Follow us on Facebook

Header Ads

Dotnet IEEE Projects 2015

2015-2016 IEEE DOT NET PROJECT TITLES:

2015 -16 IEEE CLOUD COMPUTING PROJECT TITLES

JPD1501 - A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

JPD1502 - Cloud-Based Multimedia Content Protection System

JPD1503 - Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

JPD1504 - Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds

JPD1505 - Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

JPD1506 - Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem

JPD1507 - Identity-Based Distributed Provable Data Possession in Multicloud Storage

JPD1508 - Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

JPD1509 - PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System

JPD1510 - SelCSP: A Framework to Facilitate Selection of Cloud Service Providers

2015 -16 IEEE DATA MINING PROJECT TITLES

JPD1511 - Discovery of Ranking Fraud for Mobile Apps

JPD1512 - PAGE: A Partition Aware Engine for Parallel Graph Computation

JPD1513 - Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

JPD1514 - Query Aware Determinization of Uncertain Objects

2015 -16 IEEE NETWORKING PROJECT TITLES

JPD1515 - Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

JPD1516 - Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis

JPD1517 - Universal Network Coding-Based Opportunistic Routing for Unicast

2015 -16 IEEE MOBILE COMPUTING PROJECT TITLES

JPD1518 - A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

JPD1519 - Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks

JPD1520 - Optimal Configuration of Network Coding in Ad Hoc Networks

JPD1521 -Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

2015 -16 IEEE PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES

JPD1522 -Authenticated Key Exchange Protocols for Parallel Network File Systems

 

2015 -16 IEEE SECURE COMPUTING PROJECT TITLES

JPD1523 -Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems

JPD1524 -Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

JPD1525 -Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

JPD1526 -Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System

 

2015 -16 IEEE IMAGE PROCESSING PROJECT TITLES

JPD1527 -An Attribute-Assisted Reranking Model for Web Image Search

JPD1528 -Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images

JPD1529 -Detection and Rectification of Distorted Fingerprints

JPD1530 -Eye Gaze Tracking With a Web Camera in a Desktop Environment

JPD1531 -Learning Fingerprint Reconstruction: From Minutiae to Image

JPD1532 -Multiview Alignment Hashing for Efficient Image Search

JPD1533 -Single Image Superresolution Based on Gradient Profile Sharpness

JPD1534 -Steganography Using Reversible Texture Synthesis

 

2015 -16 IEEE SERVICE COMPUTING PROJECT TITLES

JPD1535 - Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation

OTHER PROJECT TITLES

Finding Nonequivalent Classifiers in Boolean Space to Reduce TCAM Usage

SeDaSC: Secure Data Sharing in Clouds

Continuous and Transparent User Identity Verification for Secure Internet Services

Effective Key Management in Dynamic Wireless Sensor Networks

Real-Time Detection of Traffic From Twitter Stream Analysis

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

Tweet Segmentation and Its Application to Named Entity Recognition

Enhanced Three Tier Security Architecture for WSN against Mobile Sink Replication Attacks