4
Dot Net IEEE PROJECT TITLES 2015-2016 LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue and Next to Fish-O-Fish), Pondicherry-605 005 Web : www.ieeemaster.com / www.lemenizinfotech.com Mail : [email protected] / [email protected] Phone : 9566355386 / 9962588976 S.No Title Domain 1 Privacy-Preserving Public Auditing for Regenerating-Code- Based Cloud Storage Cloud Computing 2 Searchable Aspect-Based Method with Resourceful Information Sharing for Protected Cloud Storage Cloud Computing 3 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing Cloud Computing 4 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation Cloud Computing 5 Enabling Efficient Multi-Keyword Ranked Search over Encrypted Mobile Cloud Data through Blind Storage Cloud Computing 6 Enabling Client-Offered Resources for Cloud Computing: Prospective, Challenges, and Completion Cloud Computing 7 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem Cloud Computing 8 Combining Efficiency, Fidelity, and Flexibility in Resource Information Services Cloud Computing 9 Tweet Segmentation and Its Application to Named Entity Recognition. Data Mining 10 Keyword Extraction and Clustering for Document Recommendation in Conversations Data Mining 11 EMR: A Scalable Graph-based Ranking Model for Content- based Image Retrieval . Data Mining 12 Automatic Group Happiness Intensity Analysis. Data Mining 13 RRW – A Robust and Reversible Watermarking Technique for Relational Data Data Mining 14 A Survey on deducing customer explore Goals using Feedback Session Data Mining 15 Query Aware Determinization of Uncertain Objects . Data Mining

Dot net-ieee-project-titles-2015-2016 | 2015 dot net ieee projects

Embed Size (px)

Citation preview

Page 1: Dot net-ieee-project-titles-2015-2016 | 2015 dot net ieee projects

Dot Net IEEE PROJECT TITLES – 2015-2016

LeMeniz Infotech

36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue and Next to Fish-O-Fish),

Pondicherry-605 005

Web : www.ieeemaster.com / www.lemenizinfotech.com

Mail : [email protected] / [email protected]

Phone : 9566355386 / 9962588976

S.No Title Domain

1 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

Cloud Computing

2 Searchable Aspect-Based Method with Resourceful Information Sharing for Protected Cloud Storage

Cloud Computing

3 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing

Cloud Computing

4 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation

Cloud Computing

5 Enabling Efficient Multi-Keyword Ranked Search over Encrypted Mobile Cloud Data through Blind Storage

Cloud Computing

6 Enabling Client-Offered Resources for Cloud Computing: Prospective, Challenges, and Completion

Cloud Computing

7 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem

Cloud Computing

8 Combining Efficiency, Fidelity, and Flexibility in Resource Information Services

Cloud Computing

9 Tweet Segmentation and Its Application to Named Entity Recognition.

Data Mining

10 Keyword Extraction and Clustering for Document Recommendation in Conversations

Data Mining

11 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval .

Data Mining

12 Automatic Group Happiness Intensity Analysis. Data Mining

13 RRW – A Robust and Reversible Watermarking Technique for Relational Data

Data Mining

14 A Survey on deducing customer explore Goals using Feedback Session

Data Mining

15 Query Aware Determinization of Uncertain Objects . Data Mining

Page 2: Dot net-ieee-project-titles-2015-2016 | 2015 dot net ieee projects

16 Eminence of service routing for multipath MANETS Distributed Networking

17 Presentation Estimation of Wireless Body Sensors in the occurrence of Slow and Quick Evaporation Effects

Distributed Networking

18 Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis.

Image Processing

19 License Plate Recognition Using Artificial Neural Network and Wavelet Distorted Characteristic Selection.

Image Processing

20 Routine Facial Appearance Identification Using Features of Relevant Facial Patches

Image Processing

21 Saliency-based color accessibility Image Processing

22 Image Toning by Eigen pattern method for multi-class categorization.

Image Processing

23 Saliency-based color accessibility. Image Processing

24 Contextual Online Learning for Multimedia Content Aggregation.

Image Processing

25 Neighbor Discovery in Wireless Networks with Quick text line recognition by judgment linear connected components

on Canny edge image.

Image Processing

26 A Probabilistic Approach for Color Correction in Image Mosaicking Applications.

Image Processing

27 An enhanced border recognition using morphological Laplacian of Gaussian operator.

Image Processing

28 A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images.

Image Processing

29 A Strong Watermarking system for 3D Representations Based on Encrypted Holographic Algorithm

Information Security

30 Fusion Cryptosystem for Preserving Image Reliability using Biometric Fingerprint

Information Security

31 A Realistic IP Trace back Structure through Active Deterministic Packet Marking

Information Security

32 Higher LSB Optimize Data Hiding Mechanism on Encrypted Image

Information Security

33 An Efficient Framework for Generating Storyline Visualizations from Streaming Data

Knowledge & Data Engineering

34 Risk Aware Query Replacement Approach for Secure Databases Performance Management

Knowledge & Data Engineering

35 Decreasing explore gap for Web Service ranking using semantic records and Semantic FP-Tree based association

rule mining

Knowledge & Data Engineering

36 A Similarity-Based Learning Algorithm Using Distance Transformation

Knowledge & Data Engineering

37 An Comprehensive Approach for Safe the Small Messaging Mobile Computing

Page 3: Dot net-ieee-project-titles-2015-2016 | 2015 dot net ieee projects

Services of GSM using Multi-threading Oblique Arc Cryptography

38 Optimum Power Allocation in Sensor Networks for Active Radar Applications .

Mobile Computing

39 Capacity-Based Analysis and Assessment of Presentation of Mobile Phones Base Stations Antenna

Mobile Computing

40 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks .

Mobile Computing

41 Congestion Aware Load Balancing for Multiradio Wireless Mesh Network.

Networks

42 An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System.

Networks

43 EAACK- A Safe Interruption Recognition and Avoidance System for MANETs

Networks

44 On Local Prediction Based Reversible Watermarking. Networks

45 Exploiting P2P File Access Availability in Mobile Ad hoc Networks Though Duplication for Resourceful File

Distribution

Networks

46 Execution of Narrative Approach for Credit Card Fraud Detection.

Networks

47 Sputter transfer for three-stage power basis converter in distribution network.

Networks

48 On Local Prediction Based Reversible Watermarking Network Security

49 Execution of Narrative Approach for Credit Card Fraud Detection

Network Security

50 Sputter transfer for three-stage power basis converter in distribution network

Network Security

51 Observable Representation of Wireless Sensor Nodules Using Meta-data

Secure Transmission

52 A Procedure for End-to-End Key Organization During Route Detection in MANETs

Secure Transmission

53 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds

Parallel and Distributed Systems with Secure

Computing

54 Dominating Set and Network Coding-based Routing in Wireless Mesh Networks.

Parallel and Distributed Systems with Secure

Computing

55 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud.

Parallel and Distributed Systems with Secure

Computing

56 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

Parallel and Distributed Systems with Secure

Page 4: Dot net-ieee-project-titles-2015-2016 | 2015 dot net ieee projects

Computing

57 Authenticated Key Exchange Protocols for Parallel Network File Systems.

Parallel and Distributed Systems with Secure

Computing

58 Data Collection in Multi-Application Sharing Wireless Sensor Networks.

Parallel and Distributed Systems with Secure

Computing

59 Enabling Fine-grained Multi-keyword Search Supporting Classfied Sub-dictionaries over Encrypted Cloud Data.

Parallel and Distributed Systems with Secure

Computing