Home || About
us || Contact us || Sales || Course || Multimedia
|| Project || Netwoking || Back
2015 TO 2008 Project Titles in .NET
S.NO |
2015 DOTNET |
DOMAIN |
YEAR |
|||||
1 |
A Secure and Dynamic Multi-keyword
Ranked Search Scheme over Encrypted Cloud Data |
CLOUD COMPUTING |
2015 |
|||||
2 |
Cloud-Based
Multimedia Content Protection System |
CLOUD COMPUTING |
2015 |
|||||
3 |
Control Cloud Data Access Privilege
and Anonymity with Fully Anonymous
Attribute-Based Encryption |
CLOUD COMPUTING |
2015 |
|||||
4 |
Cost-Minimizing Dynamic Migration of Content
Distribution Services
into Hybrid Clouds |
CLOUD COMPUTING |
2015 |
|||||
5 |
Enabling Fine-grained Multi-keyword
Search Supporting Classified
Sub-dictionaries over Encrypted Cloud Data |
CLOUD COMPUTING |
2015 |
|||||
6 |
Energy-aware Load Balancing and
Application Scaling for the Cloud
Ecosystem |
CLOUD COMPUTING |
2015 |
|||||
7 |
Identity-Based Distributed Provable
Data Possession in Multicloud
Storage |
CLOUD COMPUTING |
2015 |
|||||
8 |
Panda: Public Auditing for Shared Data
with Efficient User Revocation
in the Cloud |
CLOUD COMPUTING |
2015 |
|||||
9 |
PSMPA: Patient Self-Controllable and
Multi-Level Privacy- Preserving Cooperative Authentication
in Distributed m- Healthcare Cloud Computing System |
CLOUD COMPUTING |
2015 |
|||||
10 |
SelCSP: A Framework to Facilitate
Selection of Cloud Service Providers |
CLOUD COMPUTING |
2015 |
|||||
11 |
Discovery
of Ranking Fraud for Mobile Apps |
DATA MINING |
2015 |
|||||
12 |
PAGE: A
Partition Aware Engine for Parallel Graph Computation |
DATA MINING |
2015 |
|||||
13 |
Privacy Policy Inference of
User-Uploaded Images on Content Sharing
Sites |
DATA MINING |
2015 |
|||||
14 |
Query
Aware Determinization of Uncertain Objects |
DATA MINING |
2015 |
|||||
15 |
Collision Tolerant and Collision Free
Packet Scheduling for Underwater
Acoustic Localization |
NETWORKING |
2015 |
|||||
16 |
Defeating Jamming With the Power of
Silence: A Game-Theoretic Analysis |
NETWORKING |
2015 |
|||||
17 |
Universal Network Coding-Based
Opportunistic Routing for Unicast |
NETWORKING |
2015 |
|||||
18 |
A Distributed Three-hop Routing
Protocol to Increase the Capacity
of Hybrid Wireless Networks |
MOBILE
COMPUTING |
2015 |
|||||
19 |
Mobile Data Gathering with Load
Balanced Clustering and Dual Data
Uploading in Wireless Sensor Networks |
MOBILE
COMPUTING |
2015 |
|||||
20 |
Optimal
Configuration of Network Coding in Ad Hoc Networks |
MOBILE
COMPUTING |
2015 |
|||||
21 |
Privacy-Preserving and Truthful
Detection of Packet Dropping Attacks in
Wireless Ad Hoc Networks |
MOBILE
COMPUTING |
2015 |
|||||
22 |
Authenticated Key Exchange Protocols
for Parallel Network File Systems |
PARALLEL AND DISTRIBUTED
SYSTEMS |
2015 |
|||||
23 |
Behavior Rule Specification-Based
Intrusion Detection for Safety Critical Medical Cyber Physical
Systems |
SECURE
COMPUTING |
2015 |
|||||
24 |
Generating Searchable Public-Key
Ciphertexts with Hidden Structures for Fast Keyword Search |
SECURE
COMPUTING |
2015 |
|||||
25 |
Improved Privacy-Preserving P2P
Multimedia Distribution Based on Recombined Fingerprints |
SECURE
COMPUTING |
2015 |
|||||
26 |
Key-Recovery Attacks on KIDS, a Keyed
Anomaly Detection System |
SECURE
COMPUTING |
2015 |
|||||
27 |
An Attribute-Assisted Reranking Model
for Web Image Search |
IMAGE
PROCESSING |
2015 |
|||||
28 |
Automatic Face Naming by Learning
Discriminative Affinity Matrices From Weakly Labeled Images |
IMAGE
PROCESSING |
2015 |
|||||
29 |
Detection and Rectification of
Distorted Fingerprints |
IMAGE
PROCESSING |
2015 |
|||||
30 |
Eye Gaze Tracking With a Web Camera in
a Desktop Environment |
IMAGE
PROCESSING |
2015 |
|||||
31 |
Learning Fingerprint Reconstruction:
From Minutiae to Image |
IMAGE
PROCESSING |
2015 |
|||||
32 |
Multiview Alignment Hashing for
Efficient Image Search |
IMAGE
PROCESSING |
2015 |
|||||
33 |
Single Image Superresolution Based on
Gradient Profile Sharpness |
IMAGE
PROCESSING |
2015 |
|||||
34 |
Steganography Using Reversible Texture
Synthesis |
IMAGE
PROCESSING |
2015 |
|||||
35 |
Location-Aware and Personalized
Collaborative Filtering for Web Service Recommendation |
SERVICE COMPUTING (WEB SERVICE) |
2015 |
|||||
|
|
|
|
|||||
S.N |
2014
IEEE DOT TITLES - JP |
Domain |
2014 |
|||||
1 |
Balancing
Performance, Accuracy, and Precision for Secure Cloud Transactions |
Cloud Computing |
2014 |
|||||
2 |
Building
Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation |
Cloud Computing |
2014 |
|||||
3 |
Consistency as a Service: Auditing Cloud Consistency |
Cloud Computing |
2014 |
|||||
4 |
Decentralized
Access Control with Anonymous Authentication of Data Stored in Clouds |
Cloud Computing |
2014 |
|||||
5 |
Distributed,
Concurrent, and Independent Access to Encrypted Cloud Databases |
Cloud Computing |
2014 |
|||||
6 |
Enabling
Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory
and Implementation |
Cloud Computing |
2014 |
|||||
7 |
Identity-Based
Distributed Provable Data Possession in Multi- Cloud Storage |
Cloud Computing |
2014 |
|||||
8 |
Key-Aggregate
Cryptosystem for Scalable Data Sharing in Cloud Storage |
Cloud Computing |
2014 |
|||||
9 |
Panda: Public
Auditing for Shared Data with Efficient User Revocation in the Cloud |
Cloud Computing |
2014 |
|||||
10 |
Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data |
Cloud Computing |
2014 |
|||||
11 |
Scalable
Distributed Service Integrity Attestation for Software-asa- Service Clouds |
Cloud Computing |
2014 |
|||||
12 |
A Cocktail Approach for Travel Package Recommendation |
Data mining |
2014 |
|||||
13 |
An Empirical
Performance Evaluation of Relational Keyword Search Techniques |
Data mining |
2014 |
|||||
14 |
LARS*:
An Efficient and Scalable Location-Aware Recommender System |
Data mining |
2014 |
|||||
15 |
Product Aspect Ranking and Its Applications |
Data mining |
2014 |
|||||
16 |
Secure
Mining of Association Rules in Horizontally Distributed Databases |
Data mining |
2014 |
|||||
17 |
Supporting Privacy Protection in Personalized Web Search |
Data mining |
2014 |
|||||
18 |
TrustedDB:
A Trusted Hardware-Based Database with Privacy and Data Confidentiality |
Data mining |
2014 |
|||||
19 |
Typicality-Based
Collaborative Filtering Recommendation |
Data mining |
2014 |
|||||
20 |
Captcha as
Graphical Passwords—A New Security Primitive Based on Hard AI Problems |
Secure
computing |
2014 |
|||||
21 |
Content
Caching and Scheduling in Wireless Networks With Elastic and Inelastic
Traffic |
Networking |
2014 |
|||||
22 |
Secure Data
Retrieval for Decentralized Disruption-Tolerant Military Networks |
Networking |
2014 |
|||||
23 |
A
Probabilistic Misbehavior Detection Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks |
Parallel
& Distributed |
2014 |
|||||
24 |
A System
for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis |
Parallel
& Distributed |
2014 |
|||||
25 |
An
Error-Minimizing Framework for Localizing Jammers in Wireless Networks |
Parallel
Distributed |
2014 |
|||||
26 |
Certificateless
Remote Anonymous Authentication Schemes for Wireless Body Area Networks |
Parallel
Distributed |
2014 |
|||||
27 |
Efficient
Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks |
Distributed |
2014 |
|||||
28 |
Multicast
Capacity in MANET with Infrastructure Support |
Parallel
Distributed |
2014 |
|||||
29 |
Secure
and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks |
Parallel
Distributed |
2014 |
|||||
30 |
Transmission-Efficient
Clustering Method for Wireless Sensor Networks Using Compressive Sensing |
Parallel
& Distributed |
2014 |
|||||
31 |
A
QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks |
Mobile
Computing |
2014 |
|||||
32 |
Autonomous
Mobile Mesh Networks |
Mobile
Computing |
2014 |
|||||
33 |
DA-Sync:
A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor
Networks |
Mobile
Computing |
2014 |
|||||
34 |
Leveraging
Social Networks for P2P Content-Based File Sharing in Disconnected MANETs |
Mobile
Computing |
2014 |
|||||
35 |
Preserving
Location Privacy in Geosocial Applications |
Mobile
Computing |
2014 |
|||||
36 |
Web Image
Re-Ranking Using Query-Specific Semantic Signatures |
Pattern analysis |
2014 |
|||||
37 |
Click
Prediction for Web Image Reranking Using Multimodal Sparse Coding |
Image
processing |
2014 |
|||||
38 |
Designing
an Efficient Image Encryption-Then-Compression System via Prediction Error
Clustering and Random Permutation |
Image
processing |
2014 |
|||||
|
|
|
|
|||||
|
|
|
|
|||||
S.N |
2013
IEEE DOT TITLES |
Domain |
Year |
|||||
|
|
|
|
|||||
1 |
A Data
Fusion Technique for Wireless Ranging Performance Improvement |
Intrumentaion And Measurement |
2013 |
|||||
2 |
A Fast
Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data |
Knowledge
And Data Engineering |
2013 |
|||||
3 |
A System to Filter Unwanted Messages from OSN User Walls |
Knowledge
And Data Engineering |
2013 |
|||||
4 |
AML Efficient Approximate Membership Localization within a
Web-Based Join Framework |
Knowledge
And Data Engineering |
2013 |
|||||
5 |
Binary Tree Slotted
ALOHA for Passive RFID Tag Anticollision |
Parallel
and Distributed systems |
2013 |
|||||
6 |
Capacity of Hybrid Wireless Mesh Networks with Random APs |
Mobile
Computing |
2013 |
|||||
7 |
Channel Assignment for Throughput Optimization in Multichannel
Multiradio Wireless Mesh Networks Using Network Coding |
Mobile
Computing |
2013 |
|||||
8 |
Delay-Optimal Broadcast
for Multihop Wireless Networks Using Self-Interference Cancellation |
Mobile
Computing |
2013 |
|||||
9 |
Detection and Localization of Multiple Spoofing Attackers in
Wireless Networks |
Parallel
and Distributed systems |
2013 |
|||||
10 |
Distributed Processing of Probabilistic Top-k Queries in
Wireless Sensor Networks |
Knowledge
and data Engineering |
2013 |
|||||
11 |
EAACK—A Secure Intrusion-Detection System for MANETs |
Industrial
Electronics, |
2013 |
|||||
12 |
EMAP Expedite Message Authentication Protocol for Vehicular Ad
Hoc Networks |
Mobile
computing |
2013 |
|||||
13 |
Evaluating Data Reliability An Evidential Answer with
Application to a Web-Enabled Data Warehouse |
Knowledge
and data Engineering |
2013 |
|||||
14 |
Evaluating Temporal Robustness of Mobile
Networks |
Mobile
computing |
2013 |
|||||
15 |
Harvesting-Aware Energy Management for
Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation
Scaling |
Industrial
Informatics |
2013 |
|||||
|
|
|
|
|||||
16 |
High Performance Resource Allocation Strategies for Computational
Economies |
Parallel
and Distributed systems |
2013 |
|||||
17 |
Importance of Coherence Protocols with Network Applications on
Multicore Processors |
Network |
2013 |
|||||
18 |
Localization-Based Radio Model Calibration for Fault-Tolerant Wireless
Mesh Networks |
Industrial
Informatics |
2013 |
|||||
19 |
Mobile Relay Configuration in Data-Intensive Wireless Sensor
Networks |
Mobile
Computing |
2013 |
|||||
20 |
Model-Based Analysis of Wireless System Architectures for Real-Time
Applications |
Mobile
Computing |
2013 |
|||||
21 |
Modeling and Optimizing
the Performance- Security Tradeoff on D-NCS Using the Coevolutionary Paradigm |
Mobile
Computing |
2013 |
|||||
22 |
Network Traffic Classification Using Correlation Information |
Network |
2013 |
|||||
23 |
Optimal Content Downloading in Vehicular Networks |
Vehicular
Networks |
2013 |
|||||
24 |
PMSE A Personalized Mobile Search Engine |
Knowledge
And Data Engineering |
2013 |
|||||
25 |
Ranking on Data
Manifold with Sink Points |
Knowledge
And Data Engineering |
2013 |
|||||
26 |
Scalable and Secure Sharing of
Personal Health Records in Cloud Computing Using Attribute-Based Encryption |
Parallel
and Distributed systems |
2013 |
|||||
27 |
Security Analysis of a Single Sign-On
Mechanism for Distributed Computer Networks |
Network
security |
2013 |
|||||
28 |
SSD A Robust RF Location Fingerprint
Addressing Mobile Devices’ Heterogeneity |
Mobile
Computing |
2013 |
|||||
29 |
Target Tracking and Mobile Sensor
Navigation in Wireless Sensor Networks |
Mobile
Computing |
2013 |
|||||
30 |
The Generalization Ability of Online
Algorithms for Dependent Data |
|
2013 |
|||||
|
|
|
|
|||||
|
IEEE
2012 DOT NET Project Titles |
Domain |
Year |
|||||
|
|
|
|
|||||
1 |
A Novel
Data Embedding Method Using Adaptive Pixel Pair Matching |
Network
security |
2012 |
|||||
2 |
A
Probabilistic Model of Visual Cryptography Scheme With Dynamic Group |
Network
security |
2012 |
|||||
3 |
Active
Visual Segmentation |
Image
processing |
2012 |
|||||
4 |
AMPLE An
Adaptive Traffic Engineering System Based on Virtual Routing Topologies |
WIRELESS
NETWORK |
|
|||||
5 |
An
Efficient Adaptive Deadlock-Free Routing Algorithm for Torus Networks |
Parallel
& distributed |
2012 |
|||||
6 |
Characterizing
the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels |
Network
security |
2012 |
|||||
7 |
Cooperative
download in vehicular environments |
Mobile
computing |
2012 |
|||||
8 |
Defenses
Against Large Scale Online Password Guessing Attacks by using Persuasive
click Points |
Image
processing |
2012 |
|||||
9 |
Design
and Implementation of TARF A Trust-Aware Routing Framework for WSNs |
Network
security |
2012 |
|||||
10 |
Discovering
Characterizations of the Behavior of Anomalous Sub-populations |
Data
mining |
2012 |
|||||
11 |
Efficient
Audit Service Outsourcing for Data Integrity in Clouds |
Cloud
computing |
2012 |
|||||
12 |
Ensuring
Distributed Accountability for Data Sharing in the Cloud |
Cloud
computing |
2012 |
|||||
13 |
Load
Balancing Multipath Switching System with Flow Slice |
|
2012 |
|||||
14 |
Network
Assisted Mobile Computing with Optimal Uplink Query Processing |
Mobile
computing |
2012 |
|||||
15 |
Outsourced
Similarity Search on Metric Data Assets |
Webmining |
2012 |
|||||
16 |
Privacy-
and Integrity-Preserving Range Queries in Sensor Networks |
Webmining |
2012 |
|||||
17 |
Query Planning
for Continuous Aggregation Queries over a Network of Data Aggregators |
Data
mining |
2012 |
|||||
18 |
Risk-Aware
Mitigation for MANET Routing Attacks |
Network
security |
2012 |
|||||
19 |
Scalable
and Secure Sharing of Personal Health Records in Cloud Computing using
Attribute-based Encryption |
Parallel
& distributed |
2012 |
|||||
20 |
Semi
supervised Biased Maximum Margin Analysis for Interactive Image Retrieval |
Image
processing |
2012 |
|||||
21 |
SPOC A
Secure and Privacy preserving Opportunistic Computing Framework for Mobile
Healthcare Emergency |
Parallel
& distributed |
2012 |
|||||
22 |
The
Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks |
Parallel
& distributed |
2012 |
|||||
23 |
Topology
Control in Mobile Ad Hoc Networks with Cooperative Communications |
Mobile
computing |
2012 |
|||||
24 |
View-invariant
action recognition based on Artificial Neural Networks |
Network |
2012 |
|||||
25 |
Distributed
Throughput Maximization in Wireless Networks via Random Power Allocation |
Network |
2012 |
|||||
26 |
Automatic
Reconfiguration for Large-Scale Reliable Storage Systems |
Network |
2012 |
|||||
27 |
A New
Cell Counting Based Attack Against To |
Network |
2012 |
|||||
28 |
Segmentation
and Sampling of Moving Object Trajectories Based on Representativeness |
Data
mining |
2012 |
|||||
29 |
A Fusion Approach
for Efficient Human Skin Detection |
Image
processing |
2012 |
|||||
30 |
PDE-Based
Enhancement of Color Images in RGB Space |
Image
processing |
2012 |
|||||
31 |
Contrast-Independent
Curvilinear Structure Detection in Biomedical Images |
Image
processing |
2012 |
|||||
32 |
A Unified
Spectral-Domain Approach for Saliency Detection and Its Application to
Automatic Object Segmentation |
Image
processing |
2012 |
|||||
33 |
Fast
Matrix Embedding by Matrix Extending |
Network
Security |
2012 |
|||||
34 |
Adaptive
Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images |
Image
processing |
2012 |
|||||
35 |
SenseLess:
A Database-Driven White Spaces Network |
Mobile
Computing |
2012 |
|||||
36 |
Local Tetra
Patterns A New Feature Descriptor for Content-Based Image Retrieval |
Image
processing |
2012 |
|||||
37 |
Low
Distortion Transform for Reversible Watermarking |
Image
processing |
2012 |
|||||
38 |
Throughput
and Energy Efficiency in Wireless Ad Hoc Networks With Gaussian Channels |
Network |
2012 |
|||||
39 |
A Secure
Intrusion detection system against DDOS attack in Wireless Mobile Adhoc |
Wireless
Network |
2012 |
|||||
|
|
|
|
|||||
S.N |
IEEE 2011 DOT NET Project Titles |
Domain |
Year |
|||||
|
|
|
|
|||||
1. |
A Personalized
Ontology Model For Web Information Gathering |
Data Mining |
2011 |
|||||
2. |
Adaptive Provisioning Of Human Expertise In Service-Oriented
Systems |
Data Mining |
2011 |
|||||
3. |
Bridging Socially-Enhanced Virtual
Communities |
Networking |
2011 |
|||||
4. |
Data
Integrity Proofs In Cloud Storage |
Cloud Computing |
2011 |
|||||
5. |
Efficient Computation Of
Range Aggregates Against Uncertain Location Based Queries |
Data Mining |
2011 |
|||||
6. |
Exploiting Dynamic
Resource Allocation For Efficient Parallel Data Processing In The Cloud |
Data mining |
2011 |
|||||
7. |
Exploring Application-Level
Semantics For Data Compression |
Data mining |
2011 |
|||||
8. |
Optimal Service
Pricing For A Cloud Cache |
Data Mining |
2011 |
|||||
9. |
Publishing Search Logs
– A Comparative Study Of Privacy Guarantees |
Data Mining |
2011 |
|||||
10. |
The Awareness Network,
To Whom Should I Display My Actions And, Whose Actions |
Data Mining |
2011 |
|||||
11. |
Improving Aggregate
Recommendation Diversity Using Ranking-Based Techniques |
Data mining |
2011 |
|||||
12. |
Monitoring Service
Systems From A Language-Action Perspective |
Service Computing |
2011 |
|||||
13. |
One Size Does Not Fit
All: Towards User- And Query-Dependent Ranking For Web Databases |
Data mining |
2011 |
|||||
14. |
The World In A Nutshell:
Concise Range Queries |
Data mining |
2011 |
|||||
15. |
A User-oriented Image
Retrieval System Based on Interactive Genetic Algorithm |
Image Processing |
2011 |
|||||
16. |
A More Secure
Steganography Method in Spatial Domain |
Security |
2011 |
|||||
17. |
Scalable Learning of
Collective Behavior |
Data Mining |
2011 |
|||||
18. |
Scalable Scheduling of
Updates in Streaming Data Warehouse |
Data Engineering |
2011 |
|||||
|
|
|
2011 |
|||||
19. |
Adaptive Fault Tolerant
QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless
Sensor Networks |
Secure Computing |
2011 |
|||||
20. |
Efficient
Multi-dimensional Fuzzy Search for Personal Information Management Systems |
Data Mining |
2011 |
|||||
21. |
Integration Of Sound Signature In Graphical Password
Authentication System |
Data Mining |
2011 |
|||||
22. |
A Fast Multiple
Longest Common Subsequence |
Data Mining |
2011 |
|||||
23. |
Combinin HAAR Feature
and skin color based classifiers for face |
Secure Computing |
2011 |
|||||
24. |
The Geometric
Efficient Matching Algorithm for Firewalls |
Network Security |
2011 |
|||||
25. |
Continuous Neighbor
Discovery in Asynchronous Sensor Networks. |
Network |
2011 |
|||||
26. |
Delay Analysis and
Optimality of Scheduling Policies for Multi-Hop Wireless Networks |
Network |
2011 |
|||||
27. |
Improving the
Performance of Wireless Ad Hoc Networks Through MAC Layer Design - java |
Network |
2011 |
|||||
28. |
Throughput
Optimization in High Speed Downlink Packet Access |
Network |
2011 |
|||||
29. |
A Web Search Engine
Based Approach to Measure Semantic Similarity Between Words |
Data Mining |
2011 |
|||||
30. |
Robust Correlation of
Encrypted Attack Traffic Through Stepping Stones by Flow Watermarking |
Network |
2011 |
|||||
31. |
Problems and Solutions
of Web Search Engines |
Web Mining |
2011 |
|||||
32. |
Distributed Adaptation
of Quantized Feedback for Downlink Network MIMO Systems |
Network |
2011 |
|||||
33. |
Jamming-Aware
Traffic Allocation for Multiple-Path Routing Using Portfolio Selection |
Network |
2011 |
|||||
|
|
|
2011 |
|||||
S.N. |
IEEE 2010 .Net Project
Titles |
Domain |
Lang/Year |
|||||
1. |
Toward
Optimal Network Fault Correction in Externally Managed Overlay Networks |
Parallel & Distributed |
2010 |
|||||
2. |
Slow Adaptive
OFDMA Systems Through Chance Constrained Programming |
Network |
2010 |
|||||
3. |
Secure
Client-Side ST-DM Watermark Embedding |
Network
Security |
2010 |
|||||
4. |
Multicast
Multi-path Power Efficient Routing in Mobile ADHOC Networks |
Network
Security |
2010 |
|||||
5. |
Anonymous
Query Processing in Road Networks |
Data
Engineering |
2010 |
|||||
6. |
VEBEK:
Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks |
Mobile
Computing |
2010 |
|||||
7. |
On Wireless
Scheduling Algorithms for Minimizing the Queue-Overflow Probability |
Network |
2010 |
|||||
8. |
Privacy
Preserving public Auditing Data for data storage security in Cloud computing |
Cloud
Computing |
2010 |
|||||
9. |
Deriving Concept – Based
User Profiles from search Engine Logs |
Data
Mining |
2010 |
|||||
10. |
Cross-Layer Design in
Multihop Wireless Networks |
Network |
2010 |
|||||
11. |
S4 Small and Small
Stretch Compact Routing Protocol for Large Static Wireless Networks |
Mobile
Computing |
2010 |
|||||
12. |
Maximizing Rewards in
Wireless Networks with Energy |
Network |
2010 |
|||||
13. |
Secure Distance –
Based Localization in the presence of cheating Beacon Node |
Network |
2010 |
|||||
14. |
A Distributed
CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks |
Network |
2010 |
|||||
15. |
Fast Algorithms for
Resource Allocation in Cellular Networks |
Network |
2010 |
|||||
16. |
Inference
From Aging Information |
Neural
Network |
2010 |
|||||
17. |
Collaborative Sensing to Improve Information Quality for
Target Tracking in Wireless Sensor Networks |
Network |
2010 |
|||||
18. |
Fuzzy Keyword Search
over Encrypted Data in Cloud Computing |
Cloud
Computing |
2010 |
|||||
19. |
Localized Multicast
Efficient And Distributed Replica Detection In Large-Scale Sensor Networks |
Wireless
Network |
2010 |
|||||
20. |
Collaborative Sensing
to Improve Information Quality for Target Tracking in Wireless Sensor
Networks |
Wireless
Network |
2010 |
|||||
21. |
Edge Adaptive Image
Steganography Based on LSB Matching |
Secure
Computing |
2010 |
|||||
S.N. |
IEEE 2009 .Net Project Titles |
Domain |
Year |
|||||
1. |
A Tabu Searching
Algorithm For Cluster Building in Wireless Sensor Networks |
Mobile Computing |
2009/.Net |
|||||
2. |
Analysis
of Shortest Path Routing for Large Multi-Hop Wireless Networks |
Mobile Computing |
2009/.Net |
|||||
3. |
Biased Random
Walks in Uniform Wireless Networks |
Network Computing |
2009/.Net |
|||||
4. |
Cell
Breathing Techniques for Load Balancing in Wireless LANs |
Mobile Computing |
2009/.Net |
|||||
5. |
Compaction
of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling |
Mobile Computing |
2009/.Net |
|||||
6. |
Delay
Analysis for Maximal Scheduling With Flow Control in Wireless Networks With
Bursty Traffic |
Distribute Computing |
2009/.Net |
|||||
7. |
Energy
Maps For Mobile Wireless Networks Coherence Time versus Spreading Period |
Network Computing |
2009/.Net |
|||||
8. |
Enforcing
Minimum-Cost Multicast Routing against Shelfish Information Flows |
Mobile Computing |
2009/.Net |
|||||
9. |
Explicit
Load Balancing Technique for NGEO Satellite Ip Networks With On-Board
Processing Capabilities |
Distribute Computing |
2009/.Net |
|||||
10. |
Greedy
Routing with Anti-Void Traversal for Wirless Sensor Networks |
Network Computing |
2009/.Net |
|||||
11. |
Information
Content-Based Sensor Selection and Transmission Power Adjustment for
Collaborative Target Tracking |
Mobile Computing |
2009/.Net |
|||||
12. |
Local
Construction of Near-Optimal Power Spanners for Wireless Ad Hoc Networks |
Mobile Computing |
2009/.Net |
|||||
13. |
Movement-Assisted
Connectivity Restoration in Wireless Sensor and |
Mobile Computing |
2009/.Net |
|||||
14. |
On the
Planning of Wireless Sensor Networks Energy-Efficient Clustering under the
Joint Rout |
Distribute Computing |
2009/.Net |
|||||
15. |
Performance
of Orthogonal Fingerprinting Codes under Worst-Case Noise |
Mobile Computing |
2009/.Net |
|||||
16. |
PRESTO
Feedback-Driven Data Management in Sensor Networks |
Secure Computing |
2009/.Net |
|||||
17. |
Random
Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks |
Network Computing |
2009/.Net |
|||||
18. |
Resequencing
Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications |
Mobile Computing |
2009/.Net |
|||||
19. |
Resource
Allocation in OFDMA Wireless Communications Systems Supporting Multimedia
Services |
Network Computing |
2009/.Net |
|||||
20. |
Route
Stability in MANETs under the Random Direction Mobility Model |
Network Computing |
2009/.Net |
|||||
21. |
Secure
and Policy-Complaint Source Routing |
Mobile Computing |
2009/.Net |
|||||
22. |
Single-Link
Failure Detection in All-Optical Networks Using |
Network Computing |
2009/.Net |
|||||
23. |
Spread-Spectrum
Watermarking Security |
Network Computing |
2009/.Net |
|||||
24. |
The
Effectiveness of Checksums for Embedded Control Networks |
Secure Computing |
2009/.Net |
|||||
25. |
Two
Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for
RFID Tag Identification |
Secure Computing |
2009/.Net |
|||||
26. |
Virus
Spread in Networks |
Network Computing |
2009/.Net |
|||||
27. |
Capturing
Router Congestion and Delay |
Network Computing |
2009/.Net |
|||||
28. |
A Distributed Stream Query Optimization
Framework through Integrated Planning and Deployment |
Secure Computing |
2009/.Net |
|||||
S.N. |
IEEE 2008 .Net Project Titles |
Domain |
Lang/Year |
|||||
1. |
Estimation
of Defects Based On Defect Decay Model ED3M |
Software Engineering |
2008/.Net |
|||||
2. |
HBA
Distributed Metadata Management for Large Cluster-Based Storage Systems |
Distribute Computing |
2008/.Net |
|||||
3. |
Rate
Allocation & Network Lifetime Problem for Wireless Sensor Networks |
Network Computing |
2008/.Net |
|||||
4. |
Dual-Link
Failure Resiliency through Backup Link Mutual Exclusion |
Network Computing |
2008/Java |
|||||
5. |
Orthogonal
Data Embedding for Binary Images in Morphological Transform Domain-A
High-Capacity Approach |
Multimedia Computing |
2008/.Net |
|||||
6. |
Trustworthy
Computing Under Resource Constraints With The Down Policy |
Secure Computing |
2008/.Net |
|||||
7. |
Localized
Sensor Area Coverage With Low Communication Overhead |
Mobile Computing |
2008/.Net |
|||||
8. |
Active
Learning Methods for Interactive Image Retrieval |
Image Processing |
2008/.Net |
|||||
9. |
Vision Based
Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light |
Image Processing |
2008/.Net |
|||||
10. |
Hardware
enhanced association rule mining with Hashing and Pipelining |
Data Mining |
2008/.Net |
|||||
11. |
Efficient
Resource Allocation For Wireless Multicast |
Mobile Computing |
2008/.Net |
|||||
12. |
A Novel
Framework for Semantic Annotation and Personalized Retrieval of Sports Video |
Multimedia |
2008/.Net |
|||||
13. |
A Distributed
And Scalable Routing Table Manager For The Next Generation Of IP Routers |
Network |
2008/.Net |
|||||
14. |
A New
Model For Dissemination Of XML Content |
Secure Computing |
2008/.Net |
|||||
15. |
Efficient
2-D Grayscale Morphological Transformations With Arbitraly Flat Structuring
Elements |
Image Processing |
2008/.Net |
|||||
16. |
Efficient
Routing In Intermittently Connected Mobile Networks The Multiple Copy Case |
Networking |
2008/.Net |
|||||
17. |
Watermarking
Relational Databases Using Optimization Based Techniques |
Data Mining |
2008/.Net |
|||||
18. |
Fuzzy
Control Model Optimization for Behavior-Constant Traffic Routing Under
Information Provision |
Transportation System |
2008/.Net |
|||||
19. |
Temporal
Partioning of Communication Resources in an Integrated Architecture |
Secure Computing |
2008/.Net |
|||||
20. |
Probabilistic
Packet Marking For Large Scale IP Trace Back |
Network Computing |
2008/.Net |
|||||
21. |
Credit Card
Fraud Detection Using Hidden Markov Models |
Secure Computing |
2008/.Net |
|||||
22. |
Image Processing Techniques for the Detection and Removal of
Cracks in Digitized Paintings
|
Image Processing |
. Net/2006 |
|||||
23. |
Neural Networks for Unicode Optical
Character Recognition |
Image Processing |
. Net/2004 |
|||||
24. |
Efficient Broadcasting with Guaranteed
Coverage in Mobile Ad Hoc Networks |
Network Computing
|
. Net/2005
|
|||||
25. |
Workflow Mining Discovering Process Models from
Event Logs |
Data Mining |
.Net/2004 |
|||||