|  Home   |  Contact Us   |  Online Exam   |  Tech World   |  Jobs    |  Member Login
   Home    |    IEEE-2013 Dotenet Projects
   

Reference for students projects only - B.Sc,BCA,M.Sc,MCA,B.E,B.Tech,M.E,M.Tech
MOBILE COMPUTING - WIRELESS COMMUNICATIONS
1. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks.

      Mech : "Optimal Mobile Relay Configuration"

    View :Abstract Basepaper                
2. Vampire attacks:Draining life from wireless ad-hoc sensor networks.

    View :Abstract Basepaper                
3. Towards a Statistical Framework for Source Anonymity in Sensor Networks.

      Alg : "AR and AF"

    View :Abstract Basepaper                
4. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications.

      Phase 2 : "Scalable Mobile PresenceCloud with Communication Security"

      Alg : "Directed Buddy Search Algorithm"

    View :Abstract Basepaper                
5. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks.

      Phase 2 : "FindU : Profile Matching in Ssecure Multi-party Computation (SMC)"

      Alg : "Shamir secret sharing scheme Algorithm"

    View :Abstract Basepaper                
6. Distributed Cooperative Caching in Social Wireless Networks.

      Alg : "Split Cache object replacement policy,A distributed heuristic for object replacement in SWNETs"

    View :Abstract Basepaper                
7. Community-Aware Opportunistic Routing in Mobile Social Networks.

      Alg : "Community-Aware Opportunistic Routing (CAOR) algorithm "

    View :Abstract Basepaper                
8. Search Me If You Can Privacy-preserving Location Query Service.

    View :Abstract Basepaper                
9. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks.

    View :Abstract Basepaper                
10. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users.

    View :Abstract Basepaper                
SOFTWARE ENGINEERING
11. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud.

    View :Abstract Basepaper                
NETWORKING
12. Cross-Domain Privacy-Preserving Protocol for Cooperative Firewall Optimization.

    View :Abstract Basepaper                
13. Price Differentiation for Communication Networks.

    View :Abstract Basepaper                
14. Fault Node Recovery Algorithm for a Wireless Sensor Network.

    View :Abstract Basepaper                
15. On the Role of Mobility for Multi-message Gossip.

    View :Abstract Basepaper                
16. Topological Conditions for In-Network Stabilization of Dynamical Systems.

    View :Abstract Basepaper                
17. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks.

    View :Abstract Basepaper                
18. Participatory Privacy Enabling Privacy in Participatory Sensing.

      Mech : "Participatory Privacy"

    View :Abstract Basepaper                
19. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.

    View :Abstract Basepaper                
20. Access Policy Consolidation for Event Processing Systems.

    View :Abstract Basepaper                
21. Fully Anonymous Profile Matching in Mobile Social Networks.

      Phase 2 : "Secure and Logical Multiparty Computation (SMC) Profile Matching"

      Alg : "Homomorphic Encryption"

    View :Abstract Basepaper                
22. A Fast Re-Route Method.

    View :Abstract Basepaper                
23. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.

    View :Abstract Basepaper                
24. Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud Computing.

    View :Abstract Basepaper                
25. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks.

    View :Abstract Basepaper                
IMAGE PROCESSING - MULTIMEDIA
26. Understanding the External Links of Video Sharing Sites Measurement and Analysis.

    View :Abstract Basepaper                
27. Circular Reranking for Visual Search.

    View :Abstract Basepaper                
28. Super-Resolution-based Inpainting.

    View :Abstract Basepaper                
29. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.

      Alg : "Answer medium selection"

    View :Abstract Basepaper                
30. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords.

    View :Abstract Basepaper                
31. Bootstrapping Visual Categorization With Relevant Negatives.

    View :Abstract Basepaper                
32. An extended visual cryptography scheme without pixel expansion for halftone images.

    View :Abstract Basepaper                
33. Image Authentication Using Stochastic Diffusion.

    View :Abstract Basepaper                
34. Hierarchical Super-Resolution-Based Inpainting.

    View :Abstract Basepaper                
SECURE COMPUTING
35. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.

      Mech : "Branching program"

    View :Abstract Basepaper                
36.Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.

      Phase 2 : "MeetUp : Framework for constructing encounter-based social networks"

      Alg : "rusted Certification"

    View :Abstract Basepaper                
37.Two tales of privacy in online social networks.

      Mech : "surveillance problem,social privacy,institutional privacy"

    View :Abstract Basepaper                
38.Extracting Spread-Spectrum Hidden Data from Digital Media.

      Mech : "Multi-carrier spread-spectrum embedding,Steganography"

    View :Abstract Basepaper                
39.Utility-Privacy Tradeoff in Databases An Information-theoretic Approach.

      Mech : "Encryption & Decryption Algorithm"

    View :Abstract Basepaper                
40.TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensing.

      Alg : "Trajectory Graph Construction,Weight Construction Algorithm "

    View :Abstract Basepaper                
41. Craigslist Scams and Community Composition Investigating Online Fraud Victimization.

    View :Abstract Basepaper                
42. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.

    View :Abstract Basepaper                
43. SORT A Self-ORganizing Trust Model for Peer-to-Peer Systems.

    View :Abstract Basepaper                
44. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model.

    View :Abstract Basepaper                
45. NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.

    View :Abstract Basepaper                
46. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data.

    View :Abstract Basepaper                
47. Efficiently Outsourcing Multiparty Computation under Multiple Keys.

    View :Abstract Basepaper                
48. Security Using Colors and Armstrong Numbers.

    View :Abstract Basepaper                
49. Document Clustering for Forensic Analysis An Approach for Improving Computer Inspection.

    View :Abstract Basepaper                
50. On Inference-Proof View Processing of XML Documents.

    View :Abstract Basepaper                
51. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme.

    View :Abstract Basepaper                
CLOUD COMPUTING

For Abstract & Basepaper Mail Us : chennaisunday@gmail.com
51.Storing Shared Data on the Cloud via Security-Mediator.

    View :Abstract Basepaper                
52.Fault Tolerance Management in Cloud Computing A System-Level Perspective.

    View :Abstract Basepaper                
53.Supporting the Migration of Applications to the Cloud through a Decision Support System.

    View :Abstract Basepaper                
54.CloudFTP A Case Study of Migrating Traditional Applications to the Cloud.

    View :Abstract Basepaper                
55.A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT.

    View :Abstract Basepaper                
56.Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme.

    View :Abstract Basepaper                
57.Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.

    View :Abstract Basepaper                
58.A Log-based Approach to Make Digital Forensics Easier on Cloud Computing.

    View :Abstract Basepaper                
59.A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud.

    View :Abstract Basepaper                
60. Outsourcing Privacy-Preserving Social Networks to a Cloud.

    View :Abstract Basepaper                
61.Privacy-Preserving Public Auditing for Secure Cloud Storage.

    View :Abstract Basepaper                
62.Winds of Change From Vendor Lock-In to the Meta Cloud.

      Mech : "Migration From Cloud Service Provider To Another From Identifying Cheats Of Provider"

    View :Abstract Basepaper                
63.Cloud computing for mobile users can offloading compution save energy.

      Phase 2 : "Cloud based Energy Saving for Mobil User"

    View :Abstract Basepaper                
64.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.

      Alg : "SVC Algorithm"

    View :Abstract Basepaper                
65.Mining Contracts for Business Events and Temporal Constraints in Service Engagements.

      Phase 2 : "Knowledge Based Business Service Engagement Identification (KBS)"

      Alg : "Grammar Tree Pruning"

    View :Abstract Basepaper                
66.Collaboration in Multicloud Computing Environments: Framework and Security Issues.

      Phase 2 : “Proxy based Dynamic Data Outsourcing Multi clouds”

      Alg : "Geometric Data Perturbation"

    View :Abstract Basepaper                
PARALLEL AND DISTRIBUTED SYSTEMS
67. Message in a Sealed Bottle Privacy Preserving Friending in Social Networks.

    View :Abstract Basepaper                
68. Label-Embedding for Attribute-Based Classification.

    View :Abstract Basepaper                
69. Hint-based Execution of Workloads in Clouds with Nefeli.

    View :Abstract Basepaper                
70. Load Rebalancing for Distributed File Systems in Clouds.

    View :Abstract Basepaper                
71.QoS Ranking Prediction for Cloud Services.

    View :Abstract Basepaper                
72. IP-Geolocation Mapping for Moderately Connected Internet Regions.

    View :Abstract Basepaper                
73. Identity-Based Secure Distributed Data Storage Schemes.

    View :Abstract Basepaper                
74. Efficient Two-Server Password-Only Authenticated Key Exchange.

    View :Abstract Basepaper                
75. SocialTube P2P-assisted Video Sharing in Online Social Networks.

    View :Abstract Basepaper                
76. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System.

    View :Abstract Basepaper                
77. Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.

    View :Abstract Basepaper                
78. Priority-Based Consolidation of Parallel Workloads in the Cloud.

    View :Abstract Basepaper                
79. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.

    View :Abstract Basepaper                
80. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing.

    View :Abstract Basepaper                
81. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.

      Phase 2 : "Cost effective Privacy preserving for intermediate datasets on Cloud"

      Alg : "practical heuristic algorithm"

    View :Abstract Basepaper                
82. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment.

      Phase 2 : "Cloud on Dynamic Virtual Resource Allocation"

      Alg : "Skewness"

    View :Abstract Basepaper                
83. Towards Differential Query Services in Cost-Efficient Clouds.

      Mech : "Efficient Information Retrieval for Ranked Query (EIRQ),Aggregation and Distribution Layer (ADL)"

    View :Abstract Basepaper                
84. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks.

      Alg : "Static Route Algorithm"

    View :Abstract Basepaper                
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
85. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

      Alg : "Fast clustering-based feature selection algorithm"

    View :Abstract Basepaper                
86. CloudMoV: Cloud-based Mobile Social TV

    View :Abstract Basepaper                
87. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks

    View :Abstract Basepaper                
88.m-Privacy for Collaborative Data Publishing

      Alg : "Provider-Aware Algorithm"

    View :Abstract Basepaper                
89. Crowdsourcing Predictors of Behavioral Outcomes.

      Phase 2 : "Internet-based collaborative activity"

      Alg : "Crowdsourcing"

    View :Abstract Basepaper                
90. Spatial Approximate String Search.

      Alg : "Novel Adaptive Algorithm"

    View :Abstract Basepaper                
91. Facilitating Document Annotation Using Content And Querying Value.

      Mech : "Information Extraction"

    View :Abstract Basepaper                
92.Incentive Compatible Privacy-Preserving Data Analysis.

      Mech : "Key theorems,Association Rule Mining"

    View :Abstract Basepaper                
93.FoCUS Learning to Crawl Web Forums.

      Alg : "Index/thread URL detection,Page-flipping URL detection"

    View :Abstract Basepaper                
94.ROBUST MODULE BASED DATA MANAGEMENT.

      Mech : "Novel properties of robustness"

    View :Abstract Basepaper                
95.A Probabilistic Approach to String Transformation.

      Alg : "Aho-Corasick"

    View :Abstract Basepaper                
96.Comparable Entity Mining from Comparative Questions.

      Alg : "Bootstrapping algorithm"

    View :Abstract Basepaper                
97.Facilitating Effective User Navigation through Website Structure Improvement.

      Alg : "Mathematical Programming (MP) Model"

    View :Abstract Basepaper                
98.PMSE A Personalized Mobile Search Engine.

      Alg : "Naďve Bayes"

    View :Abstract Basepaper                
99.Fast Nearest Neighbor Search with Keywords.

      Mech : "Spatial Inverted Index"

    View :Abstract Basepaper                
100.Secure Mining of Association Rules in Horizontally Distributed Databases.

      Mech : "Unifying lists of locally Frequent Itemsets ,Kantarcioglu and Clifton"

    View :Abstract Basepaper                
101. A System to Filter Unwanted Messages from OSN User Walls.

      Mech : "Short Text Classifier"

    View :Abstract Basepaper                
102. Anomaly Detection via Online Oversampling Principal Component Analysis.

      Alg : "Online oversampling principal component analysis"

    View :Abstract Basepaper                
103. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia.

      Alg : "primal-dual algorithm "

    View :Abstract Basepaper                
104. A Data-Mining Model for Protection of FACTS-Based Transmission Line.

    View :Abstract Basepaper                
105. Sensitive Label Privacy Protection on Social Network Data.

    View :Abstract Basepaper                
106. Preventing Private Information Inference Attacks on Social Networks.

    View :Abstract Basepaper                
107. Privacy against Aggregate Knowledge Attacks.

    View :Abstract Basepaper                
108. Ranking on Data Manifold with Sink Points.

    View :Abstract Basepaper                
109. Secure Logging As a Service—Delegating Log Management to the Cloud.

    View :Abstract Basepaper                
110. SybilDefender Defend Against Sybil Attacks in Large Social Networks.

    View :Abstract Basepaper                
111. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining.

    View :Abstract Basepaper                
112. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases.

    View :Abstract Basepaper                
113. Improving Security and Efficiency in Attribute-Based Data Sharing.

    View :Abstract Basepaper                
114. Dynamic Personalized Recommendation on Sparse Data.

    View :Abstract Basepaper                
115. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases.

    View :Abstract Basepaper                
116. User Action Interpretation for Online Content Optimization.

    View :Abstract Basepaper                
117. Annotating Search Results from Web Databases.

    View :Abstract Basepaper                
118. A Survey of XML Tree Patterns.

    View :Abstract Basepaper                
119. Dynamic Query Forms for Database Queries.

    View :Abstract Basepaper                
120. A Learning Approach to SQL Query Results Ranking Using Skyline and Users’ Current Navigational Behavior.

    View :Abstract Basepaper                
121. Co-Occurrence-Based Diffusion for Expert Search on the Web.

    View :Abstract Basepaper                
122. Spatial Query Integrity with Voronoi Neighbors.

    View :Abstract Basepaper                
123. Anomaly Detection Approach Using Hidden Markov Model.

    View :Abstract Basepaper                
124. Efficient Evaluation of SUM Queries over Probabilistic Data.

    View :Abstract Basepaper                
125. Vickrey-Clarke-Groves for privacy-preserving collaborative classi?cation.

    View :Abstract Basepaper                
126. Efficient Evaluation of SUM Queries over Probabilistic Data.

    View :Abstract Basepaper                
127. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval.

    View :Abstract Basepaper                
128.Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks(2008).

    View :Abstract Basepaper                
129.A New Algorithm for Inferring User Search Goals with Feedback Sessions.

    View :Abstract Basepaper                
130.Online Search and Buying Behaviour in Consumer Markets.

    View :Abstract Basepaper                
131. Location Based Intelligent Mobile Organizer.(Using Android - 2011)

    View :Abstract Basepaper                
Online Projects Support
Android Application Demo
PROFESSIONAL REFERANCE
    Enterprise IT Training
    Interview Questions
    Technical Referance
    Placement Papers
    Inplant Training
ieee 2013 Latest Projects
    IEEE 2013 Projects
    IEEE 2012 Projects
    Software Application Projects
All Rights Reserved  :  SKdotcom Technologies