Contenu connexe Similaire à M-Tech IEEE 2015 Projects List (20) Plus de CloudTechnologies (20) M-Tech IEEE 2015 Projects List 1. 2015 IEEE PROJECTS
CLOUD COMPUTING (WITH REAL TIME CLOUD )
CT5CC01 A ProfitMaximizationScheme withGuaranteedQualityof Service inCloudComputing
CT5CC02 CombiningEfficiency,Fidelity,andFlexibilityinResource InformationServices
CT5CC03 Energy-aware LoadBalancingandApplicationScalingforthe CloudEcosystem
CT5CC04 Identity-basedEncryptionwithOutsourcedRevocationinCloudComputing
CT5CC05 Key-AggregateSearchable Encryption(KASE) forGroupData SharingviaCloudStorage
CT5CC06 Provable Multi copyDynamicData PossessioninCloudComputingSystems
CT5CC07 PublicIntegrityAuditingforSharedDynamicCloudDatawithGroup User Revocation
CT5CC07 Secure AuditingandDeduplicatingDatainCloud
CT5CC08 Space-efficientVerifiable SecretSharingUsingPolynomialInterpolation
CT5CC09 Smart CloudStorage Service SelectionBasedonFuzzyLogic,Theoryof Evidence andGame
Theory
CT5CC10 An efficientalgorithmforthe burstingof service-basedapplicationsinhybridClouds
CT5CC11 Cloud-basedMultimediaContentProtectionSystem
CT5CC12 OrchestratingBulkDataTransfersacross geo-distributeddatacenters
CT5CC13 StealthyDenial of Service StrategyinCloudComputing
CT5CC14 A Scalable andReliableMatchingService for Content-BasedPublish/SubscribeSystems
CT5CC15 Energy-EfficientFault-TolerantDataStorage and ProcessinginMobile Cloud
CT5CC16 SelCSP:A FrameworktoFacilitate Selectionof CloudService Providers
CT5CC17 A DynamicSecure GroupSharingFrameworkinPublicCloudComputing
CT5CC18 EnablingEfficientMulti-KeywordRankedSearchOverEncryptedMobileCloudData
ThroughBlindStorage
CT5CC19 EnablingFine-grainedMulti-keywordSearchSupportingClassifiedSub-dictionariesover
EncryptedCloudData
CT5CC20 Governance Model forCloudComputinginBuildingInformationManagement
CT5CC21 PerformingInitiative DataPrefetchinginDistributedFile SystemsforCloudComputing
CT5CC22 Proof of ownershipindeduplicatedcloudstorage withmobile device efficiency
CT5CC23 SharedAuthorityBasedPrivacy-PreservingAuthenticationProtocol inCloudComputing
CT5CC24 Cloud-Trust- a SecurityAssessmentModel forInfrastructure asaService (IaaS) Clouds
CT5CC25 Cost-Effective AuthenticandAnonymousData SharingwithForwardSecurity
CT5CC26 Secure OptimizationComputationOutsourcinginCloudComputingA Case Studyof Linear
Programming
CT5CC27 T-brokerA Trust-aware Service BrokeringSchemeforMultiple CloudCollaborative
Services
CT5CC28 PandaPublicAuditingforSharedDatawithEfficientUserRevocationinthe Cloud
CT5CC29 DecentralizedComputationOffloadingGame forMobile CloudComputing
DATA MINING & WEB MINING
CT5DM01 PAGE A PartitionAware Engine forParallel GraphComputation
CT5DM02 QueryAware Determinizationof UncertainObjects
CT5DM03 TowardsEffective BugTriage withSoftware DataReductionTechniques
CT5DM04 CAHR: A ContextuallyAdaptiveHome-BasedRehabilitationFramework
CT5DM05 PAGE: A PartitionAware Engine for Parallel GraphComputation
2. CT5DM06 EntityLinkingwithaKnowledge Base:Issues,Techniques,andSolutions
CT5DM07 Discoveryof RankingFraudfor Mobile Apps
CT5DM08 Rule-BasedMethodforEntityResolution
CT5DM09 SubgraphMatching withSetSimilarity inaLarge Graph Database
CT5DM10 Active LearningforRankingthroughExpectedLossOptimization
CT5DM11 ePeriodicity:MiningEventPeriodicityfromIncomplete Observations
CT5DM12 KeywordSearchOverProbabilisticRDFGraphs
CT5DM13 Aggregate EstimationinHiddenDatabaseswithCheckboxInterfaces
CT5DM14 EfficientReverse Top-kBooleanSpatial KeywordQueriesonRoadNetworks
CT5DM15 k-NearestNeighborClassificationoverSemanticallySecure EncryptedRelational Data
CT5DM16 Topological TransformationApproachestoDatabase QueryProcessing
CT5DM17 A RankingApproachonLarge-Scale GraphWith Multidimensional Heterogeneous
Information
CT5DM18 Rank-BasedSimilaritySearchReducingthe Dimensional Dependence
CT5DM19 Distributed Multi-AgentOnline LearningBasedonGlobal Feedback
CT5DM20 EfficientMotif DiscoveryforLarge-scaleTime SeriesinHealthcare
CT5DM21 TrustedPerformance AnalysisonSystemsWithaSharedMemory
CT5DM22 EfficientAlgorithmsforMiningthe Concise and LosslessRepresentationof HighUtility
Itemsets
CT5DM23 Relational Collaborative TopicRegressionforRecommenderSystems
CT5DM24 ConstructingQuery-DrivenDynamicMachine LearningModel WithApplicationtoProtein-
LigandBindingSitesPrediction
CT5DM25 ImprovingWebNavigationUsabilitybyComparingActual andAnticipatedUsage
CT5DM26 Network-BasedModelingandIntelligentDataMiningof Social MediaforImprovingCare
CT5DM27 Qualityof Experience User’sPerceptionaboutWebServices
CT5DM28 Real-Time Detectionof TrafficFromTwitterStreamAnalysis
IMAGE PROCESSING
CT5IP01 DetectionandRectificationof DistortedFingerprints
CT5IP02 Learningto RankImage Tags withLimitedTrainingExamples
CT5IP03 Single Image Super-ResolutionBasedon GradientProfileSharpness
INFORMATION FORENSICS AND SECURITY
CT5IS01 A Privacy-PreservingFrameworkforLarge-Scale Content-BasedInformationRetrieval
PARALLEL AND DISTRIBUTED
CT5PD01 A Secure andDynamicMulti-keywordRankedSearchScheme overEncryptedCloudData
CT5PD02 Cost-MinimizingDynamicMigrationof ContentDistributionServicesintoHybridClouds
CT5PD03 FRAppEDetectingMaliciousFacebookApplications
MOBILE COMPUTING
CT5MC01 Distortion-Aware ConcurrentMultipathTransfer forMobile VideoStreamingin
HeterogeneousWirelessNetworks
CT5MC02 Game-TheoreticTopologyControlforOpportunisticLocalizationinSparse Underwater
SensorNetworks
3. CT5MC03 JointOptimal DataRate andPowerAllocationinLossyMobile AdHocNetworkswith
Delay-ConstrainedTraffics
CT5MC04 FriendbookA Semantic-BasedFriendRecommendationSystemforSocial Networks
CT5MC05 Wormhole AttackDetectionAlgorithmsinWirelessNetworkCodingSystems
CT5MC06 Adaptive AlgorithmsforDiagnosingLarge-ScaleFailuresinComputerNetworks
CT5MC07 Aggregated-Proof BasedHierarchical AuthenticationScheme forthe Internetof Things
CT5MC08 AuthenticatedKeyExchange ProtocolsforParallel NetworkFile Systems
CT5MC09 Cost-Aware SEcure Routing(CASER) Protocol DesignforWirelessSensorNetworks
CT5MC10 DecentralizedComputationOffloadingGame forMobile CloudComputing
CT5MC11 Improvingthe NetworkLifetime of MANETsthroughCooperative MACProtocol Design
CT5MC12 Innovative SchemesforResource Allocation inthe CloudforMediaStreamingApplications
CT5MC13 RoutingPressure A Channel-RelatedandTraffic-Aware Metricof RoutingAlgorithm
CT5MC14 Secure andDistributedDataDiscoveryandDisseminationinWirelessSensorNetworks
CT5MC15 Secure andReliable RoutingProtocolsforHeterogeneousMultihopWirelessNetworks
CT5MC16 Interference-BasedTopologyControl AlgorithmforDelay-ConstrainedMobile AdHoc
Networks
CT5MC17 Self-OrganizingResource ManagementFrameworkinOFDMA Femtocells
CT5MC18 Max ContributionAnOnlineApproximationof OptimalResource AllocationinDelay
TolerantNetworks
WEB SERVICES
CT5WS01 ConstructingQuery-DrivenDynamicMachine LearningModel WithApplicationtoProtein-
LigandBindingSitesPrediction
CT5WS02 ImprovingWebNavigationUsabilitybyComparingActual andAnticipatedUsag
CT5WS03 Network-BasedModelingandIntelligentDataMiningof Social MediaforImprovingCare
CT5WS04 Qualityof Experience User’sPerceptionaboutWebServices
CT5WS05 AutomaticWeb Service CompositionBasedonUncertaintyExecutionEffects
CT5WS06 Constructinga Global Social Service NetworkforBetterQualityof WebService Discovery
CT5WS07 Data-DrivenCompositionforService-OrientedSituationalWebApplications
CT5WS08 DesigningHighPerformanceWeb-BasedComputingServicestoPromote Telemedicine
Database ManagementSystem
CT5WS09 DiversifyingWebServiceRecommendationResultsviaExploringService Usage History
NETWORKING
CT5NW01 A TopologyPotential-BasedMethodforIdentifyingEssentialProteinsfromPPINetworks
CT5NW02 ReceiverCooperationinTopologyControlforWirelessAd-HocNetworks
CT5NW03 DelayOptimizationandCross-LayerDesigninMultihopWirelessNetworksWithNetwork
CodingandSuccessive Interference Cancelation
CT5NW04 EnergyEfficientVirtual NetworkEmbeddingforCloudNetworks
CT5NW05 Statistical DisseminationControl inLarge Machine-to-Machine CommunicationNetworks
CT5NW06 DistributedDenialof Service AttacksinSoftware-DefinedNetworkingwithCloud
Computing
CT5NW07 NeighborSimilarityTrustagainstSybil AttackinP2PE-Commerce
CT5NW08 Passive IPTracebackDisclosingthe Locationsof IPSpoofersFromPathBackscatter
CT5NW09 SecurityOptimizationof DynamicNetworkswithProbabilisticGraphModelingandLinear