Final Year Projects in
Chennai
DOT NET – IEEE TITLES 2014
SAKTHI SOFTWARE SOLUTIONS
RVR Towers, 1st Street, 3rd Main Road, Annanagar, Behind
Nalli Silks,
Chennai 600 040,Tel: 044-43016888 / 9710780469
Email: fresherfocus@gmail.com, sssprojects2013@gmail.com
URL: www.sssedu.in
S.no
|
DOT NET – IEEE TITLES
|
DOMAIN
|
1
|
A Probabilistic Misbehavior Detection Scheme toward
Efficient Trust Establishment in Delay-Tolerant Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
2
|
An Error-Minimizing Framework for Localizing Jammers in
Wireless Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
3
|
Balancing Performance, Accuracy, and Precision for
Secure Cloud Transactions
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
4
|
Certificateless Remote Anonymous Authentication Schemes
for Wireless Body Area Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
5
|
Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
6
|
Efficient Data Query in Intermittently-Connected Mobile
Ad Hoc Social Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
7
|
Multicast Capacity in MANET with Infrastructure Support
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
8
|
Secure and Efficient Data Transmission for Cluster-Based
Wireless Sensor Networks
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
9
|
Transmission-Efficient Clustering Method for Wireless
Sensor Networks Using Compressive Sensing
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
10
|
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
11
|
Enabling Data Integrity Protection in
Regenerating-Coding-Based Cloud Storage: Theory and Implementation
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
12
|
Key-Aggregate Cryptosystem for Scalable Data Sharing in
Cloud Storage
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
13
|
Privacy-Preserving Multi-Keyword Ranked Search over
Encrypted Cloud Data
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
14
|
Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
15
|
A System for Denial-of-Service Attack Detection Based on
Multivariate Correlation Analysis
|
PARALLEL AND DISTRIBUTED SYSTEMS
|
16
|
Identity-Based Distributed Provable Data Possession in
Multi-Cloud Storage
|
SERVICES COMPUTING
|
17
|
Panda: Public Auditing for Shared Data with Efficient
User Revocation in the Cloud
|
SERVICES COMPUTING
|
18
|
Web Image Re-Ranking Using Query-Specific Semantic
Signatures
|
PATTERN ANALYSIS
|
19
|
A Cocktail Approach for Travel Package Recommendation
|
KNOWLEDGE AND DATA ENGINEERING
|
20
|
LARS*: An Efficient and Scalable Location-Aware
Recommender System
|
KNOWLEDGE AND DATA ENGINEERING
|
21
|
Product Aspect Ranking and Its Applications
|
KNOWLEDGE AND DATA ENGINEERING
|
22
|
TrustedDB: A Trusted Hardware-Based Database with
Privacy and Data Confidentiality
|
KNOWLEDGE AND DATA ENGINEERING
|
23
|
Typicality-Based Collaborative Filtering Recommendation
|
KNOWLEDGE AND DATA ENGINEERING
|
24
|
Building Confidential and Efficient Query Services in
the Cloud with RASP Data Perturbation
|
KNOWLEDGE AND DATA ENGINEERING
|
25
|
An Empirical Performance Evaluation of Relational
Keyword Search Techniques
|
KNOWLEDGE AND DATA ENGINEERING
|
26
|
Secure Mining of Association Rules in Horizontally
Distributed Databases
|
KNOWLEDGE AND DATA ENGINEERING
|
27
|
Supporting Privacy Protection in Personalized Web Search
|
KNOWLEDGE AND DATA ENGINEERING
|
28
|
A QoS-Oriented Distributed Routing Protocol for Hybrid
Wireless Networks
|
MOBILE COMPUTING
|
29
|
Autonomous Mobile Mesh Networks
|
MOBILE COMPUTING
|
30
|
DA-Sync: A Doppler-Assisted Time-Synchronization Scheme
for Mobile Underwater Sensor Networks
|
MOBILE COMPUTING
|
31
|
Preserving Location Privacy in Geosocial Applications
|
MOBILE COMPUTING
|
32
|
Leveraging Social Networks for P2P Content-Based File
Sharing in Disconnected MANETs
|
MOBILE COMPUTING
|
33
|
Captcha as Graphical Passwords—A New Security Primitive
Based on Hard AI Problems
|
INFORMATION FORENSICS AND SECURITY
|
34
|
Designing an Efficient Image Encryption-Then-Compression
System via Prediction Error Clustering and Random Permutation
|
INFORMATION FORENSICS AND SECURITY
|
35
|
Click Prediction for Web Image Reranking Using
Multimodal Sparse Coding
|
IMAGE PROCESSING
|
36
|
Consistency as a Service: Auditing Cloud Consistency
|
NETWORK AND SERVICE MANAGEMENT
|
37
|
Content Caching and Scheduling in Wireless Networks With
Elastic and Inelastic Traffic
|
NETWORKING
|
38
|
Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks
|
NETWORKING
|
No comments:
Post a Comment