M.TECH DOT NET PROJECTS
M.TECH DOT NET 2016 PROJECTS

SL.NO

Name of The Project

Abstract

Year

CLOUD COMPUTING
1 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Download 2016
2 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Download 2016
3 SeDas: A Self-Destructing Data System Based on Active Storage Framework Download 2016
4 An Ensemble of Replication and Erasure Codes for Cloud File Systems Download 2016
5 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Download 2016
6 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems. Download 2016
7 Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks Download 2016
8 Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data Download 2016
9 An Adaptive Cloud Downloading Service Download 2016
10 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Download 2016
11 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Download 2016
12 Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Download 2016
13 Privacy-Preserving Public Auditing for Secure Cloud Storage Download 2016
14 QoS Ranking Prediction for Cloud Services Download 2016
15 CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud Download 2016
16 Privacy Preserving Delegated Access Control in Public Clouds Download 2016
17 Dynamic Audit Services for Outsourced Storages in Clouds Download 2016
18 Attribute-Based Access to Scalable Media in Cloud-Assisted Download 2016
DATA MINING (KNOWLEDGE & DATA ENGG.)
1 Dynamic Personalized Recommendation on Sparse Data Download 2016
2 Supporting Search-As-You-Type Using SQL in Databases Download 2016
3 Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases Download 2016
4 A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model Download 2016
5 Anomaly Detection via Online Oversampling Principal Component Analysis Download 2016
6 Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. Download 2016
7 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Download 2016
8 Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption Download 2016
9 Mining Order-Preserving Sub matrices from Data with Repeated Measurements Download 2016
10 m-Privacy for Collaborative Data Publishing Download 2016
11 A New Algorithm for Inferring User Search Goals with Feedback Sessions Download 2016
12 A Survey of XML Tree Patterns Download 2016
13 Dynamic Personalized Recommendation on Sparse Data Download 2016
14 Mining User Queries with Markov Chains: Application to Online Image Retrieval Download 2016
15 TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality Download 2016
16 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Download 2016
17 Secure Mining of Association Rules in Horizontally Distributed Databases Download 2016
NETWORKING
1 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Download 2016
2 Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Download 2016
3 A Survey of XML Tree Patterns. Download 2016
4 EMAP Expedite Message Authentication Protocol for Vehicular Ad Hoc Network Download 2016
5 Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks. Download 2016
6 The Target Tracking in Mobile Sensor Networks Download 2016
7 Redundancy Management of Multipath Routing for Intrusion Tolerance Download 2016
8 A Distributed Control Law for Load Balancing in Content Delivery Networks Download 2016
9 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Download 2016
10 An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks Download 2016
11 BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET's City Environments Download 2016
12 Efficient Algorithms for Neighbor Discovery in Wireless Networks Download 2016
13 Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality Download 2016
14 Resource Allocation for QoS Support in Wireless Mesh Networks Download 2016
MOBILE COMPUTING
1 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Download 2016
2 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation. Download 2016
3 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Download 2016
4 Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks Download 2016
5 Cooperative Packet Delivery in Hybrid Wireless Mobile Networks: A Coalitional Game Approach Download 2016
6 Optimal Multicast Capacity and Delay Tradeoffs in MANETs Download 2016
7 Relay Selection for Geographical Forwarding in Sleep-Wake Cycling Wireless Sensor Networks Download 2016
8 A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networksr Download 2016
9 Network-Assisted Mobile Computing with Optimal Uplink Query Processing Download 2016
10 Target Tracking and Mobile Sensor Navigation in Wireless Sensor Networks Download 2016
11 On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks Download 2016
12 Toward Accurate Mobile Sensor Network Localization in Noisy Environments Download 2016
SECURE COMPUTING
1 Identity-Based Secure Distributed Data Storage Schemes Download 2016
2 Privacy Preserving Data Sharing With Anonymous ID Assignment Download 2016
3 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks Download 2016
4 EAACK—A Secure Intrusion-Detection System for MANETs. Download 2016
5 SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems. Download 2016
6 A Rank Correlation Based Detection against Distributed Reflection DoS Attacks. Download 2016
7 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Download 2016
8 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Download 2016
PARALLEL & DISTRIBUTED SYSTEMS
1 A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Download 2016
2 Multicast Capacity in MANET with Infrastructure Support Download 2016
3 SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency Download 2016
4 Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Download 2016
5 Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing n Wireless Sensor Networks Download 2016
IMAGE PROCESSING
1 Query-Adaptive Image Search With Hash Codes Download 2016
2 Reversible Data Hiding With Optimal Value Transfer Download 2016
3 Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting Download 2016
4 Noise Reduction Based on Partial-Reference, Dual-Tree Complex Wavelet Transform Shrinkage Download 2016
5 Qery Adptive image search with hash codes Download 2016
SERVICE COMPUTING (WEB SERVICE)
1 Cost-Based Optimization of Service Compositions Download 2016
2 Evolution of Social Networks Based on Tagging Practices Download 2016
MULTIMEDIA
1 Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information Download 2016
M.TECH DOT NET 2015 PROJECTS
CLOUD COMPUTING
1 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Download 2015
2 An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. Download 2015
3 Ensuring Distributed Accountability for Data Sharing in the Cloud Download 2015
4 Towards Secure and Dependable Storage Services in Cloud Computing Download 2015
DATA MINING (KNOWLEDGE & DATA ENGG.)
1 Publishing Search Logs—A Comparative Study of Privacy Guarantees Download 2015
2 Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Download 2015
3 Slicing: A New Approach to Privacy Preserving Data Publishing Download 2015
4 Data Mining Techniques for Software Effort Estimation: A Comparative Study Download 2015
5 Personalized mobile search engine Download 2015
6 Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Download 2015
7 Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm Download 2015
NETWORKING
1 A Distributed Control Law for Load Balancing in Content Delivery Download 2015
2 TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks Download 2015
3 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Local Greedy Approximation for Scheduling in Multihop Wireless Networks Download 2015
4 On the Throughput Capacity of Wireless Sensor Networks with Mobile Relays Download 2015
5 Scalable Learning of Collective Behavior Download 2015
6 VRSVSS Calculator Download 2015
SECURE COMPUTING
1 ROAuth Recommendation Based Open Download 2015
MOBILE COMPUTING
1 Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Download 2015
2 Distributed Throughput Maximization in Wireless Networks via Random Power Allocation. Download 2015
3 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Download 2015
IMAGE PROCESSING
2 Semi supervised Biased Maximum Margin Download 2015
3 Defenses against large scale online password guessing Download 2015