Dotnet IEEE Projects Titles – 2016-2017
LeMeniz Infotech
36, 100 feet Road, Natesan Nagar( Near Indira Gandhi Statue and Next to Fish-O-Fish),
Pondicherry-605 005
Web : www.ieeemaster.com / www.lemenizinfotech.com
Mail : info@lemenizinfotech.com / projects@lemenizinfotech.com
Phone : 9566355386 / 9962588976
S.No Title Year
IEEE based on CLOUD COMPUTING
1 AMTS: Adaptive multi-objective task scheduling strategy in cloud
computing
2016
2 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016
3 Security in Cloud-Computing-Based Mobile Health 2016
4 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016
5 CDA Generation and Integration for Health Information Exchange
Based on Cloud
2016
6 Model-Driven Development Patterns for Mobile Services in Cloud of
Things
2016
7 An anomalous behavior detection model in cloud computing 2016
8 Optimizing Cost for Online Social Networks on Geo-Distributed
Clouds
2016
9 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing 2016
10 A Modified Hierarchical Attribute-Based Encryption Access Control
Method for Mobile Cloud Computing
2016
11 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
2016
12 Online Resource Scheduling Under Concave Pricing for Cloud
Computing
2016
13 Dynamic Operations of Cloud Radio Access Networks (C-RAN) for
Mobile Cloud Computing
2016
14 CloudArmor: Supporting Reputation-Based Trust Management for
Cloud Services
2016
15 A Dynamical and Load-Balanced Flow Scheduling Approach for Big
Data Centers in Clouds Systems
2016
16 Analysis of classical encryption techniques in cloud computing 2016
17 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
Application to Cloud Email
2016
18 Identity-Based Proxy-Oriented Data Uploading and Remote Data
Integrity Checking in Public Cloud
2016
19 Dynamic Resource Partitioning for Heterogeneous Multi-Core-
BasedCloud Computing in Smart Cities
2016
20 Energy-efficient Adaptive Resource Management for Real-time
Vehicular Cloud Services
2016
21 An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing
2016
22 Encrypted Data Management with Deduplication in Cloud Computing 2016
23 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016
24 Online Resource Scheduling Under Concave Pricing for Cloud
Computing
2016
IEEE based on DATA MINING
1 A Survey on Trajectory Data Mining: Techniques and Applications 2016
2 Scalable Semi-Supervised Learning by Efficient Anchor Graph
Regularization
2016`
3 A Comprehensive Study on Willingness Maximization for Social
Activity Planning with Quality Guarantee
2016
4 Mining Graphs for Understanding Time-Varying Volumetric Data 2016
5 Location Aware Keyword Query Suggestion Based on Document
Proximity
2016
6 Cyberbullying Detection based on Semantic-Enhanced Marginalized
Denoising Auto-Encoder
2016
7 Resolving Multi-Party Privacy Conflicts in Social Media 2016
8 Pattern mining in linked data by edge-labeling 2016
9 Model of human knowledge extraction for a KBS using reasoning
cases
2016
10 Privacy-Preserving-Outsourced Association Rule Mining on Vertically
Partitioned Databases
2016
11 Cross-Platform Identification of Anonymous Identical Users in
Multiple Social Media Networks
2016
12 Mining User-Aware Rare Sequential Topic Patterns in Document
Streams
2016
13 Online Ensemble Learning of Data Streams with Gradually Evolved
Classes
2016
14 Top-k Dominating Queries on Incomplete Data 2016
15 Extracting Cross-Ontology Weighted Association Rules from Gene
Ontology Annotations
2016
16 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environment
2016
17 Mining Health Examination Records — A Graph-based Approach 2016
18 Computing Tools and Techniques for Emergency Response 2016
19 Pattern Based Sequence Classification 2016
20 Mining User-Aware Rare Sequential Topic Patterns in Document
Streams
2016
21 Rating Prediction based on Social Sentiment from Textual Reviews 2016
22 User Preference Learning for Online Social Recommendation 2016
23 Predicting Student Performance Using Personalized Analytics 2016
24 Automatically Mining Facets for Queries from Their Search Results 2016
25 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016
26 Object Discovery: Soft Attributed Graph Mining 2016
27 Classification-based Mining of Reusable Components on Software
Product Lines
2016
28 Fault Diagnosis of Multimode Processes Based on Similarities 2016
29 A Reversible Data Hiding Scheme Based on Code Division
Multiplexing
2016
30 Reversible Data Hiding in Encrypted Images With Distributed Source
Encoding
2016
31 Secure Reversible Image Data Hiding Over Encrypted Domain via Key
Modulation
2016
32 Automatically Mining Facets for Queries from Their Search Results 2016
IEEE based on NETWORK SECURITY
1 A Survey of Security in Software Defined Networks 2016
2 OpenSec: Policy-Based Security Using Software-Defined Networking
Security
2016
3 Cloud Belief Rule Base Model for Network Security Situation
Prediction
2016
4 On the vulnerabilities of Voronoi-based approaches to mobile sensor
Deployment
2016
5 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc
Networks
2016
6 Comprehensive survey on security services in vehicular ad-hoc
networks
2016
7 Collusion-resistant unidirectional proxy re-encryption scheme from
lattices
2016
8 Fast multi-pattern matching algorithm on compressed network traffic 2016
9 Bayes-based ARP attack detection algorithm for cloud centers 2016
IEEE based on WEB MINING
1 Web Service Personalized Quality of Service Prediction via
Reputation-Based Matrix Factorization
2016
2 Performance Evaluation of Transactional Composite Web Services 2016
3 Connecting Social Media to E-Commerce: Cold-Start Product
Recommendation Using Micro
2016
4 Social Friend Recommendation Based on Multiple Network
Correlation
2016
IEEE based on Secure computing
1 Secure Auditing and Deduplicating Data in Cloud 2016
2 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over
Encrypted Cloud Data
2016
3 A key-centric processor architecture for secure computing 2016
4 Efficient Anonymous Message Submission 2016
5 A Secure Management Scheme Designed in Cloud 2016
6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group
User Revocation
2016
7 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in
the Cloud
2016
8 Secure Auditing and Deduplicating Data in Cloud 2016
9 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over
Encrypted Cloud Data
2016
10 Secure access delegation of encrypted medical information 2016
11 Secure inter cloud data migration 2016
12 Group Key Agreement with Local Connectivity 2016
IEEE based on IMAGES PROCESSING
1 Blind Image Blur Estimation via Deep Learning 2016
2 Bitplane Image Coding With Parallel Coefficient Processing 2016
3 Automatic Design of Color Filter Arrays in the Frequency Domain 2016
4 Texture Classification Using Dense Micro-Block Difference 2016
5 Super-Resolution of Multi-Observed RGB-D Images Based on
Nonlocal Regression and Total Variation
2016
6 Image Segmentation Using Parametric Contours With Free Endpoints 2016
7 Analyzing the Effect of JPEG Compression on Local Variance of Image
Intensity
2016
8 Multi-Scale Patch-Based Image Restoration 2016
9 Image Sharpness Assessment by Sparse Representation 2016

Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017

  • 1.
    Dotnet IEEE ProjectsTitles – 2016-2017 LeMeniz Infotech 36, 100 feet Road, Natesan Nagar( Near Indira Gandhi Statue and Next to Fish-O-Fish), Pondicherry-605 005 Web : www.ieeemaster.com / www.lemenizinfotech.com Mail : info@lemenizinfotech.com / projects@lemenizinfotech.com Phone : 9566355386 / 9962588976 S.No Title Year IEEE based on CLOUD COMPUTING 1 AMTS: Adaptive multi-objective task scheduling strategy in cloud computing 2016 2 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 3 Security in Cloud-Computing-Based Mobile Health 2016 4 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 5 CDA Generation and Integration for Health Information Exchange Based on Cloud 2016 6 Model-Driven Development Patterns for Mobile Services in Cloud of Things 2016 7 An anomalous behavior detection model in cloud computing 2016
  • 2.
    8 Optimizing Costfor Online Social Networks on Geo-Distributed Clouds 2016 9 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing 2016 10 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2016 11 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2016 12 Online Resource Scheduling Under Concave Pricing for Cloud Computing 2016 13 Dynamic Operations of Cloud Radio Access Networks (C-RAN) for Mobile Cloud Computing 2016 14 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2016 15 A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds Systems 2016 16 Analysis of classical encryption techniques in cloud computing 2016 17 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 18 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016
  • 3.
    19 Dynamic ResourcePartitioning for Heterogeneous Multi-Core- BasedCloud Computing in Smart Cities 2016 20 Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services 2016 21 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 22 Encrypted Data Management with Deduplication in Cloud Computing 2016 23 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 24 Online Resource Scheduling Under Concave Pricing for Cloud Computing 2016 IEEE based on DATA MINING 1 A Survey on Trajectory Data Mining: Techniques and Applications 2016 2 Scalable Semi-Supervised Learning by Efficient Anchor Graph Regularization 2016` 3 A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee 2016 4 Mining Graphs for Understanding Time-Varying Volumetric Data 2016 5 Location Aware Keyword Query Suggestion Based on Document Proximity 2016
  • 4.
    6 Cyberbullying Detectionbased on Semantic-Enhanced Marginalized Denoising Auto-Encoder 2016 7 Resolving Multi-Party Privacy Conflicts in Social Media 2016 8 Pattern mining in linked data by edge-labeling 2016 9 Model of human knowledge extraction for a KBS using reasoning cases 2016 10 Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases 2016 11 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks 2016 12 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 13 Online Ensemble Learning of Data Streams with Gradually Evolved Classes 2016 14 Top-k Dominating Queries on Incomplete Data 2016 15 Extracting Cross-Ontology Weighted Association Rules from Gene Ontology Annotations 2016 16 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environment 2016
  • 5.
    17 Mining HealthExamination Records — A Graph-based Approach 2016 18 Computing Tools and Techniques for Emergency Response 2016 19 Pattern Based Sequence Classification 2016 20 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 21 Rating Prediction based on Social Sentiment from Textual Reviews 2016 22 User Preference Learning for Online Social Recommendation 2016 23 Predicting Student Performance Using Personalized Analytics 2016 24 Automatically Mining Facets for Queries from Their Search Results 2016 25 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 26 Object Discovery: Soft Attributed Graph Mining 2016 27 Classification-based Mining of Reusable Components on Software Product Lines 2016 28 Fault Diagnosis of Multimode Processes Based on Similarities 2016 29 A Reversible Data Hiding Scheme Based on Code Division Multiplexing 2016
  • 6.
    30 Reversible DataHiding in Encrypted Images With Distributed Source Encoding 2016 31 Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation 2016 32 Automatically Mining Facets for Queries from Their Search Results 2016 IEEE based on NETWORK SECURITY 1 A Survey of Security in Software Defined Networks 2016 2 OpenSec: Policy-Based Security Using Software-Defined Networking Security 2016 3 Cloud Belief Rule Base Model for Network Security Situation Prediction 2016 4 On the vulnerabilities of Voronoi-based approaches to mobile sensor Deployment 2016 5 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 6 Comprehensive survey on security services in vehicular ad-hoc networks 2016 7 Collusion-resistant unidirectional proxy re-encryption scheme from lattices 2016 8 Fast multi-pattern matching algorithm on compressed network traffic 2016
  • 7.
    9 Bayes-based ARPattack detection algorithm for cloud centers 2016 IEEE based on WEB MINING 1 Web Service Personalized Quality of Service Prediction via Reputation-Based Matrix Factorization 2016 2 Performance Evaluation of Transactional Composite Web Services 2016 3 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Micro 2016 4 Social Friend Recommendation Based on Multiple Network Correlation 2016 IEEE based on Secure computing 1 Secure Auditing and Deduplicating Data in Cloud 2016 2 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 3 A key-centric processor architecture for secure computing 2016 4 Efficient Anonymous Message Submission 2016 5 A Secure Management Scheme Designed in Cloud 2016 6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 2016
  • 8.
    7 A SecureAnti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 8 Secure Auditing and Deduplicating Data in Cloud 2016 9 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 10 Secure access delegation of encrypted medical information 2016 11 Secure inter cloud data migration 2016 12 Group Key Agreement with Local Connectivity 2016 IEEE based on IMAGES PROCESSING 1 Blind Image Blur Estimation via Deep Learning 2016 2 Bitplane Image Coding With Parallel Coefficient Processing 2016 3 Automatic Design of Color Filter Arrays in the Frequency Domain 2016 4 Texture Classification Using Dense Micro-Block Difference 2016 5 Super-Resolution of Multi-Observed RGB-D Images Based on Nonlocal Regression and Total Variation 2016 6 Image Segmentation Using Parametric Contours With Free Endpoints 2016
  • 9.
    7 Analyzing theEffect of JPEG Compression on Local Variance of Image Intensity 2016 8 Multi-Scale Patch-Based Image Restoration 2016 9 Image Sharpness Assessment by Sparse Representation 2016