2013/2012 DotNet IEEE Projects List

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

MODAInnovations

Complete Academic Project Solutions


9538304161 www.modainnovations.com
[email protected]

DOTNET IEEE PROJECT LIST


S NO 1
2

Project Title
Privacy Preserving Delegated Access Control in Public Clouds Privacy-Preserving Public Auditing for Secure Cloud Storage Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems QoS Ranking Prediction for Cloud Services Optimal Multiserver Configuration for Profit Maximization in Cloud Computing

Domain
Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing

Technology Year
DotNet DotNet 2013 2013

DotNet

2013

DotNet

2013

DotNet

2013

6 7 8 9

DotNet DotNet DotNet DotNet

2013 2013 2013 2013

A New Algorithm for Inferring User Search Data Goals with Feedback Sessions Mining A Survey of XML Patterns Data Mining

10

SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Query-Adaptive Image Search With Hash CodesMining Reversible Data Hiding with Optimal value Transfer Secure Mining of Association Rules in Horizontally Distributed Databases Automatic Protocol Blocker for Privacy Preserving Public Auditing in Cloud Computing Efficient audit service outsourcing for data integrity in clouds Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption Towards Secure and Dependable Storage Services in Cloud Computing

Data Mining Image processing Image processing Image processing Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing Cloud Computing

DotNet

2013

11 12 13

DotNet DotNet DotNet

2013 2013 2013

14

DotNet

2012

15

DotNet

2012

16

DotNet

2012

17

DotNet

2012

18

DotNet

2012

19 20 21 22 23

DotNet DotNet DotNet DotNet DotNet

2012 2012 2012 2012 2012

A Query Formulation Language for the data Data Mining web Bridging Social and Data Networks Discovering Characterizations of the Behavior of Anomalous Sub-populations Efficient and Discovery of Patterns in Sequence Data Sets Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing Data Mining Data Mining Data Mining

24

Data Mining

DotNet

2012

25 26 27 28 29

Identifying content for planned events across social medial sites Mining Web Graphs for Recommendations Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering Organizing User Search Histories Outsourced Similarity Search on Metric Data Assets Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators Scalable Learning of Collective Behavior pdf Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Defenses against large scale online password guessing attacks by using persuasive click points Exploring The Design Space Of Social Network-Based Sybil Defenses Robust Face-Name Graph Matching for Movie Character Identification Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval Cooperative download in vehicular environments Distributed Throughput Maximization in Wireless Networks via Random Power Allocation Network Assisted Mobile Computing with Optimal Uplink Query Processing Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper

Data Mining Data Mining Data Mining Data Mining Data Mining

DotNet DotNet DotNet DotNet DotNet

2012 2012 2012 2012 2012

30

Data Mining

DotNet

2012

31

Data Mining Image Processing Image Processing Image Processing Image Processing Image Processing Mobile Computing Mobile Computing Mobile Computing Mobile Computing

DotNet

2012

32

DotNet

2012

33

DotNet

2012

34 35 36 37

DotNet DotNet DotNet DotNet

2012 2012 2012 2012

38

DotNet

2012

39 40

DotNet DotNet

2012 2012

41 42 43 44 45 46 47

Topology Control in Mobile Ad Hoc Mobile Networks with cooperative communications Computing Towards Accurate Mobile Sensor Network Localization in Noisy Environments A New Cell Counting Based Attack Against Tor Load Balancing Multipath Switching System with Flow Slice Mobile Computing Networking Networking

DotNet DotNet DotNet DotNet DotNet DotNet DotNet

2012 2012 2012 2012 2012 2012 2012

Optimal Power Allocation in Multi Optimal Networking Power Allocation in Multi-Relay MIMO View-invariant action recognition based on Artificial Neural Networks Balancing the Tradeoffs between Query Delay and Data Availability in MANETs BECAN A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks Parallel Identities for Managing open Government Data Precise Scalable and Online Request Tracing for Multitier Services of Black Boxes Resource-Aware Application State Monitoring Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption SPOC A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Automatic Reconfiguration for Large-Scale Reliable Storage Systems Design and Implementation of TARF A Trust-Aware Routing Framework for WSNs Networking Parallel & Dist System Parallel & Dist System Parallel & Dist System Parallel & Dist System Parallel & Dist System Parallel & Dist System Parallel & Dist System Secure Computing Secure Computing

48

DotNet

2012

49

DotNet

2012

50

DotNet

2012

51

DotNet

2012

52

DotNet

2012

53

DotNet

2012

54

DotNet

2012

55

DotNet

2012

56 57 58 59

Fast Matrix Embedding by Matrix Extending Joint Relay and Jammer Selection for Secure Two-Way Relay Networks

Secure Computing Secure Computing

DotNet DotNet DotNet DotNet

2012 2012 2012 2012

Expert Discovery and Interactions in Mixed Service Service-Oriented Systems Computing Towards Secure and Dependable Storage Services in Cloud Computing AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies Cooperative Data Dissemination via Roadside WLANs Topology Control in Mobile Ad Hoc Networks with Cooperative Communications A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad1 Association Rule Extracting Knowledge Using Market Basket Analysis Exploring The Design Space Of Social Network-Based Sybil Defenses Service Computing

60

Wireless DotNet Communication Wireless DotNet Communication Wireless DotNet Communication DotNet DotNet DotNet

2012

61

2012

62

2012

63 64 65

2012 2012 2012

You might also like