You are on page 1of 9

IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.

in Cell: +91 98451 66723


IEEE 2015-2014-13 JAVA & .Net Project Titles
CLOUD COMPUTING CLOUD COMPUTING
Shared Authority Based Privacy-preserving Authentication
1 IEEE 2015 19 Secure Sensitive Data Sharing on a Big Data Platform IEEE 2015
Protocol in Cloud Computing
Governance Model for Cloud Computing in Building Information
2 Secure Auditing and Deduplicating Data in Cloud IEEE 2015 20 IEEE 2015
Management
Energy-aware Load Balancing and Application Scaling for the Cloud Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile
3 Ecosystem IEEE 2015 21 IEEE 2015
Cloud Data Through Blind Storage
Public Integrity Auditing for Shared Dynamic Training Design and Channel Estimation in Uplink Cloud Radio Access
4 IEEE 2015 22 IEEE 2015
Cloud Data with Group User Revocation Networks
Key-Aggregate Searchable Encryption (KASE) A Secure and Dynamic Multi-keyword Ranked
5 IEEE 2015 23 IEEE 2015
for Group Data Sharing via Cloud Storage Search Scheme over Encrypted Cloud Data
Provable Multicopy Dynamic Data Possession Identity-based Encryption with Outsourced Revocation in Cloud
6 IEEE 2015 24 IEEE 2015
in Cloud Computing Systems Computing
A Profit Maximization Scheme with Guaranteed Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud
7 IEEE 2015 25 IEEE 2015
Quality of Service in Cloud Computing Storage
Secure Optimization Computation Outsourcing CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High
8 IEEE 2015 26 IEEE 2015
in Cloud Computing: A Case Study of Linear Programming Availability
Control Cloud Data Access Privilege and Anonymity With Fully
9 A Combinatorial Auction-Based Collaborative Cloud Services Platform IEEE 2015 27 IEEE 2015
Anonymous Attribute-Based Encryption
Cost-Minimizing Dynamic Migration of Content Distribution Services into Innovative Schemes for Resource Allocation
10 IEEE 2015 28 IEEE 2015
Hybrid Clouds in the Cloud for Media Streaming Applications
OPoR: Enabling Proof of Retrievability in Cloud Computing with
11 A Hybrid Cloud Approach for Secure Authorized Deduplication IEEE 2015 29 IEEE 2015
Resource-Constrained Devices
Secure and Practical Outsourcing of Linear Programming in Cloud Reducing Fragmentation for In-line Deduplication Backup Storage via
12 IEEE 2015 30 IEEE 2015
Computing Exploiting Backup History and Cache Knowledge
Secure Distributed Deduplication Systems with
13 A Tree Regression Based Approach for VM Power Metering IEEE 2015 31 IEEE 2015
Improved Reliability
On Traffic-Aware Partition and Aggregation in MapReduce for Big Data
14 IEEE 2015 32 Secure Outsourced Attribute-Based Signatures IEEE 2014
Applications
Toward Offering More Useful Data Reliably to Mobile Cloud From A Secure Client Side Deduplication Scheme in Cloud Storage
15 IEEE 2015 33 IEEE 2014
Wireless Sensor Network Environments
I-sieve: An Inline High Performance Deduplication System Used in Cloud Decentralized Access Control with Anonymous Authentication of Data
16 IEEE 2015 34 IJIRSET 2014
Storage Stored in Clouds
Panda: Public Auditing for Shared Data with Efficient User Revocation in
17 IEEE 2015 35 A Hybrid Cloud Approach for Secure Authorized Deduplication IEEE 2014
the Cloud

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 1 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
18 Just-in-Time Code Offloading for Wearable Computing IEEE 2015 36 Attribute Based Encryption with Privacy Preserving In Clouds IEEE 2014

CLOUD COMPUTING CLOUD COMPUTING


Building Confidential and Efficient Query Services in the Cloud with RASP Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the
37 IEEE 2014 56 IEEE 2013
Data Perturbation Cloud
Compatibility-aware Cloud Service Composition under Fuzzy Preferences
38 IEEE 2014 57 Secure Logging As a Service—Delegating Log Management to the Cloud IEEE 2013
of Users
Cost and Efficiency-based Scheduling on a General Framework
39 Consistency as a Service: Auditing Cloud Consistency IEEE 2014 58 IEEE 2013
Combining between Cloud Computing and Local Thick Clients
AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and
40 Data Similarity-Aware Computation Infrastructure for the Cloud IEEE 2014 59 IEEE 2013
Efficient Social Video Sharing in the Clouds
Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud SeDas: A Self-Destructing Data System Based on Active Storage
41 IEEE 2014 60 IEEE 2013
Storage Framework

42 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage IEEE 2014 61 Attribute-Based Encryption With Verifiable Outsourced Decryption IEEE 2013

A Novel Economic Sharing Model in a Federation of Selfish Cloud Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing
43 IEEE 2014 62 IEEE 2013
Providers Storage System
Dynamic Resource Allocation using Virtual Machines for Cloud
44 NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds IEEE 2014 63 IEEE 2013
Computing Environment
Scalable Distributed Service Integrity Attestation for Software-as-a-
45 IEEE 2014 64 Govcloud: Using Cloud Computing in Public Organizations IEEE 2013
Service Clouds
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Scalable and Secure Sharing of Personal Health Records in Cloud
46 IEEE 2014 65 IEEE 2013
Data Computing using Attribute-based Encryption

47 Proactive Workload Management in Hybrid Cloud Computing IEEE 2014 66 Privacy-Preserving Public Auditing for Secure Cloud Storage IEEE 2013

48 A Review on the State-of-the-Art Privacy Preserving Approaches in the e-


Health Clouds IEEE 2014 WEB SECURITY
49 Towards Differential Query Services in Cost-Efficient Clouds IEEE 2014 WEB SECURITY
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based
50 IEEE 2013 1 Secure Auditing and Deduplicating Data in Cloud IEEE 2015
Encryption
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Secure Optimization Computation Outsourcing
51 IEEE 2013 2 IEEE 2015
Encrypted Data in Cloud Computing: A Case Study of Linear Programming
Cloud-Assisted Mobile-Access of Health Data With Privacy and Key-Aggregate Searchable Encryption (KASE)
52 IEEE 2014 3 IEEE 2015
Auditability for Group Data Sharing via Cloud Storage
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Secure and Practical Outsourcing of Linear Programming in Cloud
53 IEEE 2013 4 IEEE 2015
Computing

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 2 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
54 Security and Privacy Enhancing Multi-Cloud Architectures IEEE 2014 5 Secure Sensitive Data Sharing on a Big Data Platform IEEE 2015

Enhancing Data Security and Data Integrity Using HASBE Scheme in Cloud
55 IEEE 2013 6 Secure Outsourced Attribute-Based Signatures IEEE 2015
Environment

WEB SECURITY NETWORKING


A Secure Client Side Deduplication Scheme in Cloud Storage Security Optimization of Dynamic Networks
7 IEEE 2015 1 IEEE 2015
Environments with Probabilistic Graph Modeling and Linear Programming
Energy and Delay Constrained Maximum Adaptive Schedule for Wireless IEEE 2015
8 FRAppE: Detecting Malicious Facebook Applications IEEE 2015 2 Networked Control Systems
A Secure and Dynamic Multi-keyword Ranked An Energy-Efficient and Delay-Aware Wireless Computing System for
9 IEEE 2015 3 IEEE 2015
Search Scheme over Encrypted Cloud Data Industrial Wireless Sensor Networks
RRW—A Robust and Reversible Watermarking Distortion-Aware Concurrent Multipath Transfer for Mobile Video
10 IEEE 2015 4 IEEE 2015
Technique for Relational Data Streaming in Heterogeneous Wireless Networks
Cost-Effective Authentic and Anonymous Data
11 Steganography Using Reversible Texture Synthesis IEEE 2015 5 IEEE 2015
Sharing with Forward Security
Constructing a Global Social Service Network Decentralized Computation Offloading Game
12 IEEE 2015 6 IEEE 2015
for Better Quality of Web Service Discovery For Mobile Cloud Computing
Algorithms for Enhanced Inter Cell Interference
13 Privacy-Preserving Detection of Sensitive Data Exposure IEEE 2015 7 IEEE 2015
Coordination (eICIC) in LTE HetNets
Friendbook: A Semantic-based Friend Recommendation System for Social k Nearest Neighbor Search
14 IEEE 2015 8 IEEE 2015
Networks for Location-Dependent Sensor Data in MANETs
Constructing a Global Social Service Network n-Demand Discovery of Software Service
15 IEEE 2015 9 IEEE 2015
for Better Quality of Web Service Discovery Dependencies in MANETs
The Mason Test: A Defense Against Sybil
16 The Internet of Things for Health Care:A Comprehensive Survey IEEE 2015 10 Attacks in Wireless Networks Without Trusted IEEE 2015
Authorities
Emacs:Towards more Secure and More efficient Constructions of Secure Passive IP Traceback: Disclosing the Locations
17 IEEE 2014 11 IEEE 2015
Channels of IP Spoofers From Path Backscatter
Captcha as Graphical Passwords—A New Security Primitive Based on Hard IEEE 2014 Wireless Sensor Networks for Condition Monitoring
18 12 IEEE 2015
AI Problems in the Railway Industry: A Survey
Online Payment System using Steganography and Resource Allocation for Energy Efficiency
19 IEEE 2014 13 IEEE 2015
Visual Cryptography Optimization in Heterogeneous Networks
Privacy-Preserving Optimal Meeting Location Secure and Distributed Data Discovery and
20 IEEE 2014 14 IEEE 2015
Determination on Mobile Devices Dissemination in Wireless Sensor Networks
User-Defined Privacy Grid System for
21 Preserving Location Privacy in Geo-Social Applications IEEE 2014 15 IEEE 2015
Continuous Location-Based Services
A Distributed Three-hop Routing Protocol to Increase the Capacity of
22 Defenses to curb Online Password Guessing Attacks IEEE 2013 16 IEEE 2015
Hybrid Wireless Networks

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 3 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
Optimum Power Allocation in Sensor Networks
24 Using Template-Based passwords for authentication in E-banking IEEE 2013 17 IEEE 2015
for Active Radar Applications
Adding Persuasive features in Graphical Password A Computational Dynamic Trust Model for
25 IEEE 2013 18 IEEE 2015
to increase the capacity of KBAM User Authorization
Fog Computing: Mitigating Insider Data Theft
26 IEEE 2013 19 Authenticated Key Exchange Protocols for Parallel Network File Systems IEEE 2015
Attacks in the Cloud

NETWORKING NETWORKING
Generating Searchable Public-Key Ciphertexts Intrusion detection system(IDS) using layered based approaches for
20 IEEE 2015 39 IEEE 2014
with Hidden Structures for Fast Keyword Search finding attacks
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor IEEE 2014
21 FRAppE: Detecting Malicious Facebook Applications IEEE 2015 40 Networks
Revealing the Trace of High-Quality JPEG Compression Through Secure Data Retrieval for Decentralized Disruption-Tolerant Military
22 IEEE 2015 41 IEEE 2014
Quantization Noise Analysis Networks
SmartCrawler: A Two-stage Crawler for Access Control in Decentralized Online Social Networks: Applying a
23 IEEE 2015 42 IEEE 2014
Efficiently Harvesting Deep-Web Interfaces Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
Data Collection in Multi-Application Sharing Privacy-Preserving Distributed Profile Matching in Proximity-based
24 IEEE 2015 43 IEEE 2014
Wireless Sensor Networks Mobile Social Networks
A Lightweight Secure Scheme for Detecting Provenance Forgery and
25 IEEE 2015 44 Participatory Privacy: Enabling Privacy in Participatory Sensing IEEE 2014
Packet Drop Attacks in Wireless Sensor Networks
Privacy-Preserving Optimal Meeting Location Determination on Mobile Optimizing Cloud Resources for Delivering IPTV Services through
26 IEEE 2014 45 IEEE 2014
Devices Virtualization
A System for Denial-of-Service Attack Detection Based on Multivariate DCIM: Distributed Cache Invalidation Method for Maintaining Cache
27 IEEE 2014 46 IEEE 2014
Correlation Analysis Consistency in Wireless Mobile Networks
A System for Denial-of-Service Attack Detection Based on Multivariate
28 IEEE 2014 47 EAACK—A Secure Intrusion-Detection System for MANETs IEEE 2013
Correlation Analysis
Behavioral Detection and Containment of Proximity Malware in Delay EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc
29 IEEE 2014 48 IEEE 2013
Tolerant Networks Networks
Dynamic Trust Management for Delay Tolerant Networks and Its Behavior Rule Specification-based Intrusion Detection for Safety Critical
30 IEEE 2014 49 IEEE 2014
Application to Secure Routing Medical Cyber Physical Systems
GAODV: A Modified AODV against single and collaborative Black Hole
31 Reliable Energy Efficient Routing Algorithms in Wireless Ad Hoc Networks IEEE 2014 50 IEEE 2013
attacks in MANETs
E-MACs: Towards More Secure and More Efficient Constructions of Secure IEEE 2014 CDS-Based Virtual Backbone Construction With Guaranteed Routing
32 51 IEEE 2013
Channels Cost in Wireless Sensor Networks
Channel Aware Encryption and Decision Fusion for Wireless Sensor
33 Optimal Multicast Capacity and Delay Tradeoffs in MANETs IEEE 2014 52 IEEE 2013
Networks
STARS: A Statistical Traffic Pattern Discovery System for Anonymous Evaluating the Vulnerability of Network Mechanisms to Sophisticated
34 IEEE 2014 53 IEEE 2013
MANET communications DDoS Attacks

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 4 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
35 Community-Aware Opportunistic Routing in Mobile Social Networks IEEE 2014 54 Fault Node Recovery Algorithm for a Wireless Sensor Network IEEE 2013

Anomaly Detection via Online Oversampling Principal Component


36 Preserving Location Privacy in Geo-Social Applications IEEE 2014 55 IEEE 2013
Analysis
Redundancy Management of Multipath Routing for Intrusion Tolerance in
37 IEEE 2014 56 Analyzing Log Files for Postmortem Intrusion Detection IEEE 2013
Heterogeneous Wireless Sensor Networks
Towards a Statistical Framework for Source Anonymity inSensor
38 Building a Scalable System for Stealthy P2P-Botnet Detection IEEE 2014 57 IEEE 2013
Networks

NETWORKING DATAMINING / WEBMINING


NICE: Network Intrusion Detection and Countermeasure Selection in Discover the Expert: Context-Adaptive Expert
58 IEEE 2013 1 IEEE 2015
Virtual Network Systems Selection for Medical Diagnosis
Active Learning for Ranking through
59 Analyzing Log Files for Postmortem Intrusion Detection IEEE 2013 2 IEEE 2015
Expected Loss Optimization
Self-Organizing Neural Networks Integrating
60 A Timing-Based Scheme for Rogue AP Detection IEEE 2013 3 IEEE 2015
Domain Knowledge and Reinforcement Learning
Towards Effective Bug Triage with Software Data
61 Lightweight Sybil Attack Detection in MANETs IEEE 2013 4 IEEE 2015
Reduction Techniques
k -Nearest Neighbor Classification over
Sink Trail: A Proactive Data Reporting Protocol for Wireless Sensor
62 IEEE 2013 5 Semantically Secure Encrypted Relational IEEE 2015
Networks Data
Generating Searchable Public-Key Ciphertexts
63 Distributed Cooperative Caching in Social Wireless Networks IEEE 2013 6 IEEE 2015
with Hidden Structures for Fast Keyword Search
DRINA: A Lightweight and Reliable Routing Approach for In-Network A Secure and Dynamic Multi-keyword Ranked
64 IEEE 2013 7 IEEE 2015
Aggregation in Wireless Sensor Networks Search Scheme over Encrypted Cloud Data
Massive MIMO as a Big Data System: Random Matrix Models and
65 Towards a Statistical Framework for Source Anonymity in Sensor Network IEEE 2013 8 IEEE 2015
Testbed

66 The detection and defence of DoS attack for wireless sensor network IEEE 2013 9 Research Directions for Engineering Big Data Analytics Software IEEE 2015

An Optimal Distributed Malware Defense System for Mobile Networks Co-Extracting Opinion Targets and Opinion Words from Online Reviews
67 IEEE 2014 10 IEEE 2015
with Heterogeneous Devices Based on the Word Alignment Model
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Discover the Expert: Context-Adaptive Expert Selection for Medical
68 IEEE 2013 11 IEEE 2015
Networks Diagnosis
Toward Privacy Preserving and Collusion Resistance in a Location Proof Identity-based Encryption with Outsourced Revocation in Cloud
69 IEEE 2013 12 IEEE 2015
Updating System Computing
Adding Persuasive features in Graphical Password to increase the capacity IEEE 2013
70 13 PAGE: A Partition Aware Engine for Parallel Graph Computation IEEE 2015
of KBAM
Constructing a Global Social Service Network
71 Hacktivism Trends, Digital Forensic Tools and Challenges: A Survey IEEE 2013 14 IEEE 2015
for Better Quality of Web Service Discovery

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 5 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
Data Security in Distributed System using Fully Homomorphic Encryption
72 IEEE 2013 15 Privacy-Preserving Detection of Sensitive Data Exposure IEEE 2015
and Linear
Friendbook: A Semantic-based Friend Recommendation System for
73 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks IEEE 2014 16 IEEE 2015
Social Networks
Rethinking Vehicular Communications: Merging VANET with Cloud Constructing a Global Social Service Network
74 IEEE 2013 17 IEEE 2015
Computing for Better Quality of Web Service Discovery
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing
75 IEEE 2013 18 The Internet of Things for Health Care:A Comprehensive Survey IEEE 2015
Routing Overhead in Mobile Ad Hoc Networks
SPOC: A Secure and Privacy-preserving Opportunistic Computing
76 IEEE 2013 19 FRAppE: Detecting Malicious Facebook Applications IEEE 2015
Framework for Mobile-Healthcare Emergency

DATAMINING / WEBMINING DATAMINING / WEBMINING


20 Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions IEEE 2015 39 Identity-Based Secure Distributed Data Storage Schemes IEEE 2014

21 Rule-Based Method for Entity Resolution IEEE 2015 40 Crowd sourcing Predictors of Behavioral Outcomes IEEE 2014

Secure Distributed Deduplication Systems with An Ontology-based Framework for Context-aware Adaptive E-learning
22 IEEE 2015 41 IEEE 2014
Improved Reliability System
SmartCrawler: A Two-stage Crawler for
23 IEEE 2015 42 PMSE: A Personalized Mobile Search Engine IEEE 2014
Efficiently Harvesting Deep-Web Interfaces

24 Exploiting Service Similarity for Privacy in Location Based Search Querier IEEE 2014 43 SUSIE: Search Using Services and Information Extraction IEEE 2014

A Web Usage Mining Approach Based On New Technique In Web Path


25 Supporting Privacy Protection in Personalized Web Search IEEE 2014 44 IEEE 2014
Recommendation Systems
A Generic Framework for Top-k Pairs and Top-k Objects Queries over Employing Structural and Textual Feature Extraction
26 IEEE 2014 45 IEEE 2013
Sliding Windows for Semistructured Document Classification
An Empirical Performance Evaluation of Relational Keyword Search One Size Does Not Fit All: Toward User- and Query-Dependent Ranking
27 IEEE 2014 46 IEEE 2014
Systems for Web Databases
Approximate Shortest Distance Computing: A Query-Dependent Local
28 IEEE 2014 47 Dealing With Concept Drifts in Process Mining IEEE 2014
Landmark Scheme

29 Efficient Ranking on Entity Graphs with Personalized Relationships IEEE 2014 48 Efficient Instant-Fuzzy Search with Proximity Ranking IEEE 2014

30 Secure Mining of Association Rules in Horizontally Distributed Databases IEEE 2014 49 Keyword Query Routing IEEE 2014

Framework for Surveillance of Instant Messages in Instant messengers


31 IEEE 2014
and Social networking sites using Data Mining and Ontology

32 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud


Data IEEE 2014 IMAGE PROCESSING

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 6 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
Automatic Face Naming by Learning Discriminative
33 Web Image Re-ranking Using Query-Specific Semantic Signatures IEEE 2014 1 IEEE 2015
Affinity Matrices From Weakly Labeled Images
Query Aware Determinization of Uncertain
34 Facilitating Document Annotation using Content and Querying Value IEEE 2014 2 IEEE 2015
Objects
RRW—A Robust and Reversible Watermarking Technique for Relational
35 Towards Differential Query Services in Cost-Efficient Clouds IEEE 2014 3 IEEE 2015
Data
Mining Weakly Labeled Web Facial Images
36 IEEE 2014 4 Steganography Using Reversible Texture Synthesis IEEE 2015
for Search-Based Face Annotation
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code Online Payment System using Steganography and
37 IEEE 2013 5 IEEE 2015
words Visual Cryptography
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based
38 IEEE 2014 6 Joint Feature Learning for Face Recognition IEEE 2015
Encryption

IMAGE PROCESSING BIG DATA


Face Recognition and Retrieval Using Cross-Age Reference Coding With On Traffic-Aware Partition and Aggregation in MapReduce for Big Data
7 IEEE 2015 1 IEEE 2015
Cross-Age Celebrity Dataset Applications
FeatureMatch: A General ANNF Estimation
8 IEEE 2015 2 Secure Sensitive Data Sharing on a Big Data Platform IEEE 2015
Technique and its Applications

9 Learning to Rank Image Tags With Limited Training Examples IEEE 2015 3 Research Directions for Engineering Big Data Analytics Software IEEE 2015

Massive MIMO as a Big Data System: Random Matrix Models and


10 Data Hiding in Still Images Based on Blind Algorithm of Steganography IEEE 2015 4 IEEE 2015
Testbed
An Attribute-assisted Reranking Model for Web
11 IEEE 2015 5 Big Data and the SP Theory of Intelligence IEEE 2015
Image Search
An Aggregatable Name-Based Routing for Energy-E cient Data Sharing in
12 Web Image Re-Ranking Using Query-Specific Semantic Signatures IEEE 2014 6 IEEE 2015
Big Data Era
Captcha as Graphical Passwords—A New Security Primitive Based on Hard IEEE 2014 Cost Minimization for Big Data Processing in Geo-Distributed Data
13 7 IEEE 2015
AI Problems Centers
Mining Weakly Labeled Web Facial Images
14 IEEE 2014
for Search-Based Face Annotation

15 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code


words IEEE 2013 ANDROID PROJECTS
Semi-Supervised Biased Maximum Margin Analysis for Interactive Image OPoR: Enabling Proof of Retrievability in Cloud Computing with
16 IEEE 2013 1 IEEE 2015
Retrieval Resource-Constrained Devices
An Access Point-Based FEC Mechanism for Video Transmission Over
17 IEEE 2013 2 Energy Cost Models of Smartphones for Task Offloading to the Cloud IEEE 2015
Wireless LANs
Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code
18 IEEE 2013 3 Context Based Access Control Systems for Mobile Devices IEEE 2015
words

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 7 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
Beyond Text QA: Multimedia Answer Generation by Harvesting Web
19 IEEE 2013 4 Avatar: Mobile Distributed Computing in the Cloud IEEE 2015
Information
Adding Persuasive features in Graphical Password WORAL: A Witness Oriented Secure Location Provenance Framework for IEEE 2015
20 IEEE 2013 5
to increase the capacity of KBAM Mobile Devices

21 Combined texture and Shape Features for Content Based Image Retrieval IEEE 2013 6 Sesame: A Secure and Convenient Mobile Solution IEEE 2015

22 An Encryption and Decryption Algorithm for Image Based on DNA IEEE 2013 7 Anti-theft for Android Based Devices IEEE 2014

Steganography using Genetic Algorithm along with Visual Cryptography Location Based Encrypted to improve the Security of Data Acess in Cloud IEEE 2014
23 IEEE 2013 8
for Wireless Network Application Computing
Reversible Data Hiding in Encrypted Images by Reserving Room before Wireless Sensor Networks Using Android Virtual Devices and Near Field
24 IEEE 2013 9 IEEE 2014
Encryption CommunicationPeer-To-Peer Emulation
Privacy -Preserving Optimal meeting Location Determination on Mobile
25 Securing Visual Cryptographic Shares using Public Key Encryption IEEE 2013 10 IEEE 2014
Devices

ANDROID PROJECTS NS2 PROJECTS


How Long to Wait Predicting Bus Arrival Time With Mobile Phone Based Cost-Aware SEcure Routing (CASER) Protocol
11 IEEE 2014 1 IEEE 2015
Participatory Sensing Design for Wireless Sensor Networks
SPOC: A Secure and Privacy-preserving Opportunistic Computing Improving Physical-Layer Security in Wireless Communications Using
12 IEEE 2014 2 IEEE 2015
Framework for Mobile-Healthcare Emergency Diversity Techniques
Attendence System using NFC Technology and Embedded Camera Device REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor
13 IEEE 2014 3 IEEE 2015
on Mobile Phone Networks
ProcurePass: A user Authentication Protocol to Resist Password Stealing A Secure Scheme for Power Exhausting Attacks in Wireless Sensor
14 IEEE 2014 4 IEEE 2015
and Passwords Reuse Attacks Networks
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor
15 iMAS: an Intelligent Mobile Advertising System IEEE 2014 5 IEEE 2015
Networks
Secure Transmission Medical Data for Pervasive Healthcare System using Real-Time Path Planning Based on Hybrid-VANET-Enhanced
16 IEEE 2014 6 IEEE 2015
Android Transportation System
Context Aware Mobile navigation System for Visually impaired people
17 IEEE 2014 7 Time-Delayed Broadcasting for Defeating Inside Jammers IEEE 2015
using Mobile Cloud Computing
QR Code Based Navigation System for Closed Building Using Smart Efficient and Truthful Bandwidth Allocation in Wireless Mesh
18 IEEE 2013 8 IEEE 2015
Phones Community Networks
Neighbor Discovery in Wireless Networks with Multipacket
19 Road Alarm: a Sptial Alarm System on Road Networks IEEE 2013 9 IEEE 2015
Reception
OffLoading Android Applications to the Cloud Without Customizing Opportunistic Routing with Congestion Diversity in
20 IEEE 2013 10 IEEE 2015
Android Wireless Multi-hop Networks
Path Reconstruction in Dynamic Wireless Sensor
21 Intelligence Traffic Surveillance & policing IEEE 2013 11 IEEE 2015
Networks Using Compressive Sensing

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 8 / 8
IEEE 2015-2014-13 JAVA / .NET www.dhsprojects.blogspot.in Cell: +91 98451 66723
Shared Authority Based Privacy-preserving Authentication Protocol in
22 School Bus Tracking System with SMS Alert Using Android IEEE 2013 12 IEEE 2015
Cloud Computing
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor
13 IEEE 2014
Networks

For further details contact: 14 Balancing the Trade Off Between query delay & Data Availability IEEE 2014

Dynamic Trust Management for Delay Tolerant Networks and its


DHS Informatics Private Limited 15 application to secure routing IEEE 2014

52-53, 2nd Floor, 8th F Main, Near ICICI Bank, 16 R3 reliable rooting enhancement for WSN IEEE 2014

A QoS-Oriented Distributed Routing protocol for hybrid wireless


Jayanagar 3rd Block, Bangalore - 560 011 17 networks IEEE 2014

Phone: 080-4130 7435, 98451 66723, 98866 92401 18 Cluster Based Certificate Revocation with Vindication Capability IEEE 2014

QOS aware geographic Opportunistic routing in wireless sensor


www.dhsinformatics.com, www.dhsprojects.blogspot.in 19 Networks IEEE 2014

Contact: Jayanagar: 98451 66723 / 98866 92401


* We develop latest IEEE Projects based on your needs, email your base papers to rajan@dhsinformatics.com Page: 9 / 8

You might also like