Pages

Monday 1 December 2014


Final Year Projects in Chennai
DOT NET – IEEE TITLES 2014
SAKTHI SOFTWARE SOLUTIONS
RVR Towers, 1st Street, 3rd Main Road, Annanagar, Behind Nalli Silks, 
Chennai 600 040,Tel: 044-43016888 / 9710780469 Email: fresherfocus@gmail.com, sssprojects2013@gmail.com 
S.no
DOT NET – IEEE TITLES
DOMAIN
1
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
PARALLEL AND DISTRIBUTED SYSTEMS
2
An Error-Minimizing Framework for Localizing Jammers in Wireless Networks
PARALLEL AND DISTRIBUTED SYSTEMS
3
Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
PARALLEL AND DISTRIBUTED SYSTEMS
4
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
PARALLEL AND DISTRIBUTED SYSTEMS
5
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
PARALLEL AND DISTRIBUTED SYSTEMS
6
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
PARALLEL AND DISTRIBUTED SYSTEMS
7
Multicast Capacity in MANET with Infrastructure Support
PARALLEL AND DISTRIBUTED SYSTEMS
8
Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
PARALLEL AND DISTRIBUTED SYSTEMS
9
Transmission-Efficient Clustering Method for Wireless Sensor Networks Using Compressive Sensing
PARALLEL AND DISTRIBUTED SYSTEMS
10
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
PARALLEL AND DISTRIBUTED SYSTEMS
11
Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation
PARALLEL AND DISTRIBUTED SYSTEMS
12
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
PARALLEL AND DISTRIBUTED SYSTEMS
13
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
PARALLEL AND DISTRIBUTED SYSTEMS
14
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
PARALLEL AND DISTRIBUTED SYSTEMS
15
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
PARALLEL AND DISTRIBUTED SYSTEMS
16
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
SERVICES COMPUTING
17
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
SERVICES COMPUTING
18
Web Image Re-Ranking Using Query-Specific Semantic Signatures
PATTERN ANALYSIS
19
A Cocktail Approach for Travel Package Recommendation
KNOWLEDGE AND DATA ENGINEERING
20
LARS*: An Efficient and Scalable Location-Aware Recommender System
KNOWLEDGE AND DATA ENGINEERING
21
Product Aspect Ranking and Its Applications
KNOWLEDGE AND DATA ENGINEERING
22
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
KNOWLEDGE AND DATA ENGINEERING
23
Typicality-Based Collaborative Filtering Recommendation
KNOWLEDGE AND DATA ENGINEERING
24
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
KNOWLEDGE AND DATA ENGINEERING
25
An Empirical Performance Evaluation of Relational Keyword Search Techniques
KNOWLEDGE AND DATA ENGINEERING
26
Secure Mining of Association Rules in Horizontally Distributed Databases
KNOWLEDGE AND DATA ENGINEERING
27
Supporting Privacy Protection in Personalized Web Search
KNOWLEDGE AND DATA ENGINEERING
28
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks
MOBILE COMPUTING
29
Autonomous Mobile Mesh Networks
MOBILE COMPUTING
30
DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile Underwater Sensor Networks
MOBILE COMPUTING
31
Preserving Location Privacy in Geosocial Applications
MOBILE COMPUTING
32
Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs
MOBILE COMPUTING
33
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
INFORMATION FORENSICS AND SECURITY
34
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation
INFORMATION FORENSICS AND SECURITY
35
Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
IMAGE PROCESSING
36
Consistency as a Service: Auditing Cloud Consistency
NETWORK AND SERVICE MANAGEMENT
37
Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic
NETWORKING
38
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
NETWORKING

No comments:

Post a Comment