SlideShare a Scribd company logo
1 of 7
NS2 Academy +91 9970186685
IEEE 2015-2016 DOTNET PROJECTS
#150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41.
020-24394323, 9970186685
www.ns2academy.in E-Mail: info@ns2academy.in
S3001 - DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
Elastic distortion of fingerprints is one of the major causes for false non-match. While
this problem affects all fingerprint recognition applications, it is especially dangerous in negative
recognition applications, such as watchlist and deduplication applications. In such applications,
malicious users may purposely distort their fingerprints to evade identification. In this paper, we
proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint
image. Distortion detection is viewed as a two-class classification problem, for which the
registered ridge orientation map and period map of a fingerprint are used as the feature vector
and a SVM classifier is trained to perform the classification task. Distortion rectification (or
equivalently distortion field estimation) is viewed as a regression problem, where the input is a
distorted fingerprint and the output is the distortion field. To solve this problem, a database
(called reference database) of various distorted reference fingerprints and corresponding
distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of
the input fingerprint is found in the reference database and the corresponding distortion field is
used to transform the input fingerprint into a normal one. Promising results have been obtained
on three databases containing many distorted fingerprints, namely FVC2004 DB1, Tsinghua
Distorted Fingerprint database, and the NIST SD27 latent fingerprint database.
S3002 - PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA
WITH GROUP USER REVOCATION
The advent of the cloud computing makes storage outsourcing becomes a rising trend,
which promotes the secure remote data auditing a hot topic that appeared in the research
literature. Recently some research considers the problem of secure and efficient public data
integrity auditing for shared dynamic data. However, these schemes are still not secure against
the collusion of cloud storage server and revoked group users during user revocation in practical
cloud storage system. In this paper, we figure out the collusion attack in the exiting scheme and
provide an efficient public integrity auditing scheme with secure group user revocation based on
vector commitment and verifier-local revocation group signature. We design a concrete scheme
based on our scheme definition. Our scheme supports the public checking and efficient user
revocation and also some nice properties, such as confidently, efficiency, countability and
NS2 Academy +91 9970186685
IEEE 2015-2016 DOTNET PROJECTS
#150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41.
020-24394323, 9970186685
www.ns2academy.in E-Mail: info@ns2academy.in
traceability of secure group user revocation. Finally, the security and experimental analysis show
that compared with its relevant schemes our scheme is also secure and efficient.
S3003 - KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP
DATA SHARING VIA CLOUD STORAGE
The capability of selectively sharing encrypted data with different users via public cloud
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key
challenge to designing such encryption schemes lies in the efficient management of encryption
keys. The desired flexibility of sharing any group of selected documents with any group of users
demands different encryption keys to be used for different documents. However, this also
implies the necessity of securely distributing to users a large number of keys for both encryption
and search, and those users will have to securely store the received keys, and submit an equally
large number of keyword trapdoors to the cloud in order to perform search over the shared data.
The implied need for secure communication, storage, and complexity clearly renders the
approach impractical. In this paper, we address this practical problem, which is largely neglected
in the literature, by proposing the novel concept of key aggregate searchable encryption (KASE)
and instantiating the concept through a concrete KASE scheme, in which a data owner only
needs to distribute a single key to a user for sharing a large number of documents, and the user
only needs to submit a single trapdoor to the cloud for querying the shared documents. The
security analysis and performance evaluation both confirm that our proposed schemes are
provably secure and practically efficient.
S3004 - A DYNAMIC SECURE GROUP SHARING FRAMEWORK IN PUBLIC CLOUD
COMPUTING
With the popularity of group data sharing in public cloud computing, the privacy and
security of group sharing data have become two major issues. The cloud provider cannot be
treated as a trusted third party because of its semi-trust nature, and thus the traditional security
models cannot be straightforwardly generalized into cloud based group sharing frameworks. In
this paper, we propose a novel secure group sharing framework for public cloud, which can
effectively take advantage of the cloud servers' help but have no sensitive data being exposed to
attackers and the cloud provider. The framework combines proxy signature, enhanced TGDH
NS2 Academy +91 9970186685
IEEE 2015-2016 DOTNET PROJECTS
#150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41.
020-24394323, 9970186685
www.ns2academy.in E-Mail: info@ns2academy.in
and proxy re-encryption together into a protocol. By applying the proxy signature technique, the
group leader can effectively grant the privilege of group management to one or more chosen
group members. The enhanced TGDH scheme enables the group to negotiate and update the
group key pairs with the help of cloud servers, which does not require all of the group members
been online all the time. By adopting proxy re-encryption, most computationally intensive
operations can be delegated to cloud servers without disclosing any private information.
Extensive security and performance analysis shows that our proposed scheme is highly efficient
and satisfies the security requirements for public cloud based secure group sharing.
S3005 - JOINT CONGESTION CONTROL AND ROUTING OPTIMIZATION: AN
EFFICIENT SECOND-ORDER DISTRIBUTED APPROACH
Distributed joint congestion control and routing optimization has received a significant
amount of attention recently. To date, however, most of the existing schemes follow a key idea
called the back-pressure algorithm. Despite having many salient features, the first-order sub
gradient nature of the back-pressure based schemes results in slow convergence and poor delay
performance. To overcome these limitations, in this paper, we make a first attempt at developing
a second-order joint congestion control and routing optimization framework that offers utility-
optimality, queue-stability, fast convergence, and low delay. Our contributions in this paper are
three-fold: i) we propose a new second-order joint congestion control and routing framework
based on a primal-dual interior-point approach; ii)we establish utility-optimality and queue-
stability of the proposed second-order method; and iii) we show how to implement the proposed
second-order method in a distributed fashion.
S3006 - FUZZY BASED ENERGY EFFICIENT MULTICAST ROUTING FOR AD-HOC
NETWORK
Ad-hoc network is an infrastructure less wireless network. Since ad-hoc networks are
self-organizing, rapidly deployable wireless networks, they are highly suitable for various
applications. Every nodes of ad-hoc network are connected dynamically in an arbitrary manner.
There is no default router available in this network because all nodes of this network behave as
routers and take part in discovery and maintenance of routes to other nodes. Ad-hoc nodes are
powered by batteries with limited capacity due to its distributed nature. Therefore energy
NS2 Academy +91 9970186685
IEEE 2015-2016 DOTNET PROJECTS
#150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41.
020-24394323, 9970186685
www.ns2academy.in E-Mail: info@ns2academy.in
consumption occurs due to sending a packet, receiving a packet and to select next hop node.
Hence, the present paper proposes a routing protocol, named Fuzzy Based Energy Efficient
Multicast Routing (FBEEMR) for ad-hoc network. The basic idea of FBEEMR is to select the
best path which reduces energy consumption of ad-hoc nodes based on fuzzy logic. This protocol
is mainly used to extend the lifetime of ad-hoc network with respect to energy efficient multicast
routing by calculating route lifetime values for each route. Based on the comprehensive
simulations and comparative study of same with other existing protocols, it is observed that
proposed routing protocol contributes to the performance improvements in terms of energy
efficiency.
S3007 - ENABLING CLOUD STORAGE AUDITING WITH KEY-EXPOSURE
RESISTANCE
Cloud storage auditing is viewed as an important service to verify the integrity of the data
in public cloud. Current auditing protocols are all based on the assumption that the client's secret
key for auditing is absolutely secure. However, such assumption may not always be held, due to
the possibly weak sense of security and/or low security settings at the client. If such a secret key
for auditing is exposed, most of the current auditing protocols would inevitably become unable
to work. In this paper, we focus on this new aspect of cloud storage auditing. We investigate how
to reduce the damage of the client's key exposure in cloud storage auditing, and give the first
practical solution for this new problem setting. We formalize the definition and the security
model of auditing protocol with key exposure resilience and propose such a protocol. In our
design, we employ the binary tree structure and the preorder traversal technique to update the
secret keys for the client. We also develop a novel authenticator construction to support the
forward security and the property of blockless verifiability. The security proof and the
performance analysis show that our proposed protocol is secure and efficient.
S3008 - A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER
AUTHORIZATION
Development of authorization mechanisms for secure information access by a large
community of users in an open environment is an important problem in the ever-growing Internet
world. In this paper we propose a computational dynamic trust model for user authorization,
NS2 Academy +91 9970186685
IEEE 2015-2016 DOTNET PROJECTS
#150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41.
020-24394323, 9970186685
www.ns2academy.in E-Mail: info@ns2academy.in
rooted in findings from social science. Unlike most existing computational trust models, this
model distinguishes trusting belief in integrity from that in competence in different contexts and
accounts for subjectivity in the evaluation of a particular trustee by different trusters. Simulation
studies were conducted to compare the performance of the proposed integrity belief model with
other trust models from the literature for different user behavior patterns. Experiments show that
the proposed model achieves higher performance than other models especially in predicting the
behavior of unstable users.
S3009 - CLOUDARMOR: SUPPORTING REPUTATION BASED TRUST
MANAGEMENT FOR CLOUD SERVICES
Trust management is one of the most challenging issues for the adoption and growth of
cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services
introduces several challenging issues such as privacy, security, and availability. Preserving
consumers’ privacy is not an easy task due to the sensitive information involved in the
interactions between consumers and the trust management service. Protecting cloud services
against their malicious users (e.g., such users might give misleading feedback to disadvantage a
particular cloud service) is a difficult problem. Guaranteeing the availability of the trust
management service is another significant challenge because of the dynamic nature of cloud
environments. In this article, we describe the design and implementation of CloudArmor, a
reputation-based trust management framework that provides a set of functionalities to deliver
Trust as a Service (TaaS), which includes i) a novel protocol to prove the credibility of trust
feedbacks and preserve users’ privacy, ii) an adaptive and robust credibility model for measuring
the credibility of trust feedbacks to protect cloud services from malicious users and to compare
the trustworthiness of cloud services, and iii) an availability model to manage the availability of
the decentralized implementation of the trust management service. The feasibility and benefits of
our approach have been validated by a prototype and experimental studies using a collection of
real-world trust feedbacks on cloud services.
S30010 - SERVING THE READERS OF SCHOLARLY DOCUMENTS: A GRAND
CHALLENGE FOR THE INTROSPECTIVE DIGITAL LIBRARY
NS2 Academy +91 9970186685
IEEE 2015-2016 DOTNET PROJECTS
#150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41.
020-24394323, 9970186685
www.ns2academy.in E-Mail: info@ns2academy.in
The scholarly literature produced by human civilization will soon be considered small
data, able to be portably conveyed by the network and carried on personal machines. This semi-
structured text centric knowledge base is a focus of attention for scholars, as the wealth of facts,
facets and connections in scholarly documents are large. Such machine analysis can derive
insights that can inform policy makers, academic and industrial management, as well as scholars
as authors themselves. There is another underserved community of scholarly document users that
has been overlooked: the readers themselves. I call for the community to put more efforts
towards supporting our own scholars (especially beginning scholars, new to the research process)
with automation from information retrieval and natural language processing. Techniques that
mine information from within the full text of a document could be used to introspect a digital
library's materials, inferring better search metadata, improving scholarly document
recommendation, and aiding the understanding of the text, figures, presentations and citations of
our scholarly literature. Such an introspective digital library will enable scholars to assemble an
understanding of other scholars' work more efficiently, and provide downstream machine
reading applications with input for their analytics.
S30011 - IMAGE INPAINTING BY MINIMUM ENERGY RESTORATION WITH
EDGE-PRIORITIZED FILLING ORDER
We propose a texture synthesis image inpainting method that minimizes energy function
with the filling order which facilitates propagation of edge from the data region to the target
region. As a result, the proposed method provides plausible restoration while propagating
information of edge for the target region. Experimental results show the validity of the proposed
method.
S30012 - ON LOCAL PREDICTION BASED REVERSIBLE WATERMARKING
The use of local prediction in difference expansion reversible watermarking provides
very good results, but at the cost of computing for each pixel a least square predictor in a square
block centered on the pixel. This correspondence investigates the reduction of the mathematical
complexity by computing distinct predictors not for pixels, but for groups of pixels. The same
predictors are recovered at detection. Experimental results for the case of prediction on the
rhombus defined by the four horizontal and vertical neighbors are provided. It is shown that by
NS2 Academy +91 9970186685
IEEE 2015-2016 DOTNET PROJECTS
#150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41.
020-24394323, 9970186685
www.ns2academy.in E-Mail: info@ns2academy.in
computing a predictor for a pair of pixels, the computational cost is halved without any loss in
performance. A small loss appears for groups of three and four pixels with the advantage of
reducing the mathematical complexity to a third and a fourth, respectively.
S30013 - LEARNING ANALYTICS SYSTEM FOR ASSESSING STUDENTS'
PERFORMANCE QUALITY AND TEXT MINING IN ONLINE COMMUNICATION
A challenging and demanding task for the teachers and researchers in e-learning
environments is the assessment of students' performance. This paper is to present a new Learning
analytics system for Learning Management Systems (LMS), that will aid and support teachers
and researchers to understand and analyze interaction patterns and knowledge construction of the
participants involved in ongoing online interactions. It is seamlessly integrated into Moodle.
Learning Management Systems (LMS) does not include analytics tool for comprehensive audit
logs of students' activities and log analysis capabilities interactions, also lack of good evaluation
of participatory level and support for assessment of students' performance quality on LMS.
Semantic similarity measures of text play an increasingly important role in text related research
and applications in tasks such as text mining, web page retrieval, and dialogue systems. Existing
methods for computing sentence similarity have been adopted from approaches used for
Messages texts in LMS. The system enables one to measure semantic similarity between texts
exchanged during communication sessions, in order to find out the degree of coherence in a
discussion tread. It is given as a value of relevance in numerical format.

More Related Content

What's hot

Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingSBGC
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...1crore projects
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDNaseem nisar
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsIRJET Journal
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsgagnertechnologies
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cseSBGC
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolCSCJournals
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...SBGC
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )SBGC
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...zettanetworks
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueIRJET Journal
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. IJCERT JOURNAL
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKijsrd.com
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsVijay Karan
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...cseij
 

What's hot (19)

Ieee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computingIeee projects-2014-java-cloud-computing
Ieee projects-2014-java-cloud-computing
 
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable D...
 
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUDKEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD
 
Survey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in CloudsSurvey on Data Security with Time Constraint in Clouds
Survey on Data Security with Time Constraint in Clouds
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science students
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Ieee projects 2012 for cse
Ieee projects 2012 for cseIeee projects 2012 for cse
Ieee projects 2012 for cse
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud StorageAttribute-Based Encryption for Access of Secured Data in Cloud Storage
Attribute-Based Encryption for Access of Secured Data in Cloud Storage
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering Protocol
 
Ijariie1196
Ijariie1196Ijariie1196
Ijariie1196
 
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...IEEE Projects 2013 For ME Cse @  Seabirds ( Trichy, Thanjavur, Perambalur, Di...
IEEE Projects 2013 For ME Cse @ Seabirds ( Trichy, Thanjavur, Perambalur, Di...
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
 
VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...VTU Computer Science Engineering & Information Science Engineering Project Ti...
VTU Computer Science Engineering & Information Science Engineering Project Ti...
 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
 
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture. Secure Redundant Data Avoidance over Multi-Cloud Architecture.
Secure Redundant Data Avoidance over Multi-Cloud Architecture.
 
Improving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACKImproving Network Security in MANETS using IEEACK
Improving Network Security in MANETS using IEEACK
 
M.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing ProjectsM.Phil Computer Science Cloud Computing Projects
M.Phil Computer Science Cloud Computing Projects
 
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
Performance and Simulation Study of TheProposed Direct, Indirect Trust Distri...
 

Similar to Dotnet 2015 2016 2017 ieee project list-with abstract

Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudIRJET Journal
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET Journal
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netredpel dot com
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackeSAT Publishing House
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET Journal
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...IJECEIAES
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsVijay Karan
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...birdsking
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...IJECEIAES
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query ServiceIRJET Journal
 

Similar to Dotnet 2015 2016 2017 ieee project list-with abstract (20)

Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
 
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
IRJET - Efficient Public Key Cryptosystem for Scalable Data Sharing in Cloud ...
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot net
 
Secure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attackSecure and efficient handover authentication and detection of spoofing attack
Secure and efficient handover authentication and detection of spoofing attack
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...Security and risk analysis in the cloud with software defined networking arch...
Security and risk analysis in the cloud with software defined networking arch...
 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
Ieee projects-2014-bulk-ieee-projects-2015-title-list-for-me-be-mphil-final-y...
 
Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...Hierarchal attribute based cryptographic model to handle security services in...
Hierarchal attribute based cryptographic model to handle security services in...
 
50620130101004
5062013010100450620130101004
50620130101004
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
Privacy Preserving Location Query Service
Privacy Preserving Location Query ServicePrivacy Preserving Location Query Service
Privacy Preserving Location Query Service
 

More from Adz91 Digital Ads Pvt Ltd

Java project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsJava project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsAdz91 Digital Ads Pvt Ltd
 
Adz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 Digital Ads Pvt Ltd
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingAdz91 Digital Ads Pvt Ltd
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015Adz91 Digital Ads Pvt Ltd
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Adz91 Digital Ads Pvt Ltd
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search Adz91 Digital Ads Pvt Ltd
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Adz91 Digital Ads Pvt Ltd
 
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Adz91 Digital Ads Pvt Ltd
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Adz91 Digital Ads Pvt Ltd
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Adz91 Digital Ads Pvt Ltd
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Adz91 Digital Ads Pvt Ltd
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Adz91 Digital Ads Pvt Ltd
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Adz91 Digital Ads Pvt Ltd
 
Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Adz91 Digital Ads Pvt Ltd
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process mining Dealing with concept drifts in process mining
Dealing with concept drifts in process mining Adz91 Digital Ads Pvt Ltd
 

More from Adz91 Digital Ads Pvt Ltd (20)

2016 ieee java .net project titles
2016 ieee java .net project titles2016 ieee java .net project titles
2016 ieee java .net project titles
 
Java project ideas topics for computer engineering students
Java project ideas topics for computer engineering studentsJava project ideas topics for computer engineering students
Java project ideas topics for computer engineering students
 
Adz91 business opportunity presentation
Adz91 business opportunity presentationAdz91 business opportunity presentation
Adz91 business opportunity presentation
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
 
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
BE/ ME / MTech / BTech Computer Engineering Project titles IEEE 2014 IEEE 2015
 
Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy Xs path navigation on xml schemas made easy
Xs path navigation on xml schemas made easy
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption Securing broker less publish subscribe systems using identity-based encryption
Securing broker less publish subscribe systems using identity-based encryption
 
Secure outsourced attribute based signatures
Secure outsourced attribute based signatures Secure outsourced attribute based signatures
Secure outsourced attribute based signatures
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
Preserving location privacy in geo social applications
Preserving location privacy in geo social applications Preserving location privacy in geo social applications
Preserving location privacy in geo social applications
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation Mining weakly labeled web facial images for search based face annotation
Mining weakly labeled web facial images for search based face annotation
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...Decentralized access control of data stored in cloud using key policy attribu...
Decentralized access control of data stored in cloud using key policy attribu...
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process mining Dealing with concept drifts in process mining
Dealing with concept drifts in process mining
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

Dotnet 2015 2016 2017 ieee project list-with abstract

  • 1. NS2 Academy +91 9970186685 IEEE 2015-2016 DOTNET PROJECTS #150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41. 020-24394323, 9970186685 www.ns2academy.in E-Mail: info@ns2academy.in S3001 - DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition applications, such as watchlist and deduplication applications. In such applications, malicious users may purposely distort their fingerprints to evade identification. In this paper, we proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint image. Distortion detection is viewed as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to perform the classification task. Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. To solve this problem, a database (called reference database) of various distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input fingerprint is found in the reference database and the corresponding distortion field is used to transform the input fingerprint into a normal one. Promising results have been obtained on three databases containing many distorted fingerprints, namely FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27 latent fingerprint database. S3002 - PUBLIC INTEGRITY AUDITING FOR SHARED DYNAMIC CLOUD DATA WITH GROUP USER REVOCATION The advent of the cloud computing makes storage outsourcing becomes a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some research considers the problem of secure and efficient public data integrity auditing for shared dynamic data. However, these schemes are still not secure against the collusion of cloud storage server and revoked group users during user revocation in practical cloud storage system. In this paper, we figure out the collusion attack in the exiting scheme and provide an efficient public integrity auditing scheme with secure group user revocation based on vector commitment and verifier-local revocation group signature. We design a concrete scheme based on our scheme definition. Our scheme supports the public checking and efficient user revocation and also some nice properties, such as confidently, efficiency, countability and
  • 2. NS2 Academy +91 9970186685 IEEE 2015-2016 DOTNET PROJECTS #150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41. 020-24394323, 9970186685 www.ns2academy.in E-Mail: info@ns2academy.in traceability of secure group user revocation. Finally, the security and experimental analysis show that compared with its relevant schemes our scheme is also secure and efficient. S3003 - KEY-AGGREGATE SEARCHABLE ENCRYPTION (KASE) FOR GROUP DATA SHARING VIA CLOUD STORAGE The capability of selectively sharing encrypted data with different users via public cloud storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key challenge to designing such encryption schemes lies in the efficient management of encryption keys. The desired flexibility of sharing any group of selected documents with any group of users demands different encryption keys to be used for different documents. However, this also implies the necessity of securely distributing to users a large number of keys for both encryption and search, and those users will have to securely store the received keys, and submit an equally large number of keyword trapdoors to the cloud in order to perform search over the shared data. The implied need for secure communication, storage, and complexity clearly renders the approach impractical. In this paper, we address this practical problem, which is largely neglected in the literature, by proposing the novel concept of key aggregate searchable encryption (KASE) and instantiating the concept through a concrete KASE scheme, in which a data owner only needs to distribute a single key to a user for sharing a large number of documents, and the user only needs to submit a single trapdoor to the cloud for querying the shared documents. The security analysis and performance evaluation both confirm that our proposed schemes are provably secure and practically efficient. S3004 - A DYNAMIC SECURE GROUP SHARING FRAMEWORK IN PUBLIC CLOUD COMPUTING With the popularity of group data sharing in public cloud computing, the privacy and security of group sharing data have become two major issues. The cloud provider cannot be treated as a trusted third party because of its semi-trust nature, and thus the traditional security models cannot be straightforwardly generalized into cloud based group sharing frameworks. In this paper, we propose a novel secure group sharing framework for public cloud, which can effectively take advantage of the cloud servers' help but have no sensitive data being exposed to attackers and the cloud provider. The framework combines proxy signature, enhanced TGDH
  • 3. NS2 Academy +91 9970186685 IEEE 2015-2016 DOTNET PROJECTS #150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41. 020-24394323, 9970186685 www.ns2academy.in E-Mail: info@ns2academy.in and proxy re-encryption together into a protocol. By applying the proxy signature technique, the group leader can effectively grant the privilege of group management to one or more chosen group members. The enhanced TGDH scheme enables the group to negotiate and update the group key pairs with the help of cloud servers, which does not require all of the group members been online all the time. By adopting proxy re-encryption, most computationally intensive operations can be delegated to cloud servers without disclosing any private information. Extensive security and performance analysis shows that our proposed scheme is highly efficient and satisfies the security requirements for public cloud based secure group sharing. S3005 - JOINT CONGESTION CONTROL AND ROUTING OPTIMIZATION: AN EFFICIENT SECOND-ORDER DISTRIBUTED APPROACH Distributed joint congestion control and routing optimization has received a significant amount of attention recently. To date, however, most of the existing schemes follow a key idea called the back-pressure algorithm. Despite having many salient features, the first-order sub gradient nature of the back-pressure based schemes results in slow convergence and poor delay performance. To overcome these limitations, in this paper, we make a first attempt at developing a second-order joint congestion control and routing optimization framework that offers utility- optimality, queue-stability, fast convergence, and low delay. Our contributions in this paper are three-fold: i) we propose a new second-order joint congestion control and routing framework based on a primal-dual interior-point approach; ii)we establish utility-optimality and queue- stability of the proposed second-order method; and iii) we show how to implement the proposed second-order method in a distributed fashion. S3006 - FUZZY BASED ENERGY EFFICIENT MULTICAST ROUTING FOR AD-HOC NETWORK Ad-hoc network is an infrastructure less wireless network. Since ad-hoc networks are self-organizing, rapidly deployable wireless networks, they are highly suitable for various applications. Every nodes of ad-hoc network are connected dynamically in an arbitrary manner. There is no default router available in this network because all nodes of this network behave as routers and take part in discovery and maintenance of routes to other nodes. Ad-hoc nodes are powered by batteries with limited capacity due to its distributed nature. Therefore energy
  • 4. NS2 Academy +91 9970186685 IEEE 2015-2016 DOTNET PROJECTS #150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41. 020-24394323, 9970186685 www.ns2academy.in E-Mail: info@ns2academy.in consumption occurs due to sending a packet, receiving a packet and to select next hop node. Hence, the present paper proposes a routing protocol, named Fuzzy Based Energy Efficient Multicast Routing (FBEEMR) for ad-hoc network. The basic idea of FBEEMR is to select the best path which reduces energy consumption of ad-hoc nodes based on fuzzy logic. This protocol is mainly used to extend the lifetime of ad-hoc network with respect to energy efficient multicast routing by calculating route lifetime values for each route. Based on the comprehensive simulations and comparative study of same with other existing protocols, it is observed that proposed routing protocol contributes to the performance improvements in terms of energy efficiency. S3007 - ENABLING CLOUD STORAGE AUDITING WITH KEY-EXPOSURE RESISTANCE Cloud storage auditing is viewed as an important service to verify the integrity of the data in public cloud. Current auditing protocols are all based on the assumption that the client's secret key for auditing is absolutely secure. However, such assumption may not always be held, due to the possibly weak sense of security and/or low security settings at the client. If such a secret key for auditing is exposed, most of the current auditing protocols would inevitably become unable to work. In this paper, we focus on this new aspect of cloud storage auditing. We investigate how to reduce the damage of the client's key exposure in cloud storage auditing, and give the first practical solution for this new problem setting. We formalize the definition and the security model of auditing protocol with key exposure resilience and propose such a protocol. In our design, we employ the binary tree structure and the preorder traversal technique to update the secret keys for the client. We also develop a novel authenticator construction to support the forward security and the property of blockless verifiability. The security proof and the performance analysis show that our proposed protocol is secure and efficient. S3008 - A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user authorization,
  • 5. NS2 Academy +91 9970186685 IEEE 2015-2016 DOTNET PROJECTS #150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41. 020-24394323, 9970186685 www.ns2academy.in E-Mail: info@ns2academy.in rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in integrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters. Simulation studies were conducted to compare the performance of the proposed integrity belief model with other trust models from the literature for different user behavior patterns. Experiments show that the proposed model achieves higher performance than other models especially in predicting the behavior of unstable users. S3009 - CLOUDARMOR: SUPPORTING REPUTATION BASED TRUST MANAGEMENT FOR CLOUD SERVICES Trust management is one of the most challenging issues for the adoption and growth of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud services introduces several challenging issues such as privacy, security, and availability. Preserving consumers’ privacy is not an easy task due to the sensitive information involved in the interactions between consumers and the trust management service. Protecting cloud services against their malicious users (e.g., such users might give misleading feedback to disadvantage a particular cloud service) is a difficult problem. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of cloud environments. In this article, we describe the design and implementation of CloudArmor, a reputation-based trust management framework that provides a set of functionalities to deliver Trust as a Service (TaaS), which includes i) a novel protocol to prove the credibility of trust feedbacks and preserve users’ privacy, ii) an adaptive and robust credibility model for measuring the credibility of trust feedbacks to protect cloud services from malicious users and to compare the trustworthiness of cloud services, and iii) an availability model to manage the availability of the decentralized implementation of the trust management service. The feasibility and benefits of our approach have been validated by a prototype and experimental studies using a collection of real-world trust feedbacks on cloud services. S30010 - SERVING THE READERS OF SCHOLARLY DOCUMENTS: A GRAND CHALLENGE FOR THE INTROSPECTIVE DIGITAL LIBRARY
  • 6. NS2 Academy +91 9970186685 IEEE 2015-2016 DOTNET PROJECTS #150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41. 020-24394323, 9970186685 www.ns2academy.in E-Mail: info@ns2academy.in The scholarly literature produced by human civilization will soon be considered small data, able to be portably conveyed by the network and carried on personal machines. This semi- structured text centric knowledge base is a focus of attention for scholars, as the wealth of facts, facets and connections in scholarly documents are large. Such machine analysis can derive insights that can inform policy makers, academic and industrial management, as well as scholars as authors themselves. There is another underserved community of scholarly document users that has been overlooked: the readers themselves. I call for the community to put more efforts towards supporting our own scholars (especially beginning scholars, new to the research process) with automation from information retrieval and natural language processing. Techniques that mine information from within the full text of a document could be used to introspect a digital library's materials, inferring better search metadata, improving scholarly document recommendation, and aiding the understanding of the text, figures, presentations and citations of our scholarly literature. Such an introspective digital library will enable scholars to assemble an understanding of other scholars' work more efficiently, and provide downstream machine reading applications with input for their analytics. S30011 - IMAGE INPAINTING BY MINIMUM ENERGY RESTORATION WITH EDGE-PRIORITIZED FILLING ORDER We propose a texture synthesis image inpainting method that minimizes energy function with the filling order which facilitates propagation of edge from the data region to the target region. As a result, the proposed method provides plausible restoration while propagating information of edge for the target region. Experimental results show the validity of the proposed method. S30012 - ON LOCAL PREDICTION BASED REVERSIBLE WATERMARKING The use of local prediction in difference expansion reversible watermarking provides very good results, but at the cost of computing for each pixel a least square predictor in a square block centered on the pixel. This correspondence investigates the reduction of the mathematical complexity by computing distinct predictors not for pixels, but for groups of pixels. The same predictors are recovered at detection. Experimental results for the case of prediction on the rhombus defined by the four horizontal and vertical neighbors are provided. It is shown that by
  • 7. NS2 Academy +91 9970186685 IEEE 2015-2016 DOTNET PROJECTS #150/2B, 2nd Floor, Ganesh Complex, Lane No 26A, Ganesh Nagar, Dhayari, Pune, 41. 020-24394323, 9970186685 www.ns2academy.in E-Mail: info@ns2academy.in computing a predictor for a pair of pixels, the computational cost is halved without any loss in performance. A small loss appears for groups of three and four pixels with the advantage of reducing the mathematical complexity to a third and a fourth, respectively. S30013 - LEARNING ANALYTICS SYSTEM FOR ASSESSING STUDENTS' PERFORMANCE QUALITY AND TEXT MINING IN ONLINE COMMUNICATION A challenging and demanding task for the teachers and researchers in e-learning environments is the assessment of students' performance. This paper is to present a new Learning analytics system for Learning Management Systems (LMS), that will aid and support teachers and researchers to understand and analyze interaction patterns and knowledge construction of the participants involved in ongoing online interactions. It is seamlessly integrated into Moodle. Learning Management Systems (LMS) does not include analytics tool for comprehensive audit logs of students' activities and log analysis capabilities interactions, also lack of good evaluation of participatory level and support for assessment of students' performance quality on LMS. Semantic similarity measures of text play an increasingly important role in text related research and applications in tasks such as text mining, web page retrieval, and dialogue systems. Existing methods for computing sentence similarity have been adopted from approaches used for Messages texts in LMS. The system enables one to measure semantic similarity between texts exchanged during communication sessions, in order to find out the degree of coherence in a discussion tread. It is given as a value of relevance in numerical format.