Dot Net IEEE Projects 2015-2016 | Dot Net IEEE Projects Titles 2015 2016
-
Upload
lemenizinfotech -
Category
Documents
-
view
13 -
download
7
description
Transcript of Dot Net IEEE Projects 2015-2016 | Dot Net IEEE Projects Titles 2015 2016
Dot Net IEEE PROJECT TITLES – 2015-2016
LeMeniz Infotech
36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue and Next to Fish-O-Fish),
Pondicherry-605 005
Web : www.ieeemaster.com / www.lemenizinfotech.com
Mail : [email protected] / [email protected]
Phone : 9566355386 / 9962588976
S.No Title Domain
1 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Cloud Computing
2 Searchable Aspect-Based Method with Resourceful Information Sharing for Protected Cloud Storage
Cloud Computing
3 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
Cloud Computing
4 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Cloud Computing
5 Enabling Efficient Multi-Keyword Ranked Search over Encrypted Mobile Cloud Data through Blind Storage
Cloud Computing
6 Enabling Client-Offered Resources for Cloud Computing: Prospective, Challenges, and Completion
Cloud Computing
7 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
Cloud Computing
8 Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
Cloud Computing
9 Tweet Segmentation and Its Application to Named Entity Recognition.
Data Mining
10 Keyword Extraction and Clustering for Document Recommendation in Conversations
Data Mining
11 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval .
Data Mining
12 Automatic Group Happiness Intensity Analysis. Data Mining
13 RRW – A Robust and Reversible Watermarking Technique for Relational Data
Data Mining
14 A Survey on deducing customer explore Goals using Feedback Session
Data Mining
15 Query Aware Determinization of Uncertain Objects . Data Mining
16 Eminence of service routing for multipath MANETS Distributed Networking
17 Presentation Estimation of Wireless Body Sensors in the occurrence of Slow and Quick Evaporation Effects
Distributed Networking
18 Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis.
Image Processing
19 License Plate Recognition Using Artificial Neural Network and Wavelet Distorted Characteristic Selection.
Image Processing
20 Routine Facial Appearance Identification Using Features of Relevant Facial Patches
Image Processing
21 Saliency-based color accessibility Image Processing
22 Image Toning by Eigen pattern method for multi-class categorization.
Image Processing
23 Saliency-based color accessibility. Image Processing
24 Contextual Online Learning for Multimedia Content Aggregation.
Image Processing
25 Neighbor Discovery in Wireless Networks with Quick text line recognition by judgment linear connected components
on Canny edge image.
Image Processing
26 A Probabilistic Approach for Color Correction in Image Mosaicking Applications.
Image Processing
27 An enhanced border recognition using morphological Laplacian of Gaussian operator.
Image Processing
28 A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images.
Image Processing
29 A Strong Watermarking system for 3D Representations Based on Encrypted Holographic Algorithm
Information Security
30 Fusion Cryptosystem for Preserving Image Reliability using Biometric Fingerprint
Information Security
31 A Realistic IP Trace back Structure through Active Deterministic Packet Marking
Information Security
32 Higher LSB Optimize Data Hiding Mechanism on Encrypted Image
Information Security
33 An Efficient Framework for Generating Storyline Visualizations from Streaming Data
Knowledge & Data Engineering
34 Risk Aware Query Replacement Approach for Secure Databases Performance Management
Knowledge & Data Engineering
35 Decreasing explore gap for Web Service ranking using semantic records and Semantic FP-Tree based association
rule mining
Knowledge & Data Engineering
36 A Similarity-Based Learning Algorithm Using Distance Transformation
Knowledge & Data Engineering
37 An Comprehensive Approach for Safe the Small Messaging Mobile Computing
Services of GSM using Multi-threading Oblique Arc Cryptography
38 Optimum Power Allocation in Sensor Networks for Active Radar Applications .
Mobile Computing
39 Capacity-Based Analysis and Assessment of Presentation of Mobile Phones Base Stations Antenna
Mobile Computing
40 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks .
Mobile Computing
41 Congestion Aware Load Balancing for Multiradio Wireless Mesh Network.
Networks
42 An Efficient and Trustworthy P2P and Social Network Integrated File Sharing System.
Networks
43 EAACK- A Safe Interruption Recognition and Avoidance System for MANETs
Networks
44 On Local Prediction Based Reversible Watermarking. Networks
45 Exploiting P2P File Access Availability in Mobile Ad hoc Networks Though Duplication for Resourceful File
Distribution
Networks
46 Execution of Narrative Approach for Credit Card Fraud Detection.
Networks
47 Sputter transfer for three-stage power basis converter in distribution network.
Networks
48 On Local Prediction Based Reversible Watermarking Network Security
49 Execution of Narrative Approach for Credit Card Fraud Detection
Network Security
50 Sputter transfer for three-stage power basis converter in distribution network
Network Security
51 Observable Representation of Wireless Sensor Nodules Using Meta-data
Secure Transmission
52 A Procedure for End-to-End Key Organization During Route Detection in MANETs
Secure Transmission
53 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
Parallel and Distributed Systems with Secure
Computing
54 Dominating Set and Network Coding-based Routing in Wireless Mesh Networks.
Parallel and Distributed Systems with Secure
Computing
55 A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud.
Parallel and Distributed Systems with Secure
Computing
56 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
Parallel and Distributed Systems with Secure
Computing
57 Authenticated Key Exchange Protocols for Parallel Network File Systems.
Parallel and Distributed Systems with Secure
Computing
58 Data Collection in Multi-Application Sharing Wireless Sensor Networks.
Parallel and Distributed Systems with Secure
Computing
59 Enabling Fine-grained Multi-keyword Search Supporting Classfied Sub-dictionaries over Encrypted Cloud Data.
Parallel and Distributed Systems with Secure
Computing