SlideShare a Scribd company logo
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
CODE 
TITLE 
DESCRIPTION 
IEEE 2013 - NETWORKING 
DNW01 
Buffer Management for Aggregated Streaming Data with Packet Dependencies 
Networking, Buffer management, First In First Out (FIFO), Switch And 
Router Architecture, Quality Of Service (QOS). 
DNW02 
Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks 
Networking, Distributed Denial of Service (DDOS), Hash, Queue, and 
Vulnerability, Malicious. 
DNW03 
New Framework Architecture for Next 
Generation e-Health Services 
Networking, Question And Answer Systems, Online Social Networks, Peer 
- Peer. 
DNW04 
SOS: A Distributed Mobile Q&A System Based on Social Networks 
Networking, Fuzzy Logic Control, Quality Of Service (QOS), Robustness, Traffic Management, Anna University Result Site. 
DNW05 
Behavioral Malware Detection in 
Delay Tolerant Networks 
Networking, BOTNET, Delay Tolerant Networks (DTN), Bayesian Filtering, Behavioral Malware Characterization. 
DNW06 
Scaling up publish/subscribe overlays using interest correlation for link sharing 
Networking, Publish And Subscribe, Scalability, Link Sharing, Interest 
Correlation, Subscription Clustering. 
DNW07 
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System 
Networking, Resource Allocation, Convex Optimization, Prediction Error 
Tolerance, Payment Minimization 
DNW08 
A System for Denial-of-Service Attack Detection Based on Multi variate Correlation Analysis 
Networking, Denial-of-Service Attack (DDOS), Network Traffic 
Characterization, Multi variate Correlations, Triangle Area. 
DNW09 
Load Rebalancing for Distributed File 
Systems in Clouds 
Networking, Cloud Computing, Load Balance, Distributed File Systems, Replica Management.
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2013 
NETWORKING 
CODE 
TITLE 
DESCRIPTION 
DNW10 
Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in DTN. 
Networking, Security, Misbehavior Detection, Delay Tolerant Network 
(DTN). 
DNW11 
Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks 
Networking, Encounter Based Routing, Delay Tolerant Network (DTN), Multi Copy Routing Protocols. 
DDM01 
Web System Upgrading with Transaction Failure and Strategic Customers 
Data Mining, Web Service, Online Retailing, Strategic Customers, Technology Adoption, Transaction Failure. 
IEEE 2013 - DATA MINING 
DDM02 
Formal Usability Constraints Model for Watermarking of Outsourced Datasets 
Data Mining, Security, Data Usability, Knowledge Preserving, Right 
Protection, Watermarking Datasets. 
DDM03 
Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development 
Data Mining, Event Detection, Social Sensor, Twitter Social Network, Location Estimation, Earthquake. 
DDM04 
System to Filter Unwanted Messages from OSN User Walls 
Data Mining, Face book Social Network, Unwanted Information Filtering, Text Categorization, Policy based Personalization. 
DDM05 
Supporting Search-As-You-Type 
Using SQL in Databases 
Data Mining, Fuzzy Search, Search Engine, Search-As-You-Type, SQL. 
DDM06 
A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia 
Data Mining, Biomedical, Wikipedia, Survival Modeling, Rerank, Thesaurus, Search Engine. 
DDM07 
Efficient Semi supervised MEDLINE Document Clustering With Mesh- Semantic and Global-Content Constraints 
Data Mining, Biomedical, Text Mining, Document Clustering, Semi 
Supervised Clustering, Spectral Clustering.
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
CODE 
TITLE 
DESCRIPTION 
IEEE 2013 - DATA MINING 
DDM10 
Using Artificial Intelligence to Improve 
Hospital Inpatient Care* 
Data Mining, Artificial Intelligence, Electronic Health Records (EHR), Clinical Decision Support Systems. 
DDM11 
Multiparty Access Control for Online S o c i a l N e t w o r k s : M o d e l a n d Mechanisms 
Data Mining, Security, Face book, Multiparty Access Control, Security 
Model, Policy Specification and Management 
DDM12 
Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates 
Data Mining, Data Privacy, Views, Query Answering, Null Values, View 
Updates, answer set programs, Database Repairs. 
DNS01 
Privacy Preserving Data Sharing With 
Anonymous ID Assignment 
Network Security, Cloud Computing, Data Mining, Privacy Preserving, Privacy Protection. 
IEEE 2013- NETWORK SECURITY 
DNS02 
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 
Network Security, Networking, Spoofing Attack, Attack Detection, Localization. 
DNS03 
Sybil Defender: A Defense Mechanism for Sybil Attacks in Large Social Networks 
Network Security, Networking, Sybil Attack, Social Network, Random 
Walk 
DNS04 
Anonymous and Distributed 
Community Cyber Incident Detection 
Network Security, Networking, Intrusion Detection, Information 
Sharing, DHT, Privacy, Anonymity. 
DNS05 
Towards Trustworthy Resource 
Scheduling in Clouds 
Network Security, Cloud Computing, Access Control, Information 
Security, Enterprise Resource Planning (ERP). 
DNS06 
A System for Timely and Controlled Information Sharing in Emergency Situations 
Network Security, Networking, Access Controls, Privacy, Security, Data 
Sharing.
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2013 
SOETWARE ENGINEERING 
IEEE 2013- CLOUD COMPUTING 
CODE 
TITLE 
DESCRIPTION 
DCC01 
Privacy-Preserving Public Auditing for 
Secure Cloud Storage 
Cloud Computing, Security, Data Storage, Privacy Preserving, Public 
Auditability, 
DCC02 
Optimal Multiserver Configuration for Profit Maximization in Cloud Computing 
Cloud Computing, Networking, Multiserver System, Service Level 
Agreement (SLA), Response Time, Waiting Time. 
DCC03 
Privacy Preserving Delegated Access 
Control in Public Clouds 
Cloud Computing, Security, Privacy, Access Control, Electronic Health 
Records (EHR), Encryption. 
DCC04 
Key-Aggregate Cryptosystem for 
Scalable Data Sharing in Cloud Storage 
Cloud Computing, Networking, Security, Data Sharing, Key-Aggregate 
Encryption, Patient-Controlled Encryption. 
DCC05 
Power-Aware Cloud Metering 
Cloud Computing, Smart Grid, Power Metering, Billing, Resource 
Management, Power Consumption Regulation 
DCC06 
An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing 
Cloud Computing, Networking, Distributed Systems, Reputation 
Management, DHT, Resource Management. 
DCC07 
QoS Ranking Prediction for Cloud 
Services 
Cloud Computing, Networking, Quality of Service (QOS), Ranking 
Prediction, Personalization 
DCC08 
Secure Logging As a Service — Delegating Log Management to the Cloud 
Cloud Computing, Security, Logging, Privacy, Log Management Service 
DCC09 
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud 
Cloud Computing, Networking, Security, Data Sharing, Privacy Preserving, Access Control, Dynamic Groups. 
DSW01 
Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler 
Software Engineering, Project Planning, Resource Allocation, Project 
Scheduling, Workload Assignment, Ant Colony Optimization.
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2013 
GRID COMPUTING 
IEEE 2013 
IMAGE PROCESSING 
IEEE 2013 - MOBILE COMPUTING 
IEEE 2013- SOETWARE ENGINEERING 
CODE 
TITLE 
DESCRIPTION 
DSW02 
A User-Centered Design Approach to 
Self-Service Ticket Vending Machines 
Software Engineering, User Experience, Metro Train Ticket, Self-service 
Ticket Vending Machines. 
DSW03 
A Machine Learning Approach to 
Software Requirements Prioritization 
Software Engineering, Machine Learning, Requirements Management  Prioritization. 
DSW04 
Resource Management for Complex, Dynamic Environments 
Software Engineering, Healthcare, Resources Management, Process 
Modeling. 
DSW01 
Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption 
Image Processing, Security, Reversible Data Hiding, Image Encryption, Privacy Protection. 
DSW02 
Mining User Queries with Markov Chains: Application to Online Image Retrieval 
Image Processing, Data Mining, Indexing, Image Annotation, Query 
Mining, Image Retrieval. 
DMC01 
CAM: Cloud-Assisted Privacy 
Preserving Mobile Health Monitoring 
Mobile Computing, Cloud Computing, Security, Healthcare, Key Private 
Proxy Re-Encryption, Mobile Health, Decryption. 
DMC02 
Vampire Attacks: Draining Life from 
Wireless Ad Hoc Sensor Networks 
Mobile Computing, Security, Denial Of Service, Routing, Ad Hoc Networks, WSN. 
DMC03 
ALERT: An Anonymous Location- Based Efficient Routing Protocol in MANETs 
Mobile Computing, MANETs, Anonymity, Routing Protocol, Geographical 
Routing. 
DGC01 
High Performance Resource Allocation Strategies for Computational Economies 
Grid Computing, Cloud Computing, Networking, Economic Resource 
Allocation, Utility Computing. 
DGC02 
On the Design of Mutually Aware Optimal Pricing and Load Balancing S t ra t e g i e s fo r G r i d C o m p u t i n g Systems 
Grid Computing, Networking, Pricing, Load Balancing, Cost, Revenue, Response Time.
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2012- NETWORKING 
IEEE 2013 - MULTIMEDIA 
CODE 
TITLE 
DESCRIPTION 
DMM01 
An Adaptive Cloud Downloading 
Service 
Multimedia, Cloud Computing, Networking, File Downloading, Helper, Peer – Peer. 
DMM02 
A Quantitative Model and Analysis of Information Confusion in Social Networks 
Multimedia, Networking, Social Networks, Information, Confusion, Aggression, Passiveness. 
DMM03 
Reversible Data Hiding With Optimal 
Value Transfer 
Multimedia, Distortion, Payload, Reversible Data Hiding. 
DNW01 
Discriminating DDOS Attacks From Flash Crowds Using Flow Correlation Coefficient 
In this paper, we present the Distributed Denial of Service (DDOS) attack is a critical threat to the Internet, and bonnets are usually the engines behind them. Sophisticated boot masters attempt to disable detectors by mimicking the traffic patterns of flash crowds. This poses a critical challenge to those who defend against DDOS attacks. 
DNW02 
Precise, Scalable, And Online Request Tracing For Multitier Services Of Black Boxes 
In this paper, we present a precise and scalable request tracing tool for online analysis of multitier services of black boxes. Our tool collects activity logs of multitier services through the kernel instrumentation, which can be enabled or disabled on demand. Through tolerating log losses, our System supports sampling or tracing on demand, 
DNW03 
Balancing The Trade-Offs Between Query Delay And Data Availability In Manetas 
In this paper, we propose schemes to balance the trade-offs between data availability and query delay under different system settings and requirements. Extensive simulation results show that the proposed schemes can achieve a balance between these two metrics and provide satisfying system performance. 
DNW04 
User-level implementations 
Of read-copy update 
n this paper we use the kernel-level implementations use facilities that are often unavailable to user applications. The few prior user-level RCU (Read- copy update) implementations either provided inefficient read-side primitives or Restricted the application architecture. 
DNW05 
Measure routing: A Framework For 
Routing Assisted Traffic Monitoring 
In this paper, We propose a new approach called Measure Routing to address this limitation. Measure Routing forwards network traffic across routes where it can be best monitored. Monitoring transit traffic at one or more points in a network is of interest to network operators for reasons of traffic accounting, debugging or troubleshooting, forensics, and traffic engineering. 
DNW06 
Optimal Construction Of All Shortest 
Node Disjoint Paths In Hypercube 
In this paper, by the aid of routing functions, m node-disjoint shortest paths from one source node to other m (not necessarily distinct) destination nodes are constructed in an – dimensional hypercube, provided the existence of such node-disjoint shortest paths which can be verified in time, where m <=n. 
DNW07 
O n M u l t i c o p y O p p o r t u n i s t i c F o r w a r d i n g P r o t o c o l s I n Nondeterministic Delay Tolerant Networks 
This paper presents two multi copy forwarding protocols, called optimal opportunistic forwarding (OOF) and OOF-, which maximize the expected delivery rate and minimize the expected delay, respectively, while requiring that the number of forwarding's per message does not exceed a certain threshold. Our contributions in this paper are summarized
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2012- NETWORKING 
IEEE 2012- DATA MINING 
CODE 
TITLE 
DESCRIPTION 
DNW07 
O n M u l t i c o p y O p p o r t u n i s t i c F o r w a r d i n g P r o t o c o l s I n N o n d e t e r m i n i s t i c D e l a y To l e r a n t Networks 
This paper presents two multi copy forwarding protocols, called optimal opportunistic forwarding (OOF) and OOF-, which maximize the expected delivery rate and minimize the expected delay, respectively, while requiring that the number of forwarding's per message does not exceed a certain threshold. Our contributions in this paper are summarized as follows 
DNW08 
Cod: A Distributed Publish/ Subscribe 
Framework For Rich Content Formats 
In this paper, we propose a content- based publish/subscribe (pub/sub) framework that delivers matching content to subscribers in their desired format. Such a framework enables the pub/sub system to accommodate richer content formats including multimedia publications with image and video content. 
DNW09 
Compression Of View On 
Anonymous Networks 
—Folded View— 
In this project, we present View is a labeled directed graph containing all information about the network that a party can learn by exchanging messages with its neighbors. View can be used to solve distributed problems on an anonymous network. This paper presents an algorithm that constructs views in a compressed form on an anonymous n-party 
DNW10 
A F r a m e w o r k F o r R o u t i n g Pe r fo r m a n c e A n a l ys i s I n D e l ay Tolerant Networks With Application To No cooperative Networks 
In this paper, we introduce a theoretical framework for analyzing routing performance in delay tolerant networks which is aimed at characterizing the exact distribution of the fundamental performance metrics described above, namely, packet delivery delay and communication cost. 
DNW11 
Receiving Buffer Adaptation For 
High-Speed Data Transfer 
In this paper, the buffer bottleneck we address refers to the receiving buffer for high-speed data transfer between two servers from two data centers. This buffer is a software buffer allocated from the memory at the receiver machine. Therefore, we could reallocate/deal locate the memory to dynamically adjust the buffer size. 
DNW12 
Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks 
This paper introduces a novel multi- copy routing protocol, called Self Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as Smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. 
DDM01 
A Probabilistic Scheme For Keyword- B a s e d I n c r e m e n t a l Q u e r y Construction 
This paper presents IQ (INCREMENTAL QUERY)—a novel Approach to bridge the gap between usability of keyword search and expressiveness of database Queries. IQ (INCREMENTAL QUERY) enables a user to start with an arbitrary keyword query and incrementally refine it into a structured query through an interactive interface. 
DDM02 
Horizontal Aggregations In Sal 
To Prepare Data Sets For Data 
This paper introduces a new class of aggregate functions that can be used to Build data sets in a horizontal layout, SQL query writing and extending SQL capabilities. We show evaluating horizontal An aggregation is a challenging and interesting problem and we introduce alternative methods and optimizations For their efficient evaluation. 
DDM03 
Continuous Top-K Dominating 
Queries 
This paper is the first study of top-k dominating query processing algorithms in a streaming environment. Efficient algorithms have been planned to answer top-k queries, skyline queries, and, more recently, top- k dominating Queries. 
DDM04 
A query formulation language 
For the data web 
This paper proposed a query formulation language, called Marshal. Retrieve all the titles, authors, and abstracts of the articles presented at the Semantic Web Conference that have a title that contains the word Semantic.
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2012- NETWORK SECURITY 
IEEE 2012- DATA MINING 
CODE 
TITLE 
DESCRIPTION 
DDM05 
A Unified Probabilistic Framework For Name Disambiguation In Digital Library 
In this paper, we will focus on Unsupervised learning for name disambiguation, but it is easy to incorporate some prior/supervise information into the model. 
DDM06 
Using Rule Ontology In Repeated Rule 
Acquisition From Similar Web Sites 
In this paper, we present Inferential rules are as essential to the Semantic Web applications as ontology. Therefore, rule acquisition is also an important issue, and the Web that implies inferential rules can be a major source of rule acquisition. We expect that it will be easier to acquire rules from a site by using similar rules of other sites in the same domain 
DDM07 
Scalable Scheduling Of Updates 
In Streaming Data Warehouses 
In this paper ,Online stock trading, where recent transactions generated by multiple stock exchanges are compared Against historical trends in nearly real time to identify profit opportunities. 
DDM08 
Achieving Data Privacy Through Secrecy Views And Null-Based Virtual Updates 
In this paper, we consider only conjunctive secrecy views and conjunctive queries. The semantics Of null-based virtual updates for data privacy that we provide is model- theoretic, in sense that the possible admissible instances after the update, the so-called secrecy instances, are defined and characterized. 
DDM09 
Multiparty Access Control For Online S o c i a l N e t w o r k s : M o d e l A n d Mechanisms 
In this paper, we have proposed a novel solution for collaborative Management of shared data in OSNs. A multiparty access control model was formulated, along with a multiparty policy specification scheme and corresponding policy Evaluation mechanism. 
DNS01 
Performance Modeling And 
Analysis Of Network Firewalls 
In this paper, we present an analytical queuing model developed for the study and analysis of the performance of Rule-based (also known as list- based) firewalls. Rule-based firewalls are the most widely deployed among other types of Firewalls. These features and measures include throughput, packet loss, packet delay, and Firewall's CPU utilization. 
DNS02 
Revisiting Defenses Against Large- Scale Online Password Guessing Attacks 
In this paper, we present paper, called Password Guessing Resistant Protocol (PGRP), significantly improves the security-usability trade-off, and Can be more generally deployed beyond browser-based Authentication. 
DNS03 
Persuasive Cued Click-Points: Design, Implementation, And Evaluation Of A Knowledge- Based Authentication Mechanism 
In this paper, we presents Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication Systems. 
DNS04 
Mitigating distributed denial of s e r v i c e a t t a c k s i n m u l t i p a r t y applications In the presence of clock drifts 
In this paper, we present an adaptive algorithm, HOPERAA, for enabling hopping in the presence of bounded asynchrony, namely, when the communicating parties have clocks with clock drifts. The solutions are simple, based on each client interacting with the server independently of the other clients, without the need of acknowledgments or time server. 
DNS05 
M-Score: A Misuse ability 
Weight Measure 
This paper present the new proposed access control mechanism, which we call Dynamic Misuse ability-Based Access Control, can be used to regulate user access to sensitive data stored in relational databases.
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2012 
SOFTWARE ENGINEERING 
IEEE 2012 
NETWORK SECURITY 
IEEE 2012 - CLOUD COMPUTING 
CODE 
TITLE 
DESCRIPTION 
DNS06 
Recommendation Models For 
Open Authorization 
In this paper, we present a novel browser extension (FB Secure) that Implements a proposed recommended - Based model, enables users to make important Privacy decisions at the time of third-party application installation. And integrates into the existing Oaths 2.0 authorization flow. 
DCC01 
Has be: A Hierarchical Attribute- Based Solution For Flexible And Scalable Access Control In 
Cloud Computing 
In this paper, we propose a hierarchical attribute-set-based encryption (HASBE) scheme for access control in cloud computing. HASBE extends the cipher text-policy attribute-set-based encryption (CP-ASBE, or ASBE for short) scheme. We introduced the HASBE scheme for realizing scalable, flexible, and fine-grained access control in cloud computing. 
DCC02 
E n h a n c e d p r i va c y i d : a d i re c t Anonymous attestation scheme with enhanced revocation capabilities 
In this paper, we develop a new scheme called Enhanced Privacy ID (EPID) that addresses the above limitations. EPID scheme can be seen as a new DAA (Direct Anonymous Attestation) scheme with enhanced revocation capabilities. We believe that with this enhanced revocation capability; 
DCC03 
A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding 
In this paper, we address the problem of forwarding data to another user by storage servers directly under the command of the data owner. We consider the system model that consists of distributed storage servers and key servers. Since storing cryptographic keys in a single device is risky, a user distributes his cryptographic key to key servers that shall perform 
DCC04 
Enabling Secure And Efficient Ranked Keyword Search Over Outsourced Cloud Data 
In this paper, as an initial attempt, we motivate and solve the problem of supporting efficient ranked keyword search for achieving effective utilization of remotely stored encrypted data in Cloud Computing. We first give a basic scheme and show that by following the same existing searchable encryption framework, it is very inefficient to achieve ranked search. 
DCC05 
Trustworthy Coordination Of Web 
Services Atomic Transactions 
In this paper, we have addressed the problem of trustworthy Coordination of Web Services Atomic Transactions. We have described a suite of protocols and mechanisms that protect the WS- AT services and infrastructure against Byzantine faults. 
DCC06 
Optimization Of Resource Provisioning Cost In Cloud Computing 
In this paper, minimizing both under provisioning and over provisioning problems under the demand and price uncertainty in cloud computing environments is our motivation to explore a resource provisioning strategy for Cloud consumers. In particular, an optimal cloud resource provisioning (OCRP) algorithm is proposed to minimize the total cost. 
DSW01 
Work Item Tagging: Communicating Concerns In Collaborative Software Development 
In this paper examines the current use of tags for task management in software development projects with the aim to identify potential tool enhancements. The tags are used to support finding of tasks and information exchange. Our findings indicate that lightweight informal tool support may play an important role in improving team-based software 
DSW02 
Resource Management For 
Complex, Dynamic Environments 
This paper, We propose an approach to define the general resource management problem, identify its major sub problem areas and their associated complexities, and look at the problem in the context of a particularly complex and dynamic environment. This work addresses all of these issues in the context of an overall unifying view of resource 
DSW03 
Exploiting The Essential Assumptions 
Of Analogy-Based Effort Estimation 
In this paper, we present Analogy- based estimation is a widely adopted problem solving method that has been evaluated and confirmed in software effort or cost estimation domains. The similarity measures between pairs of projects play a critical role in the analogy-based software effort estimation models. Such a model calculates a distance between the
DOTNET 
Contact: +91 9158547792 
Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com 
IEEE 2012 
MULTIMEDIA 
IEEE 2012 
GRID COMPUTING 
IEEE 2012 
IMAGE PROC ESSING 
IEEE 2012 - MOBILE COMPUTING 
CODE 
TITLE 
DESCRIPTION 
DSW01 
Removing Boundary Artifacts 
For Real-Time Iterated Shrinkage 
Deconvolution 
Large-scale P2Papplications. Finally, the authors design the key technique and security mechaIn this paper, we address the classical problem of deconvolution, i.e., to find the original image when we know an observed image blurred by a known blur kernel and degraded by An additive 
DSW02 
Scalable Coding Of Encrypted 
Images 
This paper proposes a novel scheme of scalable coding for encrypted images. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed 
When more bit streams are received. 
DMC01 
On Reliable Broadcast In Low Duty- Cycle Wireless Sensor Networks 
In this paper, we revisit the broadcast problem with active/dormant cycles. We show strong evidence that conventional broadcast approaches will suffer from severe performance degradation, and, under low duty cycles, they could easily fail to cover the whole network in an acceptable time frame. 
DMC02 
Moderated Group Authoring System 
For Campus-Wide Workgroups 
Our file system-based approach also allows group members to modify Any document type. We maintain one updatable copy of the shared content on each group member's Node. We also hoard read-only copies of each of these updatable copies in any interested group member's node. 
DMC03 
S m o o t h T r a d e - O f f s B e t w e e n Throughput And Delay In Mobile Ad Hoc Networks 
In this paper, we investigate the throughput capacity under a more practical restricted random mobility model, and attempt to provide a smooth trade-off between throughput and delay to fill the big gap existing in the literature. 
DMC04 
Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks 
In this paper, a novel Position-based Opportunistic Routing (POR) protocol is proposed, in which several forwarding candidates cache the packet that has been received. If the best forwarder does not forward the packet in certain time slots, sub optimal candidates will take turn to forward the packet according to a locally formed order. 
DGC01 
M e a s u r e m e n t - a w a r e m o n i t o r placement and routing: a joint optimization approach for Network- wide measurements 
In this paper, we propose an MPR (Measurement-aware Monitor Placement and Routing) framework that jointly optimizes monitor placement and traffic routing strategy, given traffic characteristics and monitor capacities as inputs. In our framework, the optimal routing strategy is determined for each flow set, 
DGC02 
Detecting And Resolving Firewall 
Policy Anomalies 
In this paper, we represent a novel anomaly management framework for firewalls based on a rule-based segmentation technique to facilitate not only more accurate anomaly Detection but also effective anomaly resolution. Based on this technique, a network packet space defined by a firewall policy can be divided into a set of disjoint packet space segments. 
DMM01 
Prototype-Based Image Search 
Reran king 
In this paper we address this challenge by recalling the fact that image search engines usually optimize the system performance based on the relevance measures, such as normalized discounted cumulative gain (NDCG), which tend to emphasize Differently on the results at different ranks. 
DMM02 
P r i va c y E n a b l e d D i g i t a l R i g h t s Management Without Trusted Third Party Assumption 
In this paper, we propose privacy enabled digital rights management mechanism without using the trusted third party assumption. The proposed mechanism supports both accountability and privacy simultaneously. We use simple cryptographic primitives such as blind decryption and hash Chain to construct the proposed system.

More Related Content

What's hot

Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
LeMeniz Infotech
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
Pvrtechnologies Nellore
 
G017424448
G017424448G017424448
G017424448
IOSR Journals
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
 
Towards secure cloud data management
Towards secure cloud data managementTowards secure cloud data management
Towards secure cloud data managementambitlick
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenThuan Ng
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computingAlexander Decker
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
Migrant Systems
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Nexgen Technology
 
Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data
Introduction of a New Non-Repudiation Service to Protect Sensitive Private DataIntroduction of a New Non-Repudiation Service to Protect Sensitive Private Data
Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data
IDES Editor
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29
IJSRED
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
paperpublications3
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
IJNSA Journal
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
IJET - International Journal of Engineering and Techniques
 
Review Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using MLReview Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using ML
ijtsrd
 
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
IJCI JOURNAL
 

What's hot (18)

Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
G017424448
G017424448G017424448
G017424448
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
Towards secure cloud data management
Towards secure cloud data managementTowards secure cloud data management
Towards secure cloud data management
 
Dynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyenDynamic access control sbc12 - thuan nguyen
Dynamic access control sbc12 - thuan nguyen
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data
Introduction of a New Non-Repudiation Service to Protect Sensitive Private DataIntroduction of a New Non-Repudiation Service to Protect Sensitive Private Data
Introduction of a New Non-Repudiation Service to Protect Sensitive Private Data
 
IJSRED-V2I1P29
IJSRED-V2I1P29IJSRED-V2I1P29
IJSRED-V2I1P29
 
Control Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based EncryptionControl Cloud Data Access Using Attribute-Based Encryption
Control Cloud Data Access Using Attribute-Based Encryption
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
 
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
 
Review Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using MLReview Paper on Predicting Network Attack Patterns in SDN using ML
Review Paper on Predicting Network Attack Patterns in SDN using ML
 
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSUREFUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
FUZZY FINGERPRINT METHOD FOR DETECTION OF SENSITIVE DATA EXPOSURE
 
Iw qo s09 (1)
Iw qo s09 (1)Iw qo s09 (1)
Iw qo s09 (1)
 

Viewers also liked

.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project....Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...Suresh Radhakrishnan
 
Software Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct ChenaiSoftware Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct Chenai
ncct
 
2 Sw Dot Net Project T Itles, Ieee 2009, Etc., Year 2009 2010
2   Sw   Dot Net Project T Itles, Ieee 2009, Etc., Year 2009   20102   Sw   Dot Net Project T Itles, Ieee 2009, Etc., Year 2009   2010
2 Sw Dot Net Project T Itles, Ieee 2009, Etc., Year 2009 2010
ncct
 
FEDT VB NET- Creating VB .Net Project
FEDT  VB  NET- Creating VB .Net Project FEDT  VB  NET- Creating VB .Net Project
FEDT VB NET- Creating VB .Net Project
Trinity Dwarka
 
Vb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year ProjectsVb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year Projects
ncct
 
Microsoft .Net Projects
Microsoft .Net ProjectsMicrosoft .Net Projects
Microsoft .Net Projects
Zealous System
 
Future of .NET - .NET on Non Windows Platforms
Future of .NET - .NET on Non Windows PlatformsFuture of .NET - .NET on Non Windows Platforms
Future of .NET - .NET on Non Windows Platforms
Aniruddha Chakrabarti
 
BE Final Year CSE, ECE, EEE, IT, IS Projects,Bangalore
BE Final Year CSE, ECE, EEE, IT, IS Projects,BangaloreBE Final Year CSE, ECE, EEE, IT, IS Projects,Bangalore
BE Final Year CSE, ECE, EEE, IT, IS Projects,Bangalore
IGEEKS TECHNOLOGIES
 
SEO for international multilingual projects
SEO for international multilingual projectsSEO for international multilingual projects
SEO for international multilingual projects
Ani Lopez
 
Latest mca projects
Latest mca projectsLatest mca projects
Latest mca projects
Gagnertech
 
Property dealing , A .net project
Property dealing , A .net projectProperty dealing , A .net project
Property dealing , A .net projectAnjali Kamboj
 
Be project ppt asp.net
Be project ppt asp.netBe project ppt asp.net
Be project ppt asp.net
Sanket Jagare
 
.Net and Windows Application Project on Hotel Management
.Net  and Windows Application Project on Hotel Management.Net  and Windows Application Project on Hotel Management
.Net and Windows Application Project on Hotel Management
Mujeeb Rehman
 
.NET and C# Introduction
.NET and C# Introduction.NET and C# Introduction
.NET and C# Introduction
Siraj Memon
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMNandasaba Wilson
 
Slideshare Project
Slideshare ProjectSlideshare Project
Slideshare Projectsuzrocky
 
Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...
Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...
Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...
Dan John
 

Viewers also liked (17)

.Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project....Net project titles 2011, Real time projects in .net, Java Final year project...
.Net project titles 2011, Real time projects in .net, Java Final year project...
 
Software Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct ChenaiSoftware Projects Asp.Net Java Ncct Chenai
Software Projects Asp.Net Java Ncct Chenai
 
2 Sw Dot Net Project T Itles, Ieee 2009, Etc., Year 2009 2010
2   Sw   Dot Net Project T Itles, Ieee 2009, Etc., Year 2009   20102   Sw   Dot Net Project T Itles, Ieee 2009, Etc., Year 2009   2010
2 Sw Dot Net Project T Itles, Ieee 2009, Etc., Year 2009 2010
 
FEDT VB NET- Creating VB .Net Project
FEDT  VB  NET- Creating VB .Net Project FEDT  VB  NET- Creating VB .Net Project
FEDT VB NET- Creating VB .Net Project
 
Vb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year ProjectsVb.Net Projects, Final Year Projects
Vb.Net Projects, Final Year Projects
 
Microsoft .Net Projects
Microsoft .Net ProjectsMicrosoft .Net Projects
Microsoft .Net Projects
 
Future of .NET - .NET on Non Windows Platforms
Future of .NET - .NET on Non Windows PlatformsFuture of .NET - .NET on Non Windows Platforms
Future of .NET - .NET on Non Windows Platforms
 
BE Final Year CSE, ECE, EEE, IT, IS Projects,Bangalore
BE Final Year CSE, ECE, EEE, IT, IS Projects,BangaloreBE Final Year CSE, ECE, EEE, IT, IS Projects,Bangalore
BE Final Year CSE, ECE, EEE, IT, IS Projects,Bangalore
 
SEO for international multilingual projects
SEO for international multilingual projectsSEO for international multilingual projects
SEO for international multilingual projects
 
Latest mca projects
Latest mca projectsLatest mca projects
Latest mca projects
 
Property dealing , A .net project
Property dealing , A .net projectProperty dealing , A .net project
Property dealing , A .net project
 
Be project ppt asp.net
Be project ppt asp.netBe project ppt asp.net
Be project ppt asp.net
 
.Net and Windows Application Project on Hotel Management
.Net  and Windows Application Project on Hotel Management.Net  and Windows Application Project on Hotel Management
.Net and Windows Application Project on Hotel Management
 
.NET and C# Introduction
.NET and C# Introduction.NET and C# Introduction
.NET and C# Introduction
 
PROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEMPROJECT REPORT_ONLINE VOTING SYSTEM
PROJECT REPORT_ONLINE VOTING SYSTEM
 
Slideshare Project
Slideshare ProjectSlideshare Project
Slideshare Project
 
Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...
Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...
Solved Cbse Class 12 Accountancy Full Project(Comprehensive Project, Ratio An...
 

Similar to Dot net projects

Java projects
Java projectsJava projects
Java projects
shahu2212
 
Java 2014 15
Java 2014 15Java 2014 15
Java 2014 15
shahu2212
 
2014 list
2014 list2014 list
2014 list
sai samba
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
IJCNCJournal
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
IJCNCJournal
 
Mca dotnet projects titles@ dreamweb techno solution trichy
Mca  dotnet projects titles@ dreamweb techno solution trichyMca  dotnet projects titles@ dreamweb techno solution trichy
Mca dotnet projects titles@ dreamweb techno solution trichy
ranjith kumar
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
ranjith kumar
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
ranjith kumar
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
ranjith kumar
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
ranjith kumar
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
ranjith kumar
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
ranjith kumar
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
ranjith kumar
 
Mca dotnet projects titles@ dreamweb techno solution trichy
Mca  dotnet projects titles@ dreamweb techno solution trichyMca  dotnet projects titles@ dreamweb techno solution trichy
Mca dotnet projects titles@ dreamweb techno solution trichy
ranjith kumar
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
ranjith kumar
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
ranjith kumar
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
ranjith kumar
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
ranjith kumar
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
ranjith kumar
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
ranjith kumar
 

Similar to Dot net projects (20)

Java projects
Java projectsJava projects
Java projects
 
Java 2014 15
Java 2014 15Java 2014 15
Java 2014 15
 
2014 list
2014 list2014 list
2014 list
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
 
Mca dotnet projects titles@ dreamweb techno solution trichy
Mca  dotnet projects titles@ dreamweb techno solution trichyMca  dotnet projects titles@ dreamweb techno solution trichy
Mca dotnet projects titles@ dreamweb techno solution trichy
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
 
Mca dotnet projects titles@ dreamweb techno solution trichy
Mca  dotnet projects titles@ dreamweb techno solution trichyMca  dotnet projects titles@ dreamweb techno solution trichy
Mca dotnet projects titles@ dreamweb techno solution trichy
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 

Dot net projects

  • 1. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com CODE TITLE DESCRIPTION IEEE 2013 - NETWORKING DNW01 Buffer Management for Aggregated Streaming Data with Packet Dependencies Networking, Buffer management, First In First Out (FIFO), Switch And Router Architecture, Quality Of Service (QOS). DNW02 Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks Networking, Distributed Denial of Service (DDOS), Hash, Queue, and Vulnerability, Malicious. DNW03 New Framework Architecture for Next Generation e-Health Services Networking, Question And Answer Systems, Online Social Networks, Peer - Peer. DNW04 SOS: A Distributed Mobile Q&A System Based on Social Networks Networking, Fuzzy Logic Control, Quality Of Service (QOS), Robustness, Traffic Management, Anna University Result Site. DNW05 Behavioral Malware Detection in Delay Tolerant Networks Networking, BOTNET, Delay Tolerant Networks (DTN), Bayesian Filtering, Behavioral Malware Characterization. DNW06 Scaling up publish/subscribe overlays using interest correlation for link sharing Networking, Publish And Subscribe, Scalability, Link Sharing, Interest Correlation, Subscription Clustering. DNW07 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Networking, Resource Allocation, Convex Optimization, Prediction Error Tolerance, Payment Minimization DNW08 A System for Denial-of-Service Attack Detection Based on Multi variate Correlation Analysis Networking, Denial-of-Service Attack (DDOS), Network Traffic Characterization, Multi variate Correlations, Triangle Area. DNW09 Load Rebalancing for Distributed File Systems in Clouds Networking, Cloud Computing, Load Balance, Distributed File Systems, Replica Management.
  • 2. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2013 NETWORKING CODE TITLE DESCRIPTION DNW10 Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in DTN. Networking, Security, Misbehavior Detection, Delay Tolerant Network (DTN). DNW11 Self-Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks Networking, Encounter Based Routing, Delay Tolerant Network (DTN), Multi Copy Routing Protocols. DDM01 Web System Upgrading with Transaction Failure and Strategic Customers Data Mining, Web Service, Online Retailing, Strategic Customers, Technology Adoption, Transaction Failure. IEEE 2013 - DATA MINING DDM02 Formal Usability Constraints Model for Watermarking of Outsourced Datasets Data Mining, Security, Data Usability, Knowledge Preserving, Right Protection, Watermarking Datasets. DDM03 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development Data Mining, Event Detection, Social Sensor, Twitter Social Network, Location Estimation, Earthquake. DDM04 System to Filter Unwanted Messages from OSN User Walls Data Mining, Face book Social Network, Unwanted Information Filtering, Text Categorization, Policy based Personalization. DDM05 Supporting Search-As-You-Type Using SQL in Databases Data Mining, Fuzzy Search, Search Engine, Search-As-You-Type, SQL. DDM06 A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia Data Mining, Biomedical, Wikipedia, Survival Modeling, Rerank, Thesaurus, Search Engine. DDM07 Efficient Semi supervised MEDLINE Document Clustering With Mesh- Semantic and Global-Content Constraints Data Mining, Biomedical, Text Mining, Document Clustering, Semi Supervised Clustering, Spectral Clustering.
  • 3. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com CODE TITLE DESCRIPTION IEEE 2013 - DATA MINING DDM10 Using Artificial Intelligence to Improve Hospital Inpatient Care* Data Mining, Artificial Intelligence, Electronic Health Records (EHR), Clinical Decision Support Systems. DDM11 Multiparty Access Control for Online S o c i a l N e t w o r k s : M o d e l a n d Mechanisms Data Mining, Security, Face book, Multiparty Access Control, Security Model, Policy Specification and Management DDM12 Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates Data Mining, Data Privacy, Views, Query Answering, Null Values, View Updates, answer set programs, Database Repairs. DNS01 Privacy Preserving Data Sharing With Anonymous ID Assignment Network Security, Cloud Computing, Data Mining, Privacy Preserving, Privacy Protection. IEEE 2013- NETWORK SECURITY DNS02 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Network Security, Networking, Spoofing Attack, Attack Detection, Localization. DNS03 Sybil Defender: A Defense Mechanism for Sybil Attacks in Large Social Networks Network Security, Networking, Sybil Attack, Social Network, Random Walk DNS04 Anonymous and Distributed Community Cyber Incident Detection Network Security, Networking, Intrusion Detection, Information Sharing, DHT, Privacy, Anonymity. DNS05 Towards Trustworthy Resource Scheduling in Clouds Network Security, Cloud Computing, Access Control, Information Security, Enterprise Resource Planning (ERP). DNS06 A System for Timely and Controlled Information Sharing in Emergency Situations Network Security, Networking, Access Controls, Privacy, Security, Data Sharing.
  • 4. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2013 SOETWARE ENGINEERING IEEE 2013- CLOUD COMPUTING CODE TITLE DESCRIPTION DCC01 Privacy-Preserving Public Auditing for Secure Cloud Storage Cloud Computing, Security, Data Storage, Privacy Preserving, Public Auditability, DCC02 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Cloud Computing, Networking, Multiserver System, Service Level Agreement (SLA), Response Time, Waiting Time. DCC03 Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing, Security, Privacy, Access Control, Electronic Health Records (EHR), Encryption. DCC04 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing, Networking, Security, Data Sharing, Key-Aggregate Encryption, Patient-Controlled Encryption. DCC05 Power-Aware Cloud Metering Cloud Computing, Smart Grid, Power Metering, Billing, Resource Management, Power Consumption Regulation DCC06 An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing Cloud Computing, Networking, Distributed Systems, Reputation Management, DHT, Resource Management. DCC07 QoS Ranking Prediction for Cloud Services Cloud Computing, Networking, Quality of Service (QOS), Ranking Prediction, Personalization DCC08 Secure Logging As a Service — Delegating Log Management to the Cloud Cloud Computing, Security, Logging, Privacy, Log Management Service DCC09 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Cloud Computing, Networking, Security, Data Sharing, Privacy Preserving, Access Control, Dynamic Groups. DSW01 Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler Software Engineering, Project Planning, Resource Allocation, Project Scheduling, Workload Assignment, Ant Colony Optimization.
  • 5. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2013 GRID COMPUTING IEEE 2013 IMAGE PROCESSING IEEE 2013 - MOBILE COMPUTING IEEE 2013- SOETWARE ENGINEERING CODE TITLE DESCRIPTION DSW02 A User-Centered Design Approach to Self-Service Ticket Vending Machines Software Engineering, User Experience, Metro Train Ticket, Self-service Ticket Vending Machines. DSW03 A Machine Learning Approach to Software Requirements Prioritization Software Engineering, Machine Learning, Requirements Management Prioritization. DSW04 Resource Management for Complex, Dynamic Environments Software Engineering, Healthcare, Resources Management, Process Modeling. DSW01 Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Image Processing, Security, Reversible Data Hiding, Image Encryption, Privacy Protection. DSW02 Mining User Queries with Markov Chains: Application to Online Image Retrieval Image Processing, Data Mining, Indexing, Image Annotation, Query Mining, Image Retrieval. DMC01 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Mobile Computing, Cloud Computing, Security, Healthcare, Key Private Proxy Re-Encryption, Mobile Health, Decryption. DMC02 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Mobile Computing, Security, Denial Of Service, Routing, Ad Hoc Networks, WSN. DMC03 ALERT: An Anonymous Location- Based Efficient Routing Protocol in MANETs Mobile Computing, MANETs, Anonymity, Routing Protocol, Geographical Routing. DGC01 High Performance Resource Allocation Strategies for Computational Economies Grid Computing, Cloud Computing, Networking, Economic Resource Allocation, Utility Computing. DGC02 On the Design of Mutually Aware Optimal Pricing and Load Balancing S t ra t e g i e s fo r G r i d C o m p u t i n g Systems Grid Computing, Networking, Pricing, Load Balancing, Cost, Revenue, Response Time.
  • 6. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2012- NETWORKING IEEE 2013 - MULTIMEDIA CODE TITLE DESCRIPTION DMM01 An Adaptive Cloud Downloading Service Multimedia, Cloud Computing, Networking, File Downloading, Helper, Peer – Peer. DMM02 A Quantitative Model and Analysis of Information Confusion in Social Networks Multimedia, Networking, Social Networks, Information, Confusion, Aggression, Passiveness. DMM03 Reversible Data Hiding With Optimal Value Transfer Multimedia, Distortion, Payload, Reversible Data Hiding. DNW01 Discriminating DDOS Attacks From Flash Crowds Using Flow Correlation Coefficient In this paper, we present the Distributed Denial of Service (DDOS) attack is a critical threat to the Internet, and bonnets are usually the engines behind them. Sophisticated boot masters attempt to disable detectors by mimicking the traffic patterns of flash crowds. This poses a critical challenge to those who defend against DDOS attacks. DNW02 Precise, Scalable, And Online Request Tracing For Multitier Services Of Black Boxes In this paper, we present a precise and scalable request tracing tool for online analysis of multitier services of black boxes. Our tool collects activity logs of multitier services through the kernel instrumentation, which can be enabled or disabled on demand. Through tolerating log losses, our System supports sampling or tracing on demand, DNW03 Balancing The Trade-Offs Between Query Delay And Data Availability In Manetas In this paper, we propose schemes to balance the trade-offs between data availability and query delay under different system settings and requirements. Extensive simulation results show that the proposed schemes can achieve a balance between these two metrics and provide satisfying system performance. DNW04 User-level implementations Of read-copy update n this paper we use the kernel-level implementations use facilities that are often unavailable to user applications. The few prior user-level RCU (Read- copy update) implementations either provided inefficient read-side primitives or Restricted the application architecture. DNW05 Measure routing: A Framework For Routing Assisted Traffic Monitoring In this paper, We propose a new approach called Measure Routing to address this limitation. Measure Routing forwards network traffic across routes where it can be best monitored. Monitoring transit traffic at one or more points in a network is of interest to network operators for reasons of traffic accounting, debugging or troubleshooting, forensics, and traffic engineering. DNW06 Optimal Construction Of All Shortest Node Disjoint Paths In Hypercube In this paper, by the aid of routing functions, m node-disjoint shortest paths from one source node to other m (not necessarily distinct) destination nodes are constructed in an – dimensional hypercube, provided the existence of such node-disjoint shortest paths which can be verified in time, where m <=n. DNW07 O n M u l t i c o p y O p p o r t u n i s t i c F o r w a r d i n g P r o t o c o l s I n Nondeterministic Delay Tolerant Networks This paper presents two multi copy forwarding protocols, called optimal opportunistic forwarding (OOF) and OOF-, which maximize the expected delivery rate and minimize the expected delay, respectively, while requiring that the number of forwarding's per message does not exceed a certain threshold. Our contributions in this paper are summarized
  • 7. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2012- NETWORKING IEEE 2012- DATA MINING CODE TITLE DESCRIPTION DNW07 O n M u l t i c o p y O p p o r t u n i s t i c F o r w a r d i n g P r o t o c o l s I n N o n d e t e r m i n i s t i c D e l a y To l e r a n t Networks This paper presents two multi copy forwarding protocols, called optimal opportunistic forwarding (OOF) and OOF-, which maximize the expected delivery rate and minimize the expected delay, respectively, while requiring that the number of forwarding's per message does not exceed a certain threshold. Our contributions in this paper are summarized as follows DNW08 Cod: A Distributed Publish/ Subscribe Framework For Rich Content Formats In this paper, we propose a content- based publish/subscribe (pub/sub) framework that delivers matching content to subscribers in their desired format. Such a framework enables the pub/sub system to accommodate richer content formats including multimedia publications with image and video content. DNW09 Compression Of View On Anonymous Networks —Folded View— In this project, we present View is a labeled directed graph containing all information about the network that a party can learn by exchanging messages with its neighbors. View can be used to solve distributed problems on an anonymous network. This paper presents an algorithm that constructs views in a compressed form on an anonymous n-party DNW10 A F r a m e w o r k F o r R o u t i n g Pe r fo r m a n c e A n a l ys i s I n D e l ay Tolerant Networks With Application To No cooperative Networks In this paper, we introduce a theoretical framework for analyzing routing performance in delay tolerant networks which is aimed at characterizing the exact distribution of the fundamental performance metrics described above, namely, packet delivery delay and communication cost. DNW11 Receiving Buffer Adaptation For High-Speed Data Transfer In this paper, the buffer bottleneck we address refers to the receiving buffer for high-speed data transfer between two servers from two data centers. This buffer is a software buffer allocated from the memory at the receiver machine. Therefore, we could reallocate/deal locate the memory to dynamically adjust the buffer size. DNW12 Self Adaptive Contention Aware Routing Protocol For Intermittently Connected Mobile Networks This paper introduces a novel multi- copy routing protocol, called Self Adaptive Utility-based Routing Protocol (SAURP), for Delay Tolerant Networks (DTNs) that are possibly composed of a vast number of devices in miniature such as Smart phones of heterogeneous capacities in terms of energy resources and buffer spaces. DDM01 A Probabilistic Scheme For Keyword- B a s e d I n c r e m e n t a l Q u e r y Construction This paper presents IQ (INCREMENTAL QUERY)—a novel Approach to bridge the gap between usability of keyword search and expressiveness of database Queries. IQ (INCREMENTAL QUERY) enables a user to start with an arbitrary keyword query and incrementally refine it into a structured query through an interactive interface. DDM02 Horizontal Aggregations In Sal To Prepare Data Sets For Data This paper introduces a new class of aggregate functions that can be used to Build data sets in a horizontal layout, SQL query writing and extending SQL capabilities. We show evaluating horizontal An aggregation is a challenging and interesting problem and we introduce alternative methods and optimizations For their efficient evaluation. DDM03 Continuous Top-K Dominating Queries This paper is the first study of top-k dominating query processing algorithms in a streaming environment. Efficient algorithms have been planned to answer top-k queries, skyline queries, and, more recently, top- k dominating Queries. DDM04 A query formulation language For the data web This paper proposed a query formulation language, called Marshal. Retrieve all the titles, authors, and abstracts of the articles presented at the Semantic Web Conference that have a title that contains the word Semantic.
  • 8. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2012- NETWORK SECURITY IEEE 2012- DATA MINING CODE TITLE DESCRIPTION DDM05 A Unified Probabilistic Framework For Name Disambiguation In Digital Library In this paper, we will focus on Unsupervised learning for name disambiguation, but it is easy to incorporate some prior/supervise information into the model. DDM06 Using Rule Ontology In Repeated Rule Acquisition From Similar Web Sites In this paper, we present Inferential rules are as essential to the Semantic Web applications as ontology. Therefore, rule acquisition is also an important issue, and the Web that implies inferential rules can be a major source of rule acquisition. We expect that it will be easier to acquire rules from a site by using similar rules of other sites in the same domain DDM07 Scalable Scheduling Of Updates In Streaming Data Warehouses In this paper ,Online stock trading, where recent transactions generated by multiple stock exchanges are compared Against historical trends in nearly real time to identify profit opportunities. DDM08 Achieving Data Privacy Through Secrecy Views And Null-Based Virtual Updates In this paper, we consider only conjunctive secrecy views and conjunctive queries. The semantics Of null-based virtual updates for data privacy that we provide is model- theoretic, in sense that the possible admissible instances after the update, the so-called secrecy instances, are defined and characterized. DDM09 Multiparty Access Control For Online S o c i a l N e t w o r k s : M o d e l A n d Mechanisms In this paper, we have proposed a novel solution for collaborative Management of shared data in OSNs. A multiparty access control model was formulated, along with a multiparty policy specification scheme and corresponding policy Evaluation mechanism. DNS01 Performance Modeling And Analysis Of Network Firewalls In this paper, we present an analytical queuing model developed for the study and analysis of the performance of Rule-based (also known as list- based) firewalls. Rule-based firewalls are the most widely deployed among other types of Firewalls. These features and measures include throughput, packet loss, packet delay, and Firewall's CPU utilization. DNS02 Revisiting Defenses Against Large- Scale Online Password Guessing Attacks In this paper, we present paper, called Password Guessing Resistant Protocol (PGRP), significantly improves the security-usability trade-off, and Can be more generally deployed beyond browser-based Authentication. DNS03 Persuasive Cued Click-Points: Design, Implementation, And Evaluation Of A Knowledge- Based Authentication Mechanism In this paper, we presents Persuasive Cued Click-Points graphical password scheme, including usability and security evaluations, and implementation considerations. An important usability goal for knowledge-based authentication Systems. DNS04 Mitigating distributed denial of s e r v i c e a t t a c k s i n m u l t i p a r t y applications In the presence of clock drifts In this paper, we present an adaptive algorithm, HOPERAA, for enabling hopping in the presence of bounded asynchrony, namely, when the communicating parties have clocks with clock drifts. The solutions are simple, based on each client interacting with the server independently of the other clients, without the need of acknowledgments or time server. DNS05 M-Score: A Misuse ability Weight Measure This paper present the new proposed access control mechanism, which we call Dynamic Misuse ability-Based Access Control, can be used to regulate user access to sensitive data stored in relational databases.
  • 9. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2012 SOFTWARE ENGINEERING IEEE 2012 NETWORK SECURITY IEEE 2012 - CLOUD COMPUTING CODE TITLE DESCRIPTION DNS06 Recommendation Models For Open Authorization In this paper, we present a novel browser extension (FB Secure) that Implements a proposed recommended - Based model, enables users to make important Privacy decisions at the time of third-party application installation. And integrates into the existing Oaths 2.0 authorization flow. DCC01 Has be: A Hierarchical Attribute- Based Solution For Flexible And Scalable Access Control In Cloud Computing In this paper, we propose a hierarchical attribute-set-based encryption (HASBE) scheme for access control in cloud computing. HASBE extends the cipher text-policy attribute-set-based encryption (CP-ASBE, or ASBE for short) scheme. We introduced the HASBE scheme for realizing scalable, flexible, and fine-grained access control in cloud computing. DCC02 E n h a n c e d p r i va c y i d : a d i re c t Anonymous attestation scheme with enhanced revocation capabilities In this paper, we develop a new scheme called Enhanced Privacy ID (EPID) that addresses the above limitations. EPID scheme can be seen as a new DAA (Direct Anonymous Attestation) scheme with enhanced revocation capabilities. We believe that with this enhanced revocation capability; DCC03 A Secure Erasure Code-Based Cloud Storage System With Secure Data Forwarding In this paper, we address the problem of forwarding data to another user by storage servers directly under the command of the data owner. We consider the system model that consists of distributed storage servers and key servers. Since storing cryptographic keys in a single device is risky, a user distributes his cryptographic key to key servers that shall perform DCC04 Enabling Secure And Efficient Ranked Keyword Search Over Outsourced Cloud Data In this paper, as an initial attempt, we motivate and solve the problem of supporting efficient ranked keyword search for achieving effective utilization of remotely stored encrypted data in Cloud Computing. We first give a basic scheme and show that by following the same existing searchable encryption framework, it is very inefficient to achieve ranked search. DCC05 Trustworthy Coordination Of Web Services Atomic Transactions In this paper, we have addressed the problem of trustworthy Coordination of Web Services Atomic Transactions. We have described a suite of protocols and mechanisms that protect the WS- AT services and infrastructure against Byzantine faults. DCC06 Optimization Of Resource Provisioning Cost In Cloud Computing In this paper, minimizing both under provisioning and over provisioning problems under the demand and price uncertainty in cloud computing environments is our motivation to explore a resource provisioning strategy for Cloud consumers. In particular, an optimal cloud resource provisioning (OCRP) algorithm is proposed to minimize the total cost. DSW01 Work Item Tagging: Communicating Concerns In Collaborative Software Development In this paper examines the current use of tags for task management in software development projects with the aim to identify potential tool enhancements. The tags are used to support finding of tasks and information exchange. Our findings indicate that lightweight informal tool support may play an important role in improving team-based software DSW02 Resource Management For Complex, Dynamic Environments This paper, We propose an approach to define the general resource management problem, identify its major sub problem areas and their associated complexities, and look at the problem in the context of a particularly complex and dynamic environment. This work addresses all of these issues in the context of an overall unifying view of resource DSW03 Exploiting The Essential Assumptions Of Analogy-Based Effort Estimation In this paper, we present Analogy- based estimation is a widely adopted problem solving method that has been evaluated and confirmed in software effort or cost estimation domains. The similarity measures between pairs of projects play a critical role in the analogy-based software effort estimation models. Such a model calculates a distance between the
  • 10. DOTNET Contact: +91 9158547792 Email: projects@candorminds.com, info@candorminds.com, www.candorminds.com IEEE 2012 MULTIMEDIA IEEE 2012 GRID COMPUTING IEEE 2012 IMAGE PROC ESSING IEEE 2012 - MOBILE COMPUTING CODE TITLE DESCRIPTION DSW01 Removing Boundary Artifacts For Real-Time Iterated Shrinkage Deconvolution Large-scale P2Papplications. Finally, the authors design the key technique and security mechaIn this paper, we address the classical problem of deconvolution, i.e., to find the original image when we know an observed image blurred by a known blur kernel and degraded by An additive DSW02 Scalable Coding Of Encrypted Images This paper proposes a novel scheme of scalable coding for encrypted images. Because of the hierarchical coding mechanism, the principal original content with higher resolution can be reconstructed When more bit streams are received. DMC01 On Reliable Broadcast In Low Duty- Cycle Wireless Sensor Networks In this paper, we revisit the broadcast problem with active/dormant cycles. We show strong evidence that conventional broadcast approaches will suffer from severe performance degradation, and, under low duty cycles, they could easily fail to cover the whole network in an acceptable time frame. DMC02 Moderated Group Authoring System For Campus-Wide Workgroups Our file system-based approach also allows group members to modify Any document type. We maintain one updatable copy of the shared content on each group member's Node. We also hoard read-only copies of each of these updatable copies in any interested group member's node. DMC03 S m o o t h T r a d e - O f f s B e t w e e n Throughput And Delay In Mobile Ad Hoc Networks In this paper, we investigate the throughput capacity under a more practical restricted random mobility model, and attempt to provide a smooth trade-off between throughput and delay to fill the big gap existing in the literature. DMC04 Toward Reliable Data Delivery For Highly Dynamic Mobile Ad Hoc Networks In this paper, a novel Position-based Opportunistic Routing (POR) protocol is proposed, in which several forwarding candidates cache the packet that has been received. If the best forwarder does not forward the packet in certain time slots, sub optimal candidates will take turn to forward the packet according to a locally formed order. DGC01 M e a s u r e m e n t - a w a r e m o n i t o r placement and routing: a joint optimization approach for Network- wide measurements In this paper, we propose an MPR (Measurement-aware Monitor Placement and Routing) framework that jointly optimizes monitor placement and traffic routing strategy, given traffic characteristics and monitor capacities as inputs. In our framework, the optimal routing strategy is determined for each flow set, DGC02 Detecting And Resolving Firewall Policy Anomalies In this paper, we represent a novel anomaly management framework for firewalls based on a rule-based segmentation technique to facilitate not only more accurate anomaly Detection but also effective anomaly resolution. Based on this technique, a network packet space defined by a firewall policy can be divided into a set of disjoint packet space segments. DMM01 Prototype-Based Image Search Reran king In this paper we address this challenge by recalling the fact that image search engines usually optimize the system performance based on the relevance measures, such as normalized discounted cumulative gain (NDCG), which tend to emphasize Differently on the results at different ranks. DMM02 P r i va c y E n a b l e d D i g i t a l R i g h t s Management Without Trusted Third Party Assumption In this paper, we propose privacy enabled digital rights management mechanism without using the trusted third party assumption. The proposed mechanism supports both accountability and privacy simultaneously. We use simple cryptographic primitives such as blind decryption and hash Chain to construct the proposed system.