2018 .net m.tech ieee titles - takeoffprojects.com€“ 2018... · intrusion detection with...
TRANSCRIPT
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
2017 – 2018 .NET M.TECH IEEE TITLES
S.NO
TITLES
DOMAIN
CLOUD COMPUTING
1. Practical Privacy-Preserving Content-Based Retrieval in Cloud
Image Repositories
CLOUD
COMPUTING
2. Securing Aggregate Queries For DNA Databases
CLOUD
COMPUTING
3. Fast Phrase Search For Encrypted Cloud Storage CLOUD
COMPUTING
4. A Lightweight Secure Data Sharing Scheme For Mobile Cloud
Computing
CLOUD
COMPUTING
5. Achieving Secure, Universal, and Fine-Grained Query Results
Verification for Secure Search Scheme over Encrypted Cloud
Data
CLOUD
COMPUTING
6. Securing Cloud Data under Key Exposure CLOUD
COMPUTING
7. A New Cloud Service Mechanism for Profit Optimizations of a
Cloud Provider and Its Users
CLOUD
COMPUTING
8. Two-Aggregator Topology Optimization using Multiple Paths
in Data Center Networks
CLOUD
COMPUTING
9. Application-Aware Big Data Deduplication in Cloud
Environment
CLOUD
COMPUTING
10. Virtual Machine Migration Planning in Software-Defined
Networks
CLOUD
COMPUTING
11. Fault Tolerant Stencil Computation on Cloud-based GPU Spot
Instances
CLOUD
COMPUTING
12. A New Cloud Service Mechanism for Profit Optimizations of a
Cloud Provider and Its Users
CLOUD
COMPUTING
13. Dynamic Resource Provisioning for Energy Efficient Cloud
Radio Access Networks
CLOUD
COMPUTING
14. Customer-Satisfaction-Aware Optimal Multiserver
Configuration for Profit Maximization in Cloud Computing
CLOUD
COMPUTING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
15. Secure Data Sharing and Searching at the Edge of Cloud-
Assisted Internet of Things
CLOUD
COMPUTING
16. Cloudy Knapsack Algorithm for Offloading Tasks from Large
Scale Distributed Applications
CLOUD
COMPUTING
17. Secure k-NN Query on Encrypted Cloud Data with Multiple
Keys
CLOUD
COMPUTING
18. Stackelberg Game for Energy-aware Resource Allocation to
Sustain Data Centers Using RES
CLOUD
COMPUTING
19. Dynamic Cloud Task Scheduling Based on a Two-Stage
Strategy
CLOUD
COMPUTING
20. PaaS-IaaS Inter-Layer Adaptation in an Energy-Aware Cloud
Environment
CLOUD
COMPUTING
21. Learn to Play Maximum Revenue Auction CLOUD
COMPUTING
22. A Privacy Mechanism for Access Controlled Graph Data
CLOUD
COMPUTING
23. Flexible Wildcard Searchable Encryption System
CLOUD
COMPUTING
24. Data Replication and Virtual Machine Migrations to Mitigate
Network Overhead in Edge Computing Systems
CLOUD
COMPUTING
25. Heterogeneous Data Storage Management with De-
duplication in Cloud Computing
CLOUD
COMPUTING
26. Full Verifiability for Outsourced Decryption in Attribute
Based Encryption
CLOUD
COMPUTING
27. Graph Encryption for Top-K Nearest Keyword Search Queries
on Cloud
CLOUD COMPUTING
28. Privacy-Preserving Multi-keyword Top-k Similarity Search
Over Encrypted Data
CLOUD COMPUTING
29. Privacy-Preserving Smart Semantic Search Based on
Conceptual Graphs Over Encrypted Outsourced Data
CLOUD COMPUTING
30. Strong Key-Exposure Resilient Auditing for Secure Cloud
Storage
CLOUD COMPUTING
31. TAFC: Time and Attribute Factors Combined Access Control
for Time- Sensitive Data in Public Cloud
CLOUD COMPUTING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
DATA MINING
1. Continuous Top-k Monitoring on Document Streams
DATA MINING
2. Query Expansion With Enriched User Profiles For Personalized
Search Utilizing Folksonomy Data
DATA MINING
3. Experimental Analysis Of Data Mining Application For
Intrusion Detection With Feature Reduction
DATA MINING
4. Applying Data Mining Techniques In Cyber Crimes DATA MINING
5. Personal Web Revisitation By Context And Content Keywords
With Relevance Feedback
DATA MINING
6. Probabilistic Models For Ad View ability Prediction On The
Web
DATA MINING
7. Mining Competitors from Large Unstructured Datasets DATA MINING
8. GALLOP: GlobAL feature fused LOcation Prediction for
Different Check-in Scenarios
DATA MINING
9. Efficient Clue-based Route Search on Road Networks DATA MINING
10. Microscopic and Macroscopic spatio-temporal Topic Models
for Check-in Data
DATA MINING
11. Large-scale Location Prediction for Web Pages DATA MINING
12. Modeling Information Diffusion over Social Networks for
Temporal Dynamic Prediction
DATA MINING
13. Discrete Nonnegative Spectral Clustering DATA MINING
14. Managing Temporal Constraints with Preferences:
Representation, Reasoning, and Querying
DATA MINING
15. Facilitating Time Critical Information Seeking in Social Media DATA MINING
16. Stochastic Blockmodeling and Variational Bayes Learning for
Signed Network Analysis
DATA MINING
17. Finding Related Forum Posts through Content Similarity over
Intention-based Segmentation
DATA MINING
18. Big Search in Cyberspace DATA MINING
19. l-Injection: Toward Effective Collaborative Filtering Using DATA MINING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
Uninteresting Items
20. Towards Real-Time, Country-Level Location Classification of
Worldwide Tweets
DATA MINING
21. Differentially Private Data Publishing and Analysis: a Survey DATA MINING
22. Scalable Algorithms for CQA Post Voting Prediction DATA MINING
23. Adaptive ensembling of semi-supervised clustering solutions DATA MINING
24. A Multi-objective Optimization Approach for Question
Routing in Community Question Answering Sevices
DATA MINING
25. User Vitality Ranking and Prediction in Social Networking
Services: A Dynamic Network Perspective
DATA MINING
26. Search Rank Fraud and Malware Detection in Google Play DATA MINING
27. Data-Driven Answer Selection in Community QA Systems DATA MINING
28. Analyzing Sentiments in One Go: A Supervised Joint Topic
Modeling Approach
DATA MINING
29. Energy-efficient Query Processing in Web Search Engines DATA MINING
30. Online Multi-task Learning Framework for Ensemble
Forecasting
DATA MINING
31. Dynamic Facet Ordering for Faceted Product Search Engines DATA MINING
32. Personal Web Revisitation by Context and Content Keywords
with Relevance Feedback
DATA MINING
33. Influence Maximization in Trajectory Databases DATA MINING
34. Detecting Stress Based on Social Interactions in Social
Networks
DATA MINING
35. Efficient Keyword-aware Representative Travel Route
Recommendation
DATA MINING
NETWORKING
1 An Overlay Architecture for Throughput Optimal Multipath
Routing NETWORKING
2 Routing in Accumulative Multi-Hop Networks NETWORKING
3 Coding for Improved Throughput Performance in Network
Switches NETWORKING
4 Power Efficiency and Delay Tradeoff of 10GBase-T Energy
Efficient Ethernet Protocol NETWORKING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
5 A Scalable Framework for Wireless Distributed Computing NETWORKING
6 Efficient Unknown Tag Detection in Large-Scale RFID Systems
With Unreliable Channels NETWORKING
7 Data Center Server Provision: Distributed Asynchronous
Control for Coupled Renewal Systems NETWORKING
8 Privacy and Integrity Preserving Top-k Query Processing for
Two-Tiered Sensor Networks NETWORKING
9 A Longitudinal Measurement Study of TCP Performance and
Behavior in 3G/4G Networks Over High Speed Rails NETWORKING
10
On Oblivious Neighbor Discovery in Distributed Wireless
Networks With Directional Antennas: Theoretical Foundation
and Algorithm Design
NETWORKING
11 When to Make a Topic Popular Again? A Temporal Model for
Topic Re-hotting Prediction in Online Social Networks NETWORKING
12 Socially-Driven Learning-Based Prefetching in Mobile Online
Social Networks NETWORKING
13 Security Implications of Permission Models in Smart-Home
Application Frameworks NETWORKING
14 Data-Driven Faulty Node Detection Scheme for Wireless
Sensor Networks NETWORKING
15 Further Improving Efficiency of Higher-Order Masking
Schemes by Decreasing Randomness Complexity NETWORKING
16 Protecting Secret Key Generation Systems Against Jamming:
Energy Harvesting and Channel Hopping Approaches NETWORKING
17 Someone in Your Contact List: Cued Recall- Based Textual
Passwords NETWORKING
18 A Game-Theoretic Analysis of Adversarial Classification NETWORKING
19 A New Rule for Cost Reassignment in Adaptive Steganography NETWORKING
20 On the Maximum Rate of Networked Computation in a
Capacitated Network NETWORKING
21 E2HRC: An Energy-Efficient Heterogeneous Ring Clustering
Routing Protocol for Wireless Sensor Networks
NETWORKING
22 Energy Efficient Clustering Algorithm for Multi-Hop Wireless
Sensor Network Using Type-2 Fuzzy Logic
NETWORKING
23 Energy Efficient Multipath Routing Protocol for Mobile ad-hoc
Network Using the Fitness Function
NETWORKING
24 Lightweight Three-factor Authentication and Key Agreement NETWORKING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
Protocol for Internet-integrated Wireless Sensor Networks
25 Research on Trust Sensing based Secure Routing Mechanism
for Wireless Sensor Network
NETWORKING
MOBILE COMPUTING
1 Searching Trajectories by Regions of Interest MOBILE COMPUTING
2 ShakeIn: Secure User Authentication of Smartphones with
Habitual Single-handed Shakes MOBILE
COMPUTING
3 Distributed Clustering-Task Scheduling for Wireless Sensor
Networks Using Dynamic Hyper Round Policy MOBILE
COMPUTING
SERVICE COMPUTING
1 Transactional Behavior Verification in Business Process as a
Service Configuration
SERVICE
COMPUTING
2 Time Dependent Pricing for Large-scale Mobile Networks of
Urban Environment: Feasibility and Adaptability
SERVICE
COMPUTING
3 TAFC: Time and Attribute Factors Combined Access Control
on Time-Sensitive Data in Public Cloud
SERVICE
COMPUTING
4 Pattern−Based Design and Verification of Secure Service
Compositions
SERVICE
COMPUTING
5 LoDPD: A Location Difference-based Proximity Detection
Protocol for Fog Computing
SERVICE
COMPUTING
6 Resource Allocation in Vehicular Cloud Computing Systems
with Heterogeneous Vehicles and Roadside Units
SERVICE
COMPUTING
7
Security-Aware Waveforms for Enhancing Wireless
Communications Privacy in Cyber-Physical Systems via
Multipath Receptions
SERVICE
COMPUTING
SECURE COMPUTING
1 A Scalable Approach to Joint Cyber Insurance and Security-as-
a-Service Provisioning in Cloud Computing
SECURE
COMPUTING
2 Cryptographic Solutions for Credibility and Liability Issues of
Genomic Data
SECURE
COMPUTING
3 Efficient Multi-Factor Authenticated Key Exchange Scheme
for Mobile Communications
SECURE
COMPUTING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
4 Fault-Tolerant Adaptive Routing in Dragonfly Networks SECURE
COMPUTING
5 On the Security of a Variant of ElGamal Encryption Scheme SECURE
COMPUTING
6 Optimal Spot-Checking for Collusion Tolerance in Computer
Grids
SECURE
COMPUTING
7 Preserving Multi-keyword Top-k Similarity Search Over
Encrypted Data
SECURE
COMPUTING
8 Privacy-Preserving Aggregate Queries for Optimal Location
Selection
SECURE
COMPUTING
9 Design and Implementation of the Ascend Secure Processor SECURE
COMPUTING
10 Efficient Delegated Private Set Intersection on Outsourced
Private Datasets
SECURE
COMPUTING
11 Privacy-Aware Caching in Information-Centric Networking SECURE
COMPUTING
13 FastGeo: Efficient Geometric Range Queries on Encrypted
Spatial Data
SECURE
COMPUTING
14 Cloud Data Auditing Techniques with a Focus on Privacy and
Security
SECURE
COMPUTING
15 Cooperative Query Answer Authentication Scheme over
Anonymous Sensing Data
SECURE
COMPUTING
16 NetSpam: a Network-based Spam Detection Framework for
Reviews in Online Social Media
SECURE
COMPUTING
SOFTWARE ENGINEERING
1 A Formal Specification and Verification Framework for Timed
Security Protocols
SOFTWARE ENGINEERING
2 A Survey of Recent Trends in Testing Concurrent Software
Systems
SOFTWARE ENGINEERING
3 Global-Aware Recommendations for Repairing Violations in
Exception Handling
SOFTWARE ENGINEERING
4 Genetic Improvement of Software: a Comprehensive Survey SOFTWARE ENGINEERING
5 Detecting overly strong preconditions in refactoring engines SOFTWARE ENGINEERING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
INFORMATION FORENSICS AND SECURITY
1 Two-Cloud Secure Database for Numeric-Related SQL Range
Queries with Privacy Preserving
INFORMATION FORENSICS
AND SECURITY
2 Provably Secure Dynamic Id-Based Anonymous Two-Factor
Authenticated Key Exchange Protocol With Extended Security Model
INFORMATION FORENSICS
AND SECURITY
3 Strong Key-Exposure Resilient Auditing for Secure Cloud Storage
INFORMATION FORENSICS
AND SECURITY
4 Image origin classification based on social network
provenance
INFORMATION FORENSICS
AND SECURITY
5 Person Identification by Keystroke Dynamics using Pairwise
User Coupling
INFORMATION FORENSICS
AND SECURITY
6 Efficiently Promoting Product Online Outcome: An Iterative
Rating Attack Utilizing Product and Market Property
INFORMATION FORENSICS
AND SECURITY
For More Titles Please Visit Our Website – www.takeoffprojects.com
PROJECT SUPPORTS FOR STUDENTS:
❖ PROJECT ABSTRACT
❖ PROJECT IEEE BASE PAPER/ REFERENCE PAPER
❖ PROJECT PRESENTATION IN PPT FORMAT
❖ PROJECT REVIEW ASSISTANCE FOR VIVA
❖ PROJECT DIAGRAMS
❖ PROJECT SOURCE CODE
❖ PROJECT REPORT
❖ PROJECT SCREEN SHOTS
❖ PROJECT DEMO
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
❖ PROJECT EXPLANATION
❖ PLAGARISM DOCUMENTATION
❖ INTERNATIONAL JOURNAL/CONFERENCE PUBLISHING
❖ PROJECT ACCEPTANCE LETTER
❖ PROJECT COMPLETION CERTIFICATE
CONTACT DETATILS:
Landline: 0877-2261612 Mobile: (0)9030333433
ADDRESS: 301, 303, AVR Complex, Balaji Colony, TIRUPATHI – 517502
Web: www.takeoffprojects.com
Email: [email protected]
2016 – 2017 .NET M.TECH IEEE TITLES
S.NO TITLES DOMAIN
CLOUD COMPUTING
1. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
CLOUD COMPUTING
2. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
CLOUD COMPUTING
3. Providing User Security Guarantees in Public Infrastructure Clouds
CLOUD COMPUTING
4. EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud
CLOUD COMPUTING
5. Model-Driven Development Patterns for Mobile Services in Cloud of Things
CLOUD COMPUTING
6. Follow-Me Cloud: When Cloud Services Follow Mobile Users
CLOUD COMPUTING
7. Stochastic Load Balancing for Virtual Resource Management in Datacenters
CLOUD COMPUTING
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
8. Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video
Analytics
CLOUD COMPUTING
DATA MINING
1. Recent Development in Big Data Analytics for Business Operations and Risk Management
DATA MINING
2. Eco Sense: Minimize Participants' Total 3G Data Cost in Mobile Crowd sensing Using Opportunistic Relays
DATA MINING
3. Online Ensemble Learning of Data Streams with Gradually Evolved Classes
DATA MINING
4. A Bayesian Classification Approach Using Class-Specific Features for Text Categorization
DATA MINING
5. A Novel Recommendation Model Regularized with User Trust and Item Ratings
DATA MINING
6. Large Margin Distribution Learning with Cost Interval and Unlabeled Data
DATA MINING
7. Aspect-Level Influence Discovery from Graphs DATA MINING
8. K-Subspaces Quantization for Approximate Nearest Neighbor Search
DATA MINING
9. Cluster-Driven Navigation of the Query Space DATA MINING
10. Robust Joint Feature Weights Learning Framework DATA MINING
11. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
DATA MINING
SECURE COMPUTING
1. PiCode: A New Picture-Embedding 2D Barcode SECURE COMPUTING
2. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
SECURE COMPUTING
3. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
SECURE COMPUTING
SERVICE COMPUTING
1. Cloud workflow scheduling with deadlines and time slot SERVICE
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
availability COMPUTING
2. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
SERVICE COMPUTING
3. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
SERVICE COMPUTING
MOBILE COMPUTING
1. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
MOBILE COMPUTING
NETWORKING
1. An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks
NETWORKING
2. Distributed and Fair Beaconing Rate Adaptation for Congestion Control in Vehicular Networks
NETWORKING
3. Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric
Clustering
NETWORKING
4. Unlicensed Spectra Fusion and Interference Coordination for LTE Systems
NETWORKING
5. On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment
NETWORKING
6. A Super process With Upper Confidence Bounds for Cooperative Spectrum Sharing
NETWORKING
7. Coverage and Rate Analysis in Heterogeneous Cloud Radio Access Networks With Device-to-Device
Communication
NETWORKING
8. Energy Efficient User Association for Cloud Radio Access Networks
NETWORKING
9. Efficient Certificateless Access Control for Wireless Body Area Networks
NETWORKING
INFORMATION FORENHSICS
1. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
INFORMATION FORENHSICS
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.
2. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
INFORMATION FORENHSICS
3. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases
INFORMATION FORENHSICS
For More Titles Please Visit Our Website – www.takeoffprojects.com
PROJECT SUPPORTS FOR STUDENTS:
❖ PROJECT ABSTRACT
❖ PROJECT IEEE BASE PAPER/ REFERENCE PAPER
❖ PROJECT PRESENTATION IN PPT FORMAT
❖ PROJECT REVIEW ASSISTANCE FOR VIVA
❖ PROJECT DIAGRAMS
❖ PROJECT SOURCE CODE
❖ PROJECT REPORT
❖ PROJECT SCREEN SHOTS
❖ PROJECT DEMO
❖ PROJECT EXPLANATION
❖ PLAGARISM DOCUMENTATION
❖ INTERNATIONAL JOURNAL/CONFERENCE PUBLISHING
❖ PROJECT ACCEPTANCE LETTER
❖ PROJECT COMPLETION CERTIFICATE
CONTACT DETATILS:
Landline: 0877-2261612 Mobile: (0)9030333433
ADDRESS: 301, 303, AVR Complex, Balaji Colony, TIRUPATHI – 517502
Web: www.takeoffprojects.com
Email: [email protected]
Further Details Contact: A Vinay 9030333433, 08772261612, 9014123891 #301, 303 & 304, 3rd Floor,
AVR Buildings, Opp to SV Music College, Balaji Colony, Tirupati - 515702 Email: [email protected] | www.takeoffprojects.