DotNET 2013-14 IEE Project Titles

DOTNET PROJECTS, IEEE JAVA PROJECTS 2013-2014
(.NET - ASP.NET / VB.NET / C#.NET / ADO.NET)

Domain - Cloud Computing
DotNET 2013-14 IEEE Projects in Cloud Computing
* Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
* Privacy-Preserving Public Auditing for Secure Cloud Storage
* Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
* Privacy Preserving Delegated Access Control in Public Clouds
* Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data
* CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
* Load Rebalancing for Distributed File Systems in Clouds
* Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
* Cloud computing for mobile users can offloading compution save energy
* Mining Contracts for Business Events and Temporal Constraints in Service Engagements
* Collaboration in Multicloud Computing Environments: Framework and Security Issues
* Security and Privacy-Enhancing Multi-cloud Architectures
* Key Challenges in Cloud Computing: Enabling the Future Internet of Services
* A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
* Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems 
* Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
* Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems
* A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
* Dynamic Audit Services for Outsourced Storages in Clouds
A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud



Domain - Knowledge and Data Engineering
DotNET 2013-14 IEEE Projects in Knowledge and Data Engineering
* Efficient and Effective Duplicate Detection in Hierarchical Data
* Dynamic Query Forms for Database Queries
* A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
* A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
* A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
* A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments
* A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
* A System to Filter Unwanted Messages from OSN User Walls
* AML Efficient Approximate Membership Localization within a Web-Based Join Framework
* Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
* Dynamic Personalized Recommendation on Sparse Data
* A New Algorithm for Inferring User Search Goals with Feedback Sessions
* Mining User Queries with Markov Chains: Application to Online Image Retrieval
* TrustedDB: A Trusted Hardware Based Database with Privacy and Data Confidentiality
* A Graph-Based Consensus Maximization Approach for Combining Multiple Supervised and Unsupervised Models
* Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
* Multiparty Access Control for Online Social Networks: Model and Mechanisms
* Privacy Preserving Delegated Access Control in Public Clouds
* Facilitating Effective User Navigation through Website Structure Improvement
Approximate Algorithms for Computing Spatial Distance Histograms with Accuracy Guarantees



Domain - Mobile Computing
DotNET 2013-14 IEEE Projects in Mobile Computing
* Network-Assisted Mobile Computing with Optimal Uplink Query Processing 
* EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
* Optimal Multicast Capacity and Delay Tradeoffs in MANETs
* On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
* Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks
* Understanding the Scheduling Performance in Wireless Networks with Successive Interference Cancellation
* Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
* Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach
* A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
* Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
* Toward Accurate Mobile Sensor Network Localization in Noisy Environments
* A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
* Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
* Towards a Statistical Framework for Source Anonymity in Sensor Networks
* Distributed Cooperative Caching in Social Wireless Networks
* Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks



Domain - Networking
DotNET 2013-14 IEEE Projects in Networking
* Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks.
* A Distributed Control Law for Load Balancing in Content Delivery Networks
* An Efficient and Robust Addressing Protocol for Node Auto configuration in Ad Hoc Networks
* Efficient Algorithms for Neighbor Discovery in Wireless Networks
* Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
* A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay
* Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks
* Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks
* On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
* Randomized Information Dissemination in Dynamic Environments
* Predicting the Impact of Measures Against P2P Networks: Transient Behavior and Phase Transition
* Cross-domain privacy-preserving cooperative firewall optimization
* Entrusting Private Computation and Data to Untrusted Networks
* Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm



Domain - Dependable and Secure Computing
DotNET 2013-14 IEEE Projects in Dependable and Secure Computing
* Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data  
* NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
* Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs
* Entrusting Private Computation and Data to Untrusted Networks
* Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
* On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
* Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing
* SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems



Domain - Parallel and Distributed System
DotNET 2013-14 IEEE Projects in Parallel and Distributed System
* SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency 
* Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
* Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
* Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
* A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks
* Adaptive Network Coding for Broadband Wireless Access Networks
* Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
* Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
* Network Traffic Classification Using Correlation Information
* Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks
* Dynamic Coverage of Mobile Sensor Networks
* A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks



Domain - Image Processing
DotNET 2013-14 IEEE Projects in Image Processing
* Local Directional Number Pattern for Face Analysis: Face and Expression Recognition 
* Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage
* Local Structure-Based Image Decomposition for Feature Extraction With Applications to Face Recognition
* Multi-View Video Representation Based on Fast Monte Carlo Surface Reconstruction
* Regional Bit Allocation and Rate Distortion Optimization for Multiview Depth Video Coding With View Synthesis Distortion Model
* Two-Dimensional Orthogonal DCT Expansion in Trapezoid and Triangular Blocks and Modified JPEG Image Compression
* Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization
* General Framework to Histogram-Shifting-Based Reversible Data Hiding
* Learning Dynamic Hybrid Markov Random Field for Image Labeling
* Rotation Invariant Local Frequency Descriptors for Texture Classification
* Scalable Coding of Depth Maps With R-D Optimized Embedding
* Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation
* Performance Evaluation Methodology for Historical Document Image Binarization



Domain - Software Engineering
DotNET 2013-14 IEEE Projects in Software Engineering 
* Active Learning and Effort Estimation: Finding the Essential Content of Software Effort Estimation Data 
* Generating Domain-Specific Visual Language Tools from Abstract Visual Specifications
* MADMatch: Many-to-Many Approximate Diagram Matching for Design Comparison
* Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm
* Scaling Up Spike-and-Slab Models for Unsupervised Feature Learning
* Validating Second-Order Mutation at System Level
* Balancing Privacy and Utility in Cross-Company Defect Prediction



Domain - Pattern Analysis and Machine Learning, PAML
DotNET 2013-14 IEEE Projects in Pattern Analysis and Machine Learning 
* 3D Convolutional Neural Networks for Human Action Recognition 
* A Globally-Variant Locally-Constant Model for Fusion of Labels from Multiple Diverse Experts without Using Reference Labels
* Efficient Classification for Additive Kernel SVMs
* Fast and Accurate Matrix Completion via Truncated Nuclear Norm Regularization
* Image Transformation Based on Learning Dictionaries across Image Spaces





DOTNET IEEE PROJECTS TITLES, LIST
DotNET 2012 IEEE Project Details / Titles / List / Java IEEE Projects / Java Final Year Projects / Java Projects for BE,BTech, ME, MTech, MCA
DOT NET (ASP.NET + VB.NET + C#) IEEE PROJECT LIST / TITLES

CLOUD COMPUTING PROJECTS
DOTNET CLOUD COMPUTING, 2012 IEEE PROJECT TITLES
* Cloud Chamber A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants
* Cluster as a Service for self-deployable cloud applications
* A Cloud Infrastructure for Optimization of a Massive Parallel Sequencing Workflow
* A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Environments
* Design and Implementation of a Secure Healthcare Social Cloud System
* Enhanced Energy-efficient Scheduling for Parallel Applications in Cloud
* A Price- and-Time-Slot-Negotiation Mechanism for Cloud Service Reservations
* A Seeded Cloud Approach to Health Cyberinfrastructure Preliminary Architecture Design and Case Applications
* A Time-series Pattern based Noise Generation Strategy for Privacy Protection in Cloud Computing
* An Autonomous Reliability Aware Negotiation Strategy for Cloud Computing Environments
* Mining Concept drifting Network traffic in cloud computing environments
* On Handling Large-Scale Polynomial Multiplications in Compute Cloud Environments using Divisible Load Paradigm
* Optical Networks for Grid and Cloud Computing Applications
* Automated Tagging for the Retrieval of Software Resources in Grid and Cloud Infrastructures
* Environmental and Disaster Sensing Using Cloud Computing Infrastructure
* Global Futures a Multithreaded Execution Model for Global Arrays-based Applications
* Optimal Reconfiguration of the Cloud Network for Maximum Energy Savings
* Performance Analysis of Cloud Computing Centers Using M =G=m=m_ r Queuing Systems
* Performance analysis of content-based mobile application on Content Delivery Networks
* Performance evaluation of multimedia services over wireless LAN using routing protocol Optimized Link State Routing (OLSR)
* Perspectives of UnaCloud An Opportunistic Cloud Computing Solution For Facilitating Research
* Pseudo Random Number Generation for Parallelized Jobs on Clusters
* Revenue Management for Cloud Providers - A Policy-based Approach under Stochastic Demand
* Scalable Join Queries in Cloud Data Stores
* SLA-based Optimization of Power and Migration Cost in Cloud Computing
* Time and Cost Sensitive Data-Intensive Computing on Hybrid Clouds
* Visualizing Nonmanifold and Singular Implicit Surfaces with Point Clouds

* CLOUDTPS: Scalable Transactions for Web Applications in the Cloud, IEEE 2011
* Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing, IEEE 2011
* Heuristics Based Query Processing for Large RDF Graphs using Cloud Computing, IEEE 2011
* Improving Utilization of Infrastructure Clouds, IEEE 2011
* Multilevel intrusion detection system and log management in cloud computing, IEEE 2011
* Secure and Practical Outsourcing of Linear Programming in Cloud Computing, IEEE 2011
* Towards Secure and Dependable Storage Services in Cloud Computing, IEEE 2011
* Checkpoint-based Fault-tolerant Infrastructure for Virtualized Service Providers, IEEE 2010
* Dynamic Auction Mechanism for Cloud Resource Allocation, IEEE 2010
* Elastic Site - Using Clouds to Elastically Extend Site Resources, IEEE 2010
* Fuzzy Keyword Search over Encrypted Data in Cloud Computing, IEEE 2010
* Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing, IEEE 2010

***************************************************************************************************************

MOBILE COMPUTING PROJECTS
DOTNET MOBILE COMPUTING, 2012 IEEE PROJECT TITLES
* A Fade-Level Skew-Laplace Signal Strength Model for Device-Free Localization with Wireless Networks
* A Novel MAC Scheme for Multichannel Cognitive Radio Ad Hoc Networks
* An MIMO Configuration Mode and MCS Level Selection Scheme by Fuzzy Q-Learning for HSPA Systems
* Channel Estimation for Opportunistic Spectrum Access Uniform and Random Sensing
* Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services
* Delay Optimal Scheduling for Cognitive Radios with Cooperative Beamforming A Structured Matrix-Geometric Method
* Efficient Virtual Backbone Construction with Routing Cost Constraint in Wireless Networks Using Directional Antennas
* Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions over Wireless Networks
* Modeling and Performance Analysis for Duty-Cycled MAC Protocols with Applications to S-MAC and X-MAC
* Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMACA Networks
* ProSpect A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel
* STORM A Framework for Integrated Routing, Scheduling and Traffic Management in Ad Hoc Networks
* The Boomerang Protocol Tying Data to Geographic Locations in Mobile Disconnected Networks
* Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks Computational Complexity and Efficient Approximations

* A Distributed and Scalable Time Slot Allocation Protocol for Wireless Sensor Networks, IEEE 2011
* Autonomous Deployment of Heterogeneous Mobile Sensors, IEEE 2011
* Effective Scheduling in Infrastructure Based Cognitive Radio Networks, IEEE 2011
* Fast Detection of Mobile Replica node attacks in wireless sensor networks, IEEE 2011
* Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems, IEEE 2011
* Mobile Sampling of Sensor Field Data Using Controlled Broadcast, IEEE 2011
* Model and Protocol for Energy-Efficient Routing over Mobile Ad Hoc Networks, IEEE 2011
* Throughput Optimization in Mobile Backbone Networks, IEEE 2011
* A Scalable and Energy-Efficient Context Monitoring Framework for Mobile Personal Sensor Networks, IEEE 2010
* Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService, IEEE 2010
* Energy-Optimal Scheduling with Dynamic Channel Acquisition in Wireless Downlinks, IEEE 2010
* On Multihop Distances in Wireless Sensor Networks with Random Node Locations, IEEE 2010
* Optimal Accounting Policies for AAA Systems in Mobile Telecommunications Networks, IEEE 2010
* VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks, IEEE 2010
* A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice, IEEE 2009
* A Tabu Searching Algorithm For Cluster Building in Wireless Sensor Networks, IEEE 2009
* Biased Random Walks in Uniform Wireless Networks, IEEE 2009
* Cell Breathing Techniques for Load Balancing in Wireless LANs, IEEE 2009
* An Gen3 based Authentication Protocol, IEEE 2009
* Contention-Aware Performance Analysis of Mobility-Assisted Routing, IEEE 2009
* Energy Maps For Mobile Wireless Networks, IEEE 2009
* Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks, IEEE 2009
* Information Content-Based Sensor Selection and Transmission Power Adjustment for Collaborative Target Tracking, IEEE 2009
* Minimizing Recovery State in Geographic Ad Hoc Routing, IEEE 2009
* On the Planning of Wireless Sensor Networks Energy-Efficient Clustering under the Joint Route, IEEE 2009
* Opportunistic Scheduling with Reliability Guarantees in Cognitive Radio Networks, IEEE 2009
* Random Cast An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE 2009
* Route Stability in MANETs under the Random Direction Mobility Model, IEEE 2009

**************************************************************************************************

KNOWLEDGE & DATA ENGINEERING PROJECTS
DOTNET KNOWLEDGE AND DATA ENGINEERING, 2012 IEEE PROJECT TITLES
* A Decision-Theoretic Framework for Numerical Attribute Value Reconciliation
* Discriminative Feature Selection by Nonparametric Bayes Error Minimization
* EDISC A Class-Tailored Discretization Technique for Rule-Based Classification
* Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
* A Knowledge-Driven Approach to Activity Recognition in Smart Homes
* A Look-Ahead Approach to Secure Multiparty Protocols
* Adding Temporal Constraints to XML Schema
* Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
* Segmentation and Sampling of Moving Object Trajectories Based on Representativeness
* Using Rule Ontology in Repeated Rule Acquisition from Similar Web Sites
* Maximum Ambiguity-Based Sample Selection in Fuzzy Decision Tree Induction
* Protecting Location Privacy against Location-Dependent Attacks in Mobile Services
* Saturn Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
* Combining Tag and Value Similarity for Data Extraction and Alignment
* Data Mining for XML Query-Answering Support
* Dense Subgraph Extraction with Application to Community Detection
* Efficient and Progressive Algorithms for Distributed Skyline Queries over Uncertain Data
* Efficient Computation of Range Aggregates against Uncertain Location-Based Queries
* Energy Efficient Schemes for Accuracy-Guaranteed Sensor Data Aggregation Using Scalable Counting
* Energy-Efficient Reverse Skyline Query Processing over Wireless Sensor Networks
* A Performance Anomaly Detection and Analysis Framework for DBMS Development
* A Unified Probabilistic Framework for Name Disambiguation in Digital Library
* Evaluating Path Queries over Frequently Updated Route Collections
* Extending Recommender Systems for Disjoint UserItem Sets The Conference Recommendation Problem
* Fuzzy Orders-of-Magnitude-Based Link Analysis for Qualitative Alias Detection
* Mining Online Reviews for Predicting Sales Performance A Case Study in the Movie Domain
* On the Complexity of View Update Analysis and Its Application to Annotation Propagation
* Weakly Supervised Joint Sentiment-Topic Detection from Text

* A Generic Multilevel Architecture for Time Series Prediction, IEEE 2011
* A Personalized Ontology Model for Web Information Gathering, IEEE 2011
* A Web Search Engine-Based Approach to Measure Semantic Similarity between Words, IEEE 2011
* Energy time series forecasting based on pattern sequence similarity, IEEE 2011
* Optimal Service Pricing for a Cloud Cache, IEEE 2011
* Publishing Search Logs—A Comparative Study of Privacy Guarantees, IEEE 2011
* Data Leakge Detection, IEEE 2011
* Anonymous Query processing in Road Networks, IEEE 2010
* Automated classification of customer e mails via association rule mining, IEEE 2010
* ISO-MAP: Energy-Efficient Contour Mapping in Wireless Sensor Networks, IEEE 2010
* LIGHT: A Query-Efficient Yet Low-Maintenance Indexing Scheme over DHTs, IEEE 2010
* Record Matching over Query Results from Multiple Web Databases, IEEE 2010
* ViDE A Vision Based Approach for Deep Web Data Extraction, IEEE 2010
* Bridging Domains Using World Wide Knowledge for Transfer Learning, IEEE 2010
* A Relation-Based Page Rank Algorithm for Semantic Web Search Engines, IEEE 2009
* Clustering and Sequential Pattern Mining of Online Collaborative Learning Data, IEEE 2009
* Online Scheduling Sequential Objects with Periodicity for dynamic Information Dissemination, IEEE 2009
* Hardware enhanced association rule mining with Hashing and Pipelining, IEEE 2008
* Location-Based Spatial Queries with Data Sharing in Wireless Broadcast Environments, IEEE 2008
* Watermarking Relational Databases Using Optimization Based Techniques, IEEE 2008
* DRYADEPARENT An Efficient and Robust Closed Attribute Tree Mining Algorithm, IEEE 2008

*******************************************************************************************************

NETWORKING PROJECTS
DOTNET NETWORKING, 2012 IEEE PROJECT TITLES
* A Quantization Theoretic Perspective on Simulcast and Layered Multicast Optimization
* Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using -Structures
* Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio Networks
* Adaptive Selective Verification An Efficient Adaptive Countermeasure to Thwart DoS Attacks
* Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
* Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks
* Congestion-Dependent Pricing and Forward Contracts for Complementary Segments of a Communication Network
* Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
* Design of Wireless Sensor Networks for Mobile Target Detection
* Efficient Network Tomography for Internet Topology Discovery
* Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
* ESM Efficient and Scalable Data Center Multicast Routing
* On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths
* Reliable Collective Communications With Weighted SRLGs in Optical Networks

* A Novel Approach for Failure Localization in All-Optical Mesh Networks, IEEE 2011
* Continuous Neighbor Discovery in Asynchronous Sensor Networks, IEEE 2011
* Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks, IEEE 2011
* Fast Simulation of Service Availability in Mesh Networks With Dynamic Path Restoration, IEEE 2011
* Jamming Aware Traffic Allocation for Multiple Path Routing Using Portfolio Selection, IEEE 2011
* Tofu:semi truthful online frequency allocation mechanism for wireless networks, IEEE 2011
* Service Overlay Network Capacity Adaptation for Profit Maximization, IEEE 2010
* Improving TLS Security By Quantum Cryptography, IEEE 2010
* Conditional Shortest Path Routing in Delay Tolerant Networks, IEEE 2010
* Constrained Relay Node Placement in Wireless Sensor Networks Formulation and Approximations, IEEE 2010
* Demand-Aware Content Distribution on the Internet, IEEE 2010
* On Wireless Scheduling Algorithms for Minimizing the Queue-Overflow, IEEE 2010
* Privacy Aware Role Based Access Control, IEEE 2010
* S4: Small State and Small Stretch Routing Protocol for Large Wireless Sensor Networks, IEEE 2010
* PRESTO Feedback-Driven Data Management in Sensor Networks, IEEE 2009
* Analysis of Shortest Path Routing for Large Multi-Hop Wireless Networks, IEEE 2009
* Explicit Load Balancing Technique for NGEO Satellite Ip Networks With On-Board Processing Capabilities, IEEE 2009
* Resequencing Analysis of Stop-and-Wait ARQ for Parallel Multichannel Communications, IEEE 2009
* Virus Spread in Networks, IEEE 2009
* Delay Analysis for Maximal Scheduling With Flow Control in Wireless Networks With Bursty Traffic, IEEE 2009
* Resource Allocation in OFDMA Wireless Communications Systems Supporting Multimedia Services, IEEE 2009
* Secure and Policy-Complaint Source Routing, IEEE 2009
* Single-Link Failure Detection in All-Optical Networks, IEEE 2009
* Two Blocking Algorithm on Adaptive Binary Splitting Single and Pair Resolutions for RFID Tag Identification, IEEE 2009
* Rate Allocation & Network Lifetime Problem for Wireless Sensor Networks, IEEE 2008
* Probabilistic Packet Marking For Large Scale IP Trace Back, IEEE 2008
* Statistical Techniques for Detecting Traffic Anomalies through Packet Header Data, IEEE 2008
* A Distributed And Scalable Routing Table Manager For The Next Generation Of IP Routers, IEEE 2008
* Efficient Routing In Intermittently Connected Mobile Networks The Multiple Copy Case, IEEE 2008
* Efficient Broadcasting Using Network Coding, IEEE 2008

*******************************************************************************************************

DEPENDABLE & SECURE COMPUTING
DOTNET DEPENDABLE AND SECURE COMPUTING, 2012 IEEE PROJECT TITLES
* Automated Security Test Generation with Formal Threat Models
* Detecting and Resolving Firewall Policy Anomalies
* Detecting Anomalous Insiders in Collaborative Information Systems
* DoubleGuard Detecting Intrusions in Multitier Web Applications
* Enforcing Mandatory Access Control in Commodity OS to Disable Malware
* Enhanced Privacy ID A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities
* Ensuring Distributed Accountability for Data Sharing in the Cloud
* Give2Get Forwarding in Social Mobile Wireless Networks of Selfish Individuals
* Incentive Compatible Privacy-Preserving Distributed Classification
* Iterative Trust and Reputation Management Using Belief Propagation
* JS-Reduce Defending Your Data from Sequential Background Knowledge Attacks
* Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
* On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
* Remote Attestation with Domain-Based Integrity Model and Policy Analysis
* Resilient Authenticated Execution of Critical Applications in Untrusted Environments
* Secure Failure Detection and Consensus in TrustedPals

* A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree, IEEE 2011
* Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks, IEEE 2011
* ELMO:Energy aware local monitoring in sensor networks, IEEE 2011
* Layered Approach Using Conditional Random Fields for Intrusion Detection, IEEE 2010
* Performance of Orthogonal Fingerprinting Codes under Worst-Case Noise, IEEE 2009
* The Effectiveness of Checksums for Embedded Control Networks, IEEE 2009
* Credit Card Fraud Detection Using Hidden Markov Models, IEEE 2008
* Temporal Portioning of Communication Resources in an Integrated Architecture, IEEE 2008
* Trustworthy Computing Under Resource Constraints With The Down Policy, IEEE 2008

**************************************************************************************************

PARALLEL & DISTRIBUTED SYSTEM
DOTNET PARALLEL AND DISTRIBUTED SYSTEMS, 2012 IEEE PROJECT TITLES
* Reliable and Energy-Efficient Multipath Communications in Underwater Sensor Networks
* Topology Enhancements in Wireless Multihop Networks A Top-Down Approach
* A Network Coding Equivalent Content Distribution Scheme for Efficient Peer-to-Peer Interactive VoD Streaming
* DRAGON Detection and Tracking of Dynamic Amorphous Events in Wireless Sensor Networks
* Embedded Transitive Closure Network for Runtime Deadlock Detection in Networks-on-Chip
* A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
* A Survey of Parallel Programming Models and Tools in the Multi and Many-Core Era
* An Online Data Access Prediction and Optimization Approach for Distributed Systems
* Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
* Cost-Driven Scheduling of Grid Workflows Using Partial Critical Paths
* Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient
* Distributed Diagnosis of Dynamic Events in Partitionable Arbitrary Topology Networks
* Distributed Privacy-Preserving Access Control in Sensor Networks
* Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep
* Large-Scale Transient Stability Simulation of Electrical Power Systems on Parallel GPUs
* On Maximizing the Lifetime of Wireless Sensor Networks Using Virtual Backbone Scheduling
* Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks
* Trustworthy Coordination of Web Services Atomic Transactions

* A Data Throughput prediction & optimized server for widely distributed many task computing, IEEE 2011
* Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud, IEEE 2011
* Network Immunization with Distributed Autonomy Oriented Entities, IEEE 2011
* Timing based scheme for rogue ap detection, IEEE 2011
* A Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming, IEEE 2010
* Resource Bundles Using Aggregation for Statistical Large-Scale Resource Discovery and Management, IEEE 2010
* Compaction of Schedules and a Two-Stage Approach for Duplication-Based DAG Scheduling, IEEE 2009
* Enforcing Minimum-Cost Multicast Routing against Shellfish Information Flows, IEEE 2009
* Movement-Assisted Connectivity Restoration in Wireless Sensor, 2009
* SORD A Fault-Resilient Service Overlay for Media Port Resource Discovery, IEEE 2009
* HBA Distributed Metadata Management for Large Cluster-Based Storage Systems, IEEE 2008
* Quiver On the Edge Consistent Scalable Edge Services, IEEE 2008
* An SSL Back-End Forwarding Scheme in Cluster-based Web Servers, IEEE 2007
* pFusion: A P2P Architecture for  Internet-Scale Content-Based Search and Retrieval, IEEE 2007

***************************************************************************************************

DOTNET WIRELESS COMMUNICATIONS PROJECT TITLES
* Clustering and Cluster-Based Routing Protocol for Delay-Tolerant Mobile Networks, IEEE 2010
* Fast Algorithms for Joint Power Control and Scheduling in Wireless Networks, IEEE 2010
* Enhancing Cell-Edge Performance A Downlink Dynamic Interference Avoidance Scheme with Inter-Cell Coordination, IEEE 2010
* Fairness-Aware Radio Resource Management in Downlink OFDMA Cellular Relay Networks, IEEE 2010
* Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks, IEEE 2010

************************************************************************************************

DOTNET COMMUNICATION SYSTEM PROJECT TITLES
2012 IEEE PROJECTS
* A Fourier Based Method for Approximating the Joint Detection Probability in MIMO Communications
* Achieving Joint Diversity in Decode-and-Forward MIMO Relay Networks with Zero-Forcing Equalizers
* Characterization of OFDM Radio Link Under PLL-Based Oscillator Phase Noise and Multipath Fading Channel
* Performance Modeling and Analysis of Cognitive Mesh Networks

***************************************************************************************************************

DOTNET IMAGE PROCESSING
IMAGE PROCESSING, 2012 IEEE PROJECT TITLES
* A Kalman-Filtering Approach to High Dynamic Range Imaging for Measurement Applications
* A Multiplicative Iterative Algorithm for Box-Constrained Penalized Likelihood Image Restoration
* Cognition and Removal of Impulse Noise With Uncertainty
* Combining Head Pose and Eye Location Information for Gaze Estimation
* Higher Degree Total Variation (HDTV) Regularization for Image Recovery
* Image Super-Resolution With Sparse Neighbor Embedding
* Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers
* Object Segmentation of Database Images by Dual Multiscale Morphological Reconstructions and Retrieval Applications
* Posterior-Mean Super-Resolution With a Causal Gaussian Markov Random Field Prior
* Wavelet-Based Compressed Sensing Using a Gaussian Scale Mixture Model
* Blind Separation of Image Sources via Adaptive Dictionary Learning
* ViBe: A Universal Background Subtraction Algorithm for Video Sequences, IEEE 2011
* Efficient 2-D Grayscale Morphological Transformations With Arbitrary Flat Structuring Elements, IEEE 2008
* Vision Based Processing For Real-Time 3-D Data Acquisition Based On Coded Structured Light, IEEE 2008
* Active Learning Methods for Interactive Image Retrieval, IEEE 2008
* A Novel Framework for Semantic Annotation and Personalized Retrieval of Sports Video, IEEE 2008
* Orthogonal Data Embedding for Binary Images in Morphological Transform Domain-A High-Capacity Approach, IEEE 2008
* Image Processing Techniques for the Detection and Removal of Cracks in Digitized Paintings, IEEE 2008
* Neural Networks for Unicode Optical Character Recognition, IEEE 2008

***************************************************************************************************************

DOTNET NETWORK AND SERVICE MANAGEMENT PROJECTS
2012 IEEE PROJECT TITLES
* A Framework for Automated Exploit Prevention from Known Vulnerabilities in Voice over IP Services
* A Gossip Protocol for Dynamic Resource Management in Large Cloud Environments
* A Security Management Architecture for Supporting Routing Services on WANETs
* Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection

*****************************************************************************************************
DOTNET SERVICES COMPUTING PROJECTS
2012 IEEE PROJECT TITLES
* A Dataflow-Based Scientific Workflow Composition Framework
* Dynamic Authentication for Cross-Realm SOA-Based Business Processes
* Expert Discovery and Interactions in Mixed Service-Oriented Systems
* Runtime Enforcement of Web Service Message Contracts with Data

***************************************************************************************************************

DOTNET SOFTWARE ENGINEERING PROJECTS
2012 IEEE PROJECT TITLES
* An Autonomous Engine for Services Configuration and Deployment
* Comparing Semi-Automated Clustering Methods for Persona Development
* Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
* Exploiting Dynamic Information in IDEs Improves Speed and Correctness of Software Maintenance Tasks
* QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems
* StakeRare Using Social Networks and Collaborative Filtering for Large-Scale Requirements Elicitation

***************************************************************************************************************

DOTNET FUZZY SYSTEMS PROJECTS
2012 IEEE PROJECT TITLES
* A Generalization of Distance Functions for Fuzzy c -Means Clustering With Centroids of Arithmetic Means
* Adaptive Control Schemes for Discrete-Time T-S Fuzzy Systems With Unknown Parameters and Actuator Failures
* Grouping, Overlap, and Generalized Bientropic Functions for Fuzzy Modeling of Pairwise Comparisons

***************************************************************************************************************

DOTNET LEARNING TECHNOLOGIES PROJECTS
2012 IEEE PROJECT TITLES
* Case-Based Learning, Pedagogical Innovation, and Semantic Web Technologies
* Facilitating Trust in Privacy-Preserving E-Learning Environments
* Spatial Learning Using Locomotion Interface to Virtual Environment
* Using Linked Data to Annotate and Search Educational Video Resources for Supporting Distance Learning

***************************************************************************************************************

DOTNET PATTERN ANALYSIS & MACHINE INTELLIGENCE PROJECTS
2012 IEEE PROJECT TITLES
* A Closed-Form Solution to Tensor Voting Theory and Applications
* Bilinear Modeling via Augmented Lagrange Multipliers (BALM)
* Difference-Based Image Noise Modeling Using Skellam Distribution
* Discriminative Latent Models for Recognizing Contextual Group Activities
* Edge Structure Preserving 3D Image Denoising by Local Surface Approximation
* Fast Rotation Invariant 3D Feature Computation Utilizing Efficient Local Neighborhood Operators
* IntentSearch Capturing User Intention for One-Click Internet Image Search
* Trainable Convolution Filters and Their Application to Face Recognition

***************************************************************************************************************

DOTNET OTHER DOMAINS, IEEE PROJECT TITLES
* One Size Does Not Fit All: A Group-Based Service Selection for Web-Based Business Processes - Adv Information Networking, IEEE 2011
* Adaptive provisioning of human expertise in service-oriented systems - Applied Computing, IEEE 2011
* Bridging Socially-Enhanced Virtual Communities - Applied Computing, IEEE 2011
* Data integrity proofs in cloud storage - Communication Systems and Networks, IEEE 2011
* Secure Neighbor Discovery in Mobile Ad Hoc Networks - Mobile adhoc networks, IEEE 2011
* Monitoring Service Systems from a Language-Action Perspective - Services Computing, IEEE 2011
* The Awareness Network, To Whom Should I Display My Actions? And, Whose Actions Should I Monitor? - Software Engineering, IEEE 2011
* An Intrusion Detection model fuzzy class assocation rule mining using genetic network programming - Systems and cybernetics, IEEE 2011
* A bounded and adaptive memory based approach to mine frequent patterns from very large database - Systems, man, and cybernetics, IEEE 2011
* Improving the perfotmance of wireless adhoc network by using MAC Layer Design - Wireless communication, IEEE 2011
* Multicast Multipath Power Efficient Routingin Mobile Adhoc - Computer Science And Network Security, IEEE 2010
* Edge Adaptive Image Steganography Based on LSB Matching Revisited - Information Forensics And Security, IEEE 2010
* Data Mining for Risk Management in Hospital Information Systems - Medical Engineering, IEEE 2010
* Slow Adaptive OFDMA Systems Through Chance Constrained Programming - Signal Processing, IEEE 2010
* Dynamics of Multiple-Seller and Multiple-Buyer Spectrum Trading in Cognitive Radio Networks A Game-Theoretic Modeling Approach – Computer Theory And Engineering, IEEE 2009
* A New Model For Dissemination Of XML Content – Systems, Man, And Cybernetics, IEEE 2008
* Fuzzy Control Model Optimization for Behavior-Constent Traffic Routing Under Information Provision - Transportation System, IEEE 2008
* Schema Conversion from Relation to XML with Semantic Constraints – Fuzzy Systems And Knowledge Discovery, IEEE 2007
* E-Secure Transactions - Secure Electronic Data Interchange over Internet – Internet Computing, IEEE 2005
* Estimation of Defects Based On Defect Decay Model ED3M - Software Engineering, IEEE 2008
* Effective Software Merging in the Presence of Object-Oriented Refactorings - Software Engineering, IEEE 2008
* Provable Protection Against Web Application Vulnerabilities Related to Session Data Dependencies - Software Engineering, IEEE 2008
 
PROJECT SUPPORTS & DELIVERABLES @ NCCT
# PROJECT ABSTRACT
# PROJECT IEEE BASE PAPER/REFERENCE PAPER
# PROJECT PRESENTATION IN PPT FORMAT
# PROJECT REVIEW ASSISTANCE FOR VIVA
# PROJECT DIAGRAMS
# PROJECT SOURCE CODE
# PROJECT REPORT
# PROJECT SCREEN SHOTS
# PROJECT DEMO
# PROJECT EXPLANATION
# PROJECT ACCEPTANCE LETTER
# PROJECT COMPLETION CERTIFICATE
# OTHER REQUIRED LETTERS









No comments:

Post a Comment