IEEE 2014 DOTNET PROJECTS 
1) Max-Weight Scheduling in Queuing Networks With Heavy-Tailed Traffic – 
Network and Communication Systems – C# 
2) A Frequent Term Based Text Clustering Approach Using Novel Similarity 
Measure – Data Mining and Knowledge Discovery – Microsoft.NET 
3) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage – 
Data Mining and Cloud Computing – Microsoft.NET 
4) Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud 
Storage – Cloud Computing - Microsoft.NET 
5) An Empirical Performance Evaluation of Relational Keyword Search Systems– 
Data Mining – Microsoft.NET 
6) Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage – 
Cloud Computing - Microsoft.NET 
7) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks 
– Network and Mobile Computing - Microsoft.NET 
8) Privacy-PreservingOptimalMeetingLocationDeterminationOnMobileDevices – 
Networking and Mobile Computing - Microsoft.NET 
9) Control Flow-Based Malware Variant Detection – Network Security - 
Microsoft.NET 
10) Content Based Image Retrieval Systems – Image Processing - Microsoft.NET 
11) Secure Outsourced Attribute Based Signatures – Secure Computing and Cloud 
Computing - Microsoft.NET 
12) Dealing with Concept Drifts in Process Mining – Process Mining and Data 
Mining - Microsoft.NET 
13) Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale 
Utility Cloud– Secure Computing and Cloud Computing - Microsoft.NET 
14) A Two-Level Topic Model Towards Knowledge Discovery from Citation 
Networks– Process Mining and Data Mining - Microsoft.NET 
15) Supporting Privacy Protection in Personalized Web Search– Process Mining 
and Data Mining - Microsoft.NET 
16) Data Mining With Big Data 
17) Building Confidential and Efficient Query Services in the Cloud with RASP 
Data Perturbation 
18) Accuracy-Constrained Privacy-Preserving Access Control Mechanism for 
Relational Data 
19) Governing Software Process Improvements in Globally Distributed Product 
Development 
20) Exploiting Service Similarity for Privacy in Location-Based Search Queries
21. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud 
Storage Theory and Implementation 
22. Optimal Power Allocation for MIMO Fully Cooperative Relay Broadcast 
Channels 
23. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data 
24. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust 
Establishment in Delay-Tolerant Networks 
25. Dynamic Trust Management for Delay Tolerant Networks and Its Application 
to Secure Routing 
26. An Error-Minimizing Framework for Localizing Jammers in Wireless 
Networks 
27. Efficient Neighbour Discovery in Mobile Opportunistic Networking Using 
Mobility Awareness 
28. Building a Scalable System for Stealthy P2P-Botnet Detection 
29. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud 
Computing 
30. Oruta Privacy- Preserving Public Auditing for Shared Data in the Cloud 
31. Defending Against Collaborative Attacks By Malicious Nodes In Manets A 
Cooperative Bait Detection Approach 
32. Toward Integrated Scene Text Reading 
33. OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data 
Linkage 
IEEE 2014 JAVA PROJECTS 
01) Green Networking with Packet Processing Engines: Modeling and 
Optimization 
02) Hierarchical String Cuts: A Translation, Rotation, Scale, and Mirror Invariant 
Descriptor for Fast Shape Retrieval 
03) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 
04) A Highly Secure Video Steganography using Hamming Code (7, 4) 
05) A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and 
Image In painting 
06) A Survey of Intrusion Detection Systems in Wireless Sensor Networks 
07) Automated Graph Regularized Projective Nonnegative Matrix Factorization for
Document Clustering 
08) Behavioral Malware Detection in Delay Tolerant Networks 
09) Bounding the Advantage of Multicast Network Coding in General Network 
Models 
10) Cipher Ray: Exposing Cryptographic Operations and Transient Secrets from 
Monitored Binary Execution 
11) Exploiting Service Similarity for Privacy in Location Based Search Queries 
12) Image Quality Assessment for Fake Biometric Detection: Application to Iris, 
Fingerprint, and Face Recognition 
13) Streaming Solutions for Fine-Grained Network Traffic Measurements and 
Analysis– Networking - JAVA SWINGS 
14) An Overview of Information Hiding in H.264/AVC Compressed Video 
15) Transformation-Based Monetary Cost Optimizations for Worktops in the 
Cloud

Ieee 2014 completd dotnet java projects

  • 1.
    IEEE 2014 DOTNETPROJECTS 1) Max-Weight Scheduling in Queuing Networks With Heavy-Tailed Traffic – Network and Communication Systems – C# 2) A Frequent Term Based Text Clustering Approach Using Novel Similarity Measure – Data Mining and Knowledge Discovery – Microsoft.NET 3) Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage – Data Mining and Cloud Computing – Microsoft.NET 4) Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage – Cloud Computing - Microsoft.NET 5) An Empirical Performance Evaluation of Relational Keyword Search Systems– Data Mining – Microsoft.NET 6) Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage – Cloud Computing - Microsoft.NET 7) Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks – Network and Mobile Computing - Microsoft.NET 8) Privacy-PreservingOptimalMeetingLocationDeterminationOnMobileDevices – Networking and Mobile Computing - Microsoft.NET 9) Control Flow-Based Malware Variant Detection – Network Security - Microsoft.NET 10) Content Based Image Retrieval Systems – Image Processing - Microsoft.NET 11) Secure Outsourced Attribute Based Signatures – Secure Computing and Cloud Computing - Microsoft.NET 12) Dealing with Concept Drifts in Process Mining – Process Mining and Data Mining - Microsoft.NET 13) Analysis, Modeling and Simulation of Workload Patterns in a Large-Scale Utility Cloud– Secure Computing and Cloud Computing - Microsoft.NET 14) A Two-Level Topic Model Towards Knowledge Discovery from Citation Networks– Process Mining and Data Mining - Microsoft.NET 15) Supporting Privacy Protection in Personalized Web Search– Process Mining and Data Mining - Microsoft.NET 16) Data Mining With Big Data 17) Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation 18) Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data 19) Governing Software Process Improvements in Globally Distributed Product Development 20) Exploiting Service Similarity for Privacy in Location-Based Search Queries
  • 2.
    21. Enabling DataIntegrity Protection in Regenerating-Coding-Based Cloud Storage Theory and Implementation 22. Optimal Power Allocation for MIMO Fully Cooperative Relay Broadcast Channels 23. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data 24. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks 25. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing 26. An Error-Minimizing Framework for Localizing Jammers in Wireless Networks 27. Efficient Neighbour Discovery in Mobile Opportunistic Networking Using Mobility Awareness 28. Building a Scalable System for Stealthy P2P-Botnet Detection 29. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 30. Oruta Privacy- Preserving Public Auditing for Shared Data in the Cloud 31. Defending Against Collaborative Attacks By Malicious Nodes In Manets A Cooperative Bait Detection Approach 32. Toward Integrated Scene Text Reading 33. OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage IEEE 2014 JAVA PROJECTS 01) Green Networking with Packet Processing Engines: Modeling and Optimization 02) Hierarchical String Cuts: A Translation, Rotation, Scale, and Mirror Invariant Descriptor for Fast Shape Retrieval 03) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System 04) A Highly Secure Video Steganography using Hamming Code (7, 4) 05) A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image In painting 06) A Survey of Intrusion Detection Systems in Wireless Sensor Networks 07) Automated Graph Regularized Projective Nonnegative Matrix Factorization for
  • 3.
    Document Clustering 08)Behavioral Malware Detection in Delay Tolerant Networks 09) Bounding the Advantage of Multicast Network Coding in General Network Models 10) Cipher Ray: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution 11) Exploiting Service Similarity for Privacy in Location Based Search Queries 12) Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition 13) Streaming Solutions for Fine-Grained Network Traffic Measurements and Analysis– Networking - JAVA SWINGS 14) An Overview of Information Hiding in H.264/AVC Compressed Video 15) Transformation-Based Monetary Cost Optimizations for Worktops in the Cloud