Skip to main content

ieee software project titles 2015-16

JAVA TITLES 2015-16
S.NO PROJECT TITLES YEAR
  Service Computing  
1  SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2015
  Secure Computing  
1  Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel 2015
     
2 Formalization and Verification of Group Behavior Interactions 2015
     
3 Group Key Agreement with Local Connectivity 2015
     
4  Data Lineage in Malicious Environments 2015
     
5 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage 2015
     
  CLOUD COMPUTING   
1  MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework 2015
     
2 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks 2015
     
3 Understanding the Performance and Potential of Cloud Computing for Scientific Applications 2015
   
4 Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform 2015
     
  DATA MINING  
    2015
1 Subgraph Matching with Set Similarity in a Large Graph Database  
     
2 Structured Learning from Heterogeneous Behavior for Social Identity Linkage 2015
     
3 Making Digital Artifacts on the Web Verifiable and Reliable 2015
     
4  Anonymizing Collections of Tree-Structured Data 2015
     
5 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015
     
  Software Engineering  
1 The Impact of View Histories on Edit Recommendations 2015
     
  NETWORKING  
1  FRAppE: Detecting Malicious Facebook Applications 2015
     
  IMAGE PROCESSING - MULTIMEDIA  
1 Multiview Alignment Hashing for Efficient Image Search 2015
     
2 YouTube Video Promotion by Cross-network 2015
     
3 Semantic-Improved Color Imaging Applications: It Is All About Context 2015
     
4 Geolocalized Modeling for Dish Recognition 2015
     
5 Learning to Rank Image Tags with Limited Training Examples 2015
     
  MOBILE COMPUTING  
     
1 Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering 2015
     
2 Tracking Temporal Community Strength in Dynamic Networks 2015
     
3 Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks 2015
     
4  Towards Information Diffusion in Mobile Social Networks 2015
     
5 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
     
  PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING  
1  Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 2015
     
2 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2015
     
3  Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015
     
4  A Computational Dynamic Trust Model for User Authorization 2015
     
5 Secure Distributed Deduplication Systems with Improved Reliability 2015
   


DOTNET TITLES 2015-16
S.NO PROJECT TITLES YEAR
     
  SERVICES COMPUTING  
     
1 On the Security of Data Access Control for Multi authority Cloud Storage Systems 2015
     
2 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation 2015
     
3 Congestion Aware Load Balancing for Multiradio Wireless Mesh Network 2015
     
  IMAGE PROCESSING - MULTIMEDIA  
     
1 Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis 2015
     
2 Saliency-based color accessibility 2015
     
3 A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images 2015
     
4 An Attribute-assisted Re ranking Model for Web Image Search 2015
     
5 RRW - A Robust and Reversible Watermarking 2015
     
  CLOUD COMPUTING  
     
1  Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing 2015
     
2 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation 2015
     
3  Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 2015
     
4 Combining Efficiency, Fidelity, and Flexibility in Resource Information Services 2015
     
     
  PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING  
     
1 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
     
2 Data Collection in Multi-Application Sharing Wireless Sensor Networks 2015
     
3 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data 2015
     
4 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015
     
5 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds 2015
     
  MOBILE COMPUTING  
     
1 Optimum Power Allocation in Sensor Networks for Active Radar Applications 2015
     
2 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks 2015
     
     
  KNOWLEDGE AND DATA ENGINEERING  
     
1  Tweet Segmentation and Its Application to Named Entity Recognition 2015
     
2  RRW - A Robust and Reversible Watermarking Technique for Relational Data 2015
     
3 Query Aware Determinization of Uncertain Objects 2015
     
4 PAGE: A Partition Aware Engine for Parallel Graph Computation 2015
     
  SECURE COMPUTING  
1  VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils 2015
     
2  Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification 2015
     
3 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 2015
     
4 Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications 2015
     
5 Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search 2015
     
     
     
     

Comments

Popular posts from this blog

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD report

IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING IN PUBLIC CLOUD ABSTRACT More and more clients would like to store their data to PCS (public cloud servers) along with the rapid development of cloud computing. New security problems have to be solved in order to help more clients process their data in public cloud. When the client is restricted to access PCS, he will delegate its proxy to process his data and upload them. On the other hand, remote data integrity checking is also an important security problem in public cloud storage. It makes the clients check whether their outsourced data is kept intact without downloading the whole data. From the security problems, we propose a novel proxy-oriented data uploading and remote data integrity checking model in identity-based public key cryptography: IDPUIC (identity-based proxy-oriented data uploading and remote data integrity checking in public cloud). We give the formal definition, system model and se

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION

A LOCALITY SENSITIVE LOW-RANK MODEL FOR IMAGE TAG COMPLETION ABSTRACT Many visual applications have benefited from the outburst of web images, yet the imprecise and incomplete tags arbitrarily provided by users, as the thorn of the rose, may hamper the performance of retrieval or indexing systems relying on such data. In this paper, we propose a novel locality sensitive low-rank model for image tag completion, which approximates the global nonlinear model with a collection of local linear models. To effectively infuse the idea of locality sensitivity, a simple and effective pre-processing module is designed to learn suitable representation for data partition, and a global consensus regularizer is introduced to mitigate the risk of overfitting. Meanwhile, low-rank matrix factorization is employed as local models, where the local geometry structures are preserved for the low-dimensional representation of both tags and samples. Extensive empirical evaluations conducted on three

LIFI

LIFI Prof . Harald Haas is a technology of high brightness light emitting diodes(LED).It is bidirectional ,high speed and fully networked wireless communication.    LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices. However, LiFi bulbs are outfitted with a   chip   that modulates the light imperceptibly for optical data transmission. LiFi data is transmitted by the LED bulbs and received by photoreceptors. LiFi's early developmental models were capable of 150 megabits-per-second ( Mbps ). Some commercial kits enabling that speed have been released. In the lab, with stronger LEDs and different technology, researchers have enabled 10   gigabits -per-second (Gbps), which is faster than   802.11ad .  Benefits of LiFi: ·         Higher speeds than  Wi-Fi . ·         10000 times the frequency  spectrum  of radio. ·         More secure because data cannot be intercepted without a clear line of si