypted Images by Reversible Image Transformation

 

 

93.                       

Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage

 

 

94.                       

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

 

 

95.                       

Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps

 

 

96.                       

Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis

 

 

97.                       

A Performance Evaluation of Machine Learning-Based Streaming Spam Tweets Detection

 

 

 

 

 

 



Place your Enquiry...

Captcha  Can't read click to refresh

OFFER


SPECIAL LINKS


LATEST NEWS