.NET PROJECTS

.NET-2013 IEEE PROJECTS
CLOUD COMPUTING

S.NO
TITLES
1A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
2An Adaptive Cloud Downloading Service
3Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
4Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
5CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
6Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
7Privacy-Preserving Public Auditing for Secure Cloud Storage
8QoS Ranking Prediction for Cloud Services
9Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
10Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems
11Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
12A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
13Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks
14CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
15Privacy Preserving Delegated Access Control in Public Clouds
16Dynamic Audit Services for Outsourced Storages in Clouds

.NET-2013 IEEE PROJECTS
DATA MINING

S.NO
TITLES
17A New Algorithm for Inferring User Search Goals with Feedback Sessions
18A Survey of XML Tree Patterns
19Dynamic Personalized Recommendation on Sparse Data
20Mining User Queries with Markov Chains: Application to Online Image Retrieval
21TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
22A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
23Supporting Search-As-You-Type Using SQL in Databases
24Secure Mining of Association Rules in Horizontally Distributed Databases

.NET-2013 IEEE PROJECTS
SECURE COMPUTING

S.NO
TITLES
25A Rank Correlation Based Detection against Distributed Reflection DoS Attacks.
26EAACK—A Secure Intrusion-Detection System for MANETs
27Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
28Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
29Privacy Preserving Data Sharing With Anonymous ID Assignment
30SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

.NET-2013 IEEE PROJECTS
NETWORKING

S.NO
TITLES
31A Distributed Control Law for Load Balancing in Content Delivery Networks
32A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
33An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
34BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments
35Efficient Algorithms for Neighbor Discovery in Wireless Networks
36Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality
37Resource Allocation for QoS Support in Wireless Mesh Networks
38A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks With Order-Optimal Per-Flow Delay

.NET-2013 IEEE PROJECTS
PARALLEL & DISTRIBUTED SYSTEMS

S.NO
TITLES
39A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks
40Multicast Capacity in MANET with Infrastructure Support
41SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
42Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
43Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
44A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks
45Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor Networks

.NET-2013 IEEE PROJECTS
MOBILE COMPUTING

S.NO
TITLES
46Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks
47Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach
48EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks
49Optimal Multicast Capacity and Delay Tradeoffs in MANETs
50Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks
51A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
52Network-Assisted Mobile Computing with Optimal Uplink Query Processing
53Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks
54On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
55Toward Accurate Mobile Sensor Network Localization in Noisy Environments

.NET-2013 IEEE PROJECTS
IMAGE PROCESSING

S.NO
TITLES
56Query-Adaptive Image Search With Hash Codes
57Reversible Data Hiding With Optimal Value Transfer
58Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
59Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
60Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage

.NET-2013 IEEE PROJECTS
SERVICE COMPUTING(WEB SERVICE)

S.NO
TITLES
61Cost-Based Optimization of Service Compositions
62Evolution of Social Networks Based on Tagging Practices

.NET-2013 IEEE PROJECTS
MULTIMEDIA

S.NO
TITLES
63Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information