amazon

Tuesday, January 12, 2016

CST-IT-MSC-MCA-IEEE 2015-2016 Projects


CST-IT-MSC-MCA-IEEE 2015-2016  Projects

SlNo
Titles
Domain
1
Audit Free Cloud Storage via deniable Attribute based Encryption
Cloud Computing
2
A Secure and Dynamic Multi keyword Ranked Search Scheme over Encrypted Cloud Data
Parallel and Distributed Systems
3
Eye Gaze Tracking With a Web Camera in a Desktop Environment 
Human-Machine Systems
4
A Methodology for Extracting Standing Human Bodies From Single Images in C#.Net
Human-Machine Systems
5
 Face Recognition Across Non Uniform Motion Blur, Illumination, and Pose
Image Processing
6
A Fiducial Facial Point Extraction Using a Novel Projective Invariant
Image Processing
7
 DROPS Division and Replication of Data in Cloud for Optimal Performance and Security
Cloud Computing
8
Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images
Neural Networks and Learning Systems
9
 Single Image Super Resolution Based on Gradient Profile Sharpness

10
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Information Forensics and Security
11
OPoR: Enabling Proof of Retrievability in Cloud Computing
Cloud Computing
12
A Distributed Three-hop Routing Protocol to
Increase the Capacity of Hybrid Wireless
Mobile Computing
13
Defeating Jamming With the Power of Silence:A Game-Theoretic Analysis
Wireless Communications
14
Steganography Using Reversible Texture Synthesis
Image Processing
15
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
Mobile Computing
16
IncreSTS: Towards Real-Time Incremental Short Text Summarization on Comment Streams from SNS
Knowledge and Data Engineering
17
Privacy Policy Inference of User-Uploaded Images on ContentSharing Sites
Knowledge and Data Engineering
18
Continuous and Transparent User Identity Verification for SecureInternet Services
Dependable and Secure Computing
19
TEES: An Efficient Search Scheme overEncrypted Data on Mobile Cloud
Cloud Computing
20
Optimal Configuration of Network Coding in Ad Hoc Networks
Vehicular Technology
21
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System
Parallel and Distributed Systems
22
Universal Network Coding-Based Opportunistic Routing for Unicast
Parallel and Distributed Systems
23
Authenticated Key Exchange Protocols for Parallel Network File Systems
Parallel and Distributed Systems
24
An Attribute-Assisted Reranking Model for Web Image Search
Image Processing
25
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
Cloud Computing
26
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
Services Computing
27
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
Knowledge and Data Engineering
28
Software Puzzle: A Countermeasure to Resource-Inflated Denialof-Service Attacks
Information Forensics and Security
29
Effective Key Management in Dynamic Wireless Sensor Networks
Information Forensics and Security
30
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
Computers
31
Stealthy Denial of Service Strategy in Cloud Computing
Cloud Computing
32
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Computers
33
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Computers
34
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Computers
35
VANET Modeling and Clustering Design Under Practical Traffic, Channel and Mobility Conditions
Communications
36
Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System
Vehicular Technology
37
Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs
Information Forensics and Security
38
CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes
Mobile Computing
39
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
Mobile Computing
40
Time-Delayed Broadcasting for Defeating Inside Jammers
Dependable and Secure Computing
41
Data Collection in Multi-Application Sharing Wireless Sensor Networks
Parallel and Distributed Systems
42
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
Mobile Computing
43
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
Mobile Computing
44
Discovery of Ranking Fraud for Mobile Apps
Knowledge and Data Engineering
45
Secure Auditing and Deduplicating Data in Cloud
Computers
46
Authenticated Key Exchange Protocols for Parallel Network File Systems
Parallel and Distributed Systems
47
Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization
Wireless Communications
48
Secure Distributed Deduplication Systems with ImprovedReliability
Computers
49
A Computational Dynamic Trust Model for User Authorization
DEPENDABLE AND SECURE COMPUTING
50
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
KNOWLEDGE AND DATA ENGINEERING


No comments:

Post a Comment