Skip to main content

ieee software project titles 2015-16

JAVA TITLES 2015-16
S.NO PROJECT TITLES YEAR
  Service Computing  
1  SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2015
  Secure Computing  
1  Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel 2015
     
2 Formalization and Verification of Group Behavior Interactions 2015
     
3 Group Key Agreement with Local Connectivity 2015
     
4  Data Lineage in Malicious Environments 2015
     
5 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 2015
     
  CLOUD COMPUTING   
1  MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework 2015
     
2 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks 2015
     
3 Understanding the Performance and Potential of Cloud Computing for Scientific Applications 2015
   
4 Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform 2015
     
  DATA MINING  
    2015
1 Subgraph Matching with Set Similarity in a Large Graph Database  
     
2 Structured Learning from Heterogeneous Behavior for Social Identity Linkage 2015
     
3 Making Digital Artifacts on the Web Verifiable and Reliable 2015
     
4  Anonymizing Collections of Tree-Structured Data 2015
     
5 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015
     
  Software Engineering  
1 The Impact of View Histories on Edit Recommendations 2015
     
  NETWORKING  
1  FRAppE: Detecting Malicious Facebook Applications 2015
     
  IMAGE PROCESSING - MULTIMEDIA  
1 Multiview Alignment Hashing for Efficient Image Search 2015
     
2 YouTube Video Promotion by Cross-network 2015
     
3 Semantic-Improved Color Imaging Applications: It Is All About Context 2015
     
4 Geolocalized Modeling for Dish Recognition 2015
     
5 Learning to Rank Image Tags with Limited Training Examples 2015
     
  MOBILE COMPUTING  
     
1 Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering 2015
     
2 Tracking Temporal Community Strength in Dynamic Networks 2015
     
3 Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks 2015
     
4  Towards Information Diffusion in Mobile Social Networks 2015
     
5 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
     
  PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING  
1  Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 2015
     
2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2015
     
3  Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015
     
4  A Computational Dynamic Trust Model for User Authorization 2015
     
5 Secure Distributed Deduplication Systems with Improved Reliability 2015
   


DOTNET TITLES 2015-16
S.NO PROJECT TITLES YEAR
     
  SERVICES COMPUTING  
     
1 On the Security of Data Access Control for Multi authority Cloud Storage Systems 2015
     
2 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation 2015
     
3 Congestion Aware Load Balancing for Multiradio Wireless Mesh Network 2015
     
  IMAGE PROCESSING - MULTIMEDIA  
     
1 Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis 2015
     
2 Saliency-based color accessibility 2015
     
3 A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images 2015
     
4 An Attribute-assisted Re ranking Model for Web Image Search 2015
     
5 RRW - A Robust and Reversible Watermarking 2015
     
  CLOUD COMPUTING  
     
1  Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 2015
     
2 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation 2015
     
3  Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 2015
     
4 Combining Efficiency, Fidelity, and Flexibility in Resource Information Services 2015
     
     
  PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING  
     
1 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
     
2 Data Collection in Multi-Application Sharing Wireless Sensor Networks 2015
     
3 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data 2015
     
4 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015
     
5 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds 2015
     
  MOBILE COMPUTING  
     
1 Optimum Power Allocation in Sensor Networks for Active Radar Applications 2015
     
2 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks 2015
     
     
  KNOWLEDGE AND DATA ENGINEERING  
     
1  Tweet Segmentation and Its Application to Named Entity Recognition 2015
     
2  RRW - A Robust and Reversible Watermarking Technique for Relational Data 2015
     
3 Query Aware Determinization of Uncertain Objects 2015
     
4 PAGE: A Partition Aware Engine for Parallel Graph Computation 2015
     
  SECURE COMPUTING  
1  VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils 2015
     
2  Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification 2015
     
3 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 2015
     
4 Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications 2015
     
5 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search 2015
     
     
     
     

Comments

Popular posts from this blog

PUNCHING MACHINE

ACCIDENT AVOIDING SYSTEM FOR PUNCHING MACHINE SYNOPSIS The aim of our project is to take a system-wide approach to preventing the machine accident. The system includes not just the machine and the operator; but rather, it includes everything from the initial design of the machine to the training of everyone that is responsible for any aspect of it, to the documentation of all changes, to regular safety audits and a finally a corporate culture of safety-first. Design is the part of a machine's life where the greatest impact can be made in relation to avoiding accidents. The designer should ensure that the machine is safe to set up and operate, safe to install, safe to maintain, safe to repair, and safe to decommission. Although safe operation is usually at the forefront of a designer's mind, safe maintenance and repair should also be a high priority. Around 50% of fatal accidents involving industrial equipment are associated with maintenance activities, and design...

garbage monitoring using arduino code with gsm

#include <SoftwareSerial.h> #include <LiquidCrystal.h> //LiquidCrystal lcd(7, 6, 5, 4, 3, 2); LiquidCrystal lcd(13, 12, 11, 10, 9, 8); SoftwareSerial mySerial(0,1); #define trigPin 2 #define echoPin 3 #define PIR_sensor 4 #define m11 5 #define m12 6 void setup() {    lcd.begin(16, 2);    lcd.print("    Garbage    ");    Serial.println("garbage ");   lcd.setCursor(0,1);   lcd.print("   Open Close    ");   Serial.println(" open close");   delay(3000);   lcd.clear();   //lcd.print(" ");   delay(2000); mySerial.begin(9600); // Setting the baud rate of GSM Module Serial.begin (9600); pinMode(trigPin, OUTPUT); pinMode(echoPin, INPUT);  pinMode(m11, OUTPUT);   pinMode(m12, OUTPUT);   } void loop() {  readPIR();  pingDist();  SendMessage(); } void pingDist ()   {     long duration, distance;...