Tuesday, June 17, 2014

IEEE 2013-14 DOTNET PROJECTS FOR BE/BTECH/ME/MTECH

IEEE DOTNET 2013-14 PROJECT LIST

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1. Secure Mining of Association Rules in Horizontally Distributed Databases
2. Robust Module-Based Data Management 
3. Supporting Search-As-You-Type Using SQL in Databases
4. FoCUS: Learning to Crawl Web Forums
5. M-Privacy for Collaborative Data Publishing
6. Optimal Route Queries with Arbitrary Order Constraints
7. Finding Rare Classes: Active Learning with Generative and Discriminative Models
8. K-Anonymity for Crowd sourcing Database
9. ELCA Evaluation for Keyword Search on Probabilistic XML Data
10. Edge-centric clustering scheme to extract sparse social dimensions
11. Bi-clustering for analyze network traffic and enhance IDSs

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
12. Efficient Two-Server Password-Only Authenticated Key Exchange
13. Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
14. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
15. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
16. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

IEEE TRANSACTIONS ON CLOUD COMPUTING
17. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
18. Privacy Preserving Policy Based Content Sharing in Public Clouds
19. Privacy-preserving public auditing For secure cloud storage
20. A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
21. Privacy Preserving Delegated Access Control in Public Clouds
22. Enhanced Data Security in Cloud Computing with Third Party Auditor
23. Towards Secure and Dependable Storage Services in Cloud Computing
24. Ensuring Data Storage Security in Cloud Computing
25. A Secure Cloud Storage System with Secure Data Forwarding

IEEE TRANSACTIONS ON IMAGE PROCESSING
26. Visual-Textual Joint Relevance Learning for Tag-Based Social Image Search
27. Vertical-Edge-Based Car-License-Plate Detection Method
28. FLICM-A Robust Fuzzy C-Means Clustering Algorithm
29. Simultaneous Facial Expression Recognition

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
30.  Privacy Preserving Data Sharing With Anonymous ID Assignment
31. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
32. A Dynamic Appearance Descriptor Approach to Facial Actions Temporal Modeling 
33. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring 
34. Latent Fingerprint Matching Using Descriptor-Based Hough Transform 
35. Extracting Spread-Spectrum Hidden Data from Digital Media

 IEEE TRANSACTIONS ON MOBILE COMPUTING
36. Video On-Demand Streaming in Cognitive Wireless Mesh Networks
37. Energy-Spectrum Efficiency Tradeoff for Video Streaming over Mobile Ad Hoc Networks
38. A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
39. A Privacy-Preserving Attribute-based Authentication System for Mobile Health Networks
40. Efficient Position-based Opportunistic Routing protocol for MANET
41. Improved Channel Aware AOMDV routing Protocol in MANETs

IEEE TRANSACTIONS ON MULTIMEDIA
42. An Adaptive Cloud Downloading Service
43. User-specific topic modeling to map the query relevance and user preference for Image Retrieval
44. A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
45. Scalable Face Image Retrieval Using Attribute-Enhanced Sparse Code words
46. One-to-Many Streaming Splicing(OMSS) for improving relay paths
47. Capturing User Intention for One-Click Internet Image Search

IEEE TRANSACTIONS ON NETWORKING
48. Localization of Wireless Sensor Networks in the Wild Networks
49. Fair data collection scheme in wireless sensor networks
50. An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
51. A System to Filter Unwanted Messages from OSN User Walls
52. Two tales of privacy in online social networks
53. Twits per: Tweeting Privately
54. Secure Data Collection in Wireless Sensor Networks
55. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
56. A New Clustering Algorithm for Wireless Sensor Networks
57. Management of security in quantum cryptography

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
58. Defenses to curb online password guessing attacks
59. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
60. Enhanced Data Security for Data sharing with C-JAR
61. Automatic License Plate Recognition
62. Anomaly Detection via online transaction of credit card by clustering technique
63. Blocking Hacking Users in Anonymizing Network

IEEE TRANSACTIONS ON SERVICE COMPUTING
64. Evolution of Social Networks Based on Tagging Practices
65. Dynamic Audit Services for Outsourced Storages in Clouds
66. Expert Discovery and Interactions in Mixed Service-Oriented Systems
67. Towards Efficient Search for Activity Trajectories
68. Secure Stream Authentication using Hash function

IEEE TRANSACTIONS ON DISTRIBUTED NETWORKING
69. Self-healing System to increase  resiliency against botnets with minimal disruption to network services
70. An Efficient Peer-to-Peer Semantic Overlay Network for Learning Query Routing 


No comments:

Post a Comment