Sie sind auf Seite 1von 5

IEEE 2015-2016 PROJECT TITLES

SL.NO 2015 – 2016 IEEE .NET PROJECT TITLES

1. A Computational Dynamic Trust Model for User Authorization

2. A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks

3. A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

4. A Hybrid Cloud Approach for Secure Authorized Deduplication

5. A Methodology for Extracting Standing Human Bodies From Single Images

6. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

7. An Attribute-Assisted Reranking Model for Web Image Search

8. Attribute Based Access Control With Based Access Control With Constant Size Cipher Text in Cloud
Computing

9. Audit-Free Cloud Storage Via Deniable Attribute-Based Encryption

10. Authenticated Key Exchange Protocols for Parallel Network File Systems

11. Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images

12. Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems

13. Best Keyword Cover Search

14. BRACER A Distributed Broadcast Protocol in Multi-Hop Cognitive Radio Ad Hoc Networks

15. Cloud-Based Multimedia Content Protection System

16. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment
Model

17. Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

18. Continuous and Transparent User Identity Verification for Secure Internet Services

19. Data Collection in Multi-Application Sharing Wireless Sensor Networks

20. Defeating Jamming With the Power of Silence

21. Detection and Rectification of Distorted Fingerprints


22. Discovery of Ranking Fraud for Mobile Apps

23. DROPS Division and Replication of Data in Cloud for Optimal Performance and Security

24. Effective Key Management in Dynamic Wireless Sensor Network

25. Efficient Top-k Retrieval on Massive Data

26. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval

27. Eye Gaze Tracking With a Web Camera in a Desktop Environment

28. Face Recognition Across NonUniform Motion Blur, Illumination, and Pose

29. Fiducial Facial Point Extraction Using a Novel Projective Invariant

30. Data-Driven Composition for Service-Oriented Situational Web Applications

31. GDCluster A General Decentralized Clustering Algorithm

32. Head Pose Estimation From a 2D Face Image Using 3D Face Morphing With Depth Parameters

33. Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

34. IncreSTS Towards Real-Time Incremental Short Text Summarization on Comment Streams from Social
Network Services

35. Integrated Foreground Segmentation and Boundary Matting for Live Videos

36. Lossless and Reversible Data Hiding in Encrypted Images with Public Key Cryptography

37. Malware Propagation in Large-Scale Networks

38. Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor
Networks

39. OPoR Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices

40. Optimal Configuration of Network Coding in AD Hoc Networks

41. Passive IP Traceback Disclosing the Locations of IP Spoofers from Path Backscatter

42. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

43. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

44. PSMPA Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in


Distributed m-Healthcare Cloud Computing System
45. Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System

46. Secure Distributed Deduplication Systems with Improved Reliability

47. Single Image Super-Resolution Based on Gradient Profile Sharpness

48. Steganography Using Reversible Texture Synthesis

49. Defeating Jamming With the Power of Silence A Game-Theoretic Analysis

50. TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

51. Universal Network Coding-Based Opportunistic Routing for Unicast

SL.NO 2015 – 2016 IEEE JAVA PROJECT TITLES

1. A Scalable and Reliable Matching Service for Content-Based Publish Subscribe Systems

2. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

3. Content-Based Image Retrieval Using Error Diffusion Block Truncation Coding Features

4. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid A
Feasibility Study

5. Distortion-Aware Concurrent Multipath Transfer for Mobile Video Streaming in Heterogeneous Wireless
Networks

6. Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind
Storage

7. Identity-Based Encryption with Outsourced Revocation in Cloud Computing

8. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File
Sharing

9. Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter

10. Privacy-Preserving Detection of Sensitive Data Exposure

11. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

12. Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks

13. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

14. Statistical Dissemination Control in Large Machine-to-Machine Communication Networks

15. A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
16. A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks

17. Anefficient Distributed Trust Model for Wireless Sensor Network

18. Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization

19. Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks

20. Optimal Configuration of Network Coding in Ad Hoc Networks

21. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks

22. Authenticated Key Exchange Protocols for Parallel Network File Systems

23. Effective Key Management in Dynamic Wireless Sensor Network

24. Malware Propagation in Large-Scale Networks

25. Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

26. An Attribute-Assisted Reranking Model for Web Image Search

27. EMR A Scalable Graph-based Ranking Model for Content-based Image Retrieval

28. Face Recognition Across NonUniform Motion Blur, Illumination, and Pose

29. Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System

30. Universal Network Coding-Based Opportunistic Routing for Unicast

31. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

32. Data Collection in Multi-Application Sharing Wireless Sensor Networks

33. Efficient Top-k Retrieval on Massive Data

34. A Hybrid Cloud Approach for Secure Authorized Deduplication

35. Secure Distributed Deduplication Systems with Improved Reliability

36. Audit-Free Cloud Storage via Deniable Attribute-based Encryption

37. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

38. DROPS Division and Replication of Data in Cloud for Optimal Performance and Security

39. Energy-aware Load Balancing and Application scaling for the Cloud Ecosystem

40. Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment
Model
41. Towards Effective Bug Triage with Software Data Reduction Techniques

42. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

43. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

44. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

45. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems

46. Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT

47. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

48. Receiver Cooperation in Topology Control for Wireless Ad-Hoc Networks

49. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

50. Security-Aware Relaying Scheme for Cooperative Networks With Untrusted Relay Nodes

51. Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

52. Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained
Traffics

…..connecting you to the power of IT

Das könnte Ihnen auch gefallen