Thursday, September 4, 2014

IEEE 2014-15 DOT NET PROJECTS FOR BE/BTECH/ME/MTECH/MCA STUDENTS

IEEE 2014-15 DOTNET PROJECT LIST

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING

1.       Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data

2.       Fast Nearest Neighbor Search with Keywords
3.       Quasi-SLCA Based Keyword Query Processing over Probabilistic XML Data
4.       Secure Mining of Association Rules in Horizontally Distributed Databases

5.       Supporting Privacy Protection in Personalized Web Search

6.       The Role of Hubness in Clustering High-Dimensional Data
7.       Authentication of k nearest Neighbor  Query on Road Networks
8.       Privacy-Preserving and Content-Protecting Location Based Queries

9.       Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases

10.   Context-based Diversification for Keyword Queries over XML Data

11.   Efficient Prediction of Difficult Keyword Queries over Databases

12.   Using Personalization to Improve XML Retrieval

13.   Range Aggregation with Set Selection

14.  Secure and Privacy Messaging in Online Social Networks
15.  A Methodology for Direct and Indirect Discrimination Prevention in Data Mining

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
16.   Trajectory Improves Data Delivery in Urban Vehicular Networks
17.   Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
18.   PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System
19.   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
20.   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
21.   Peer-Assisted VoD Systems: An Efficient Modeling Framework
22.   Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
23.   Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
24.   ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks
25.   A Hybrid Cloud Approach for Secure Authorized De duplication
26.   Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

IEEE TRANSACTIONS ON CLOUD COMPUTING
27.   Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
28.   Consistency as a Service: Auditing Cloud Consistency
29.   Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
30.   Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
31.   Identity-Based Secure Distributed Data Storage Schemes
32.   Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud

IEEE TRANSACTIONS ON IMAGE PROCESSING

33.   A Dynamic Appearance Descriptor Approach to Facial Actions Temporal Modeling

34.   Localization of License Plate Number Using Dynamic Image Processing Techniques

35.   A New Iterative Triclass Thresholding Technique in Image Segmentation

36.   Click Prediction for Web Image Reranking Using Multimodal Sparse Coding

37.   Robust Face Recognition with Structurally Incoherent Low-Rank Matrix Decomposition

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

38.   Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact

39.   Uniform Embedding for Efficient JPEG Steganography

40.   Data Hiding in Encrypted H.264/AVC Video Streams by Codeword Substitution

41.   On the Relation of Random Grid and Deterministic Visual Cryptography

42.   Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation

43.   Scalable Similarity Search with Topology Preserving Hashing

IEEE TRANSACTIONS ON MOBILE COMPUTING

44.   Autonomous Mobile Mesh Networks

45.   Opportunistic Channel Sharing in Cognitive Radio Networks
46.   Optimal Multicast Capacity and Delay Tradeoffs in MANETs
47.   Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks
48.   Friendbook: A Semantic-based Friend Recommendation System for Social Networks
49.   Class-Based Shared Resource Allocation for Cell-Edge Users in OFDMA Networks
50.   A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
51.   Secure Mobile Payment System using GSM

IEEE TRANSACTIONS ON MULTIMEDIA
52.   An adaptive mechanism for optimal content download in wireless networks
53.   Reversible Data Hiding in Encrypted JPEG Bit stream
54.   Inferring User Image-Search Goals under the Implicit Guidance of Users
55.   Exploiting Click Constraints and Multi-view Features for Image Re-ranking
56.   Prototype-Based Modeling for Facial Expression Analysis
IEEE TRANSACTIONS ON SERVICE COMPUTING
57.   Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
58.   Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
59.   Full Security of Quantum Key Distribution From No-Signaling Constraints

IEEE TRANSACTIONS ON NETWORKING
60.   An Adaptive Video Streaming Control System: Modeling, Validation, and Performance Evaluation

61.   Incentive Based Data Sharing in Delay Tolerant Mobile Networks

62.   Iterative Localization of Wireless Sensor Networks: An Accurate and Robust Approach

63.   Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

64.   Secure Continuous Aggregation in Wireless Sensor Networks
65.   A Trust-Aware System for Personalized User Recommendations in Social Networks
66.   Resource Allocation in MIMO-OFDM Based Cooperative Cognitive Radio Networks
67.   An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
68.   Filtering Of Malicious Traffic Based On Markov’s Chain Method
69.   Cooperative Communication Protocol Designs Based on Optimum Power and Time Allocation

IEEE TRANSACTIONS ON WEB MINING
70.   An Ontology-Based Text Mining Method to Develop D-Matrix from Unstructured Text

No comments:

Post a Comment