SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
Dotnet IEEE Projects Titles – 2016-2017
LeMeniz Infotech
36, 100 feet Road, Natesan Nagar( Near Indira Gandhi Statue and Next to Fish-O-Fish),
Pondicherry-605 005
Web : www.ieeemaster.com / www.lemenizinfotech.com
Mail : info@lemenizinfotech.com / projects@lemenizinfotech.com
Phone : 9566355386 / 9962588976
S.No Title Year
IEEE based on CLOUD COMPUTING
1 AMTS: Adaptive multi-objective task scheduling strategy in cloud
computing
2016
2 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016
3 Security in Cloud-Computing-Based Mobile Health 2016
4 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016
5 CDA Generation and Integration for Health Information Exchange
Based on Cloud
2016
6 Model-Driven Development Patterns for Mobile Services in Cloud of
Things
2016
7 An anomalous behavior detection model in cloud computing 2016
8 Optimizing Cost for Online Social Networks on Geo-Distributed
Clouds
2016
9 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing 2016
10 A Modified Hierarchical Attribute-Based Encryption Access Control
Method for Mobile Cloud Computing
2016
11 Secure Data Sharing in Cloud Computing Using Revocable-Storage
Identity-Based Encryption
2016
12 Online Resource Scheduling Under Concave Pricing for Cloud
Computing
2016
13 Dynamic Operations of Cloud Radio Access Networks (C-RAN) for
Mobile Cloud Computing
2016
14 CloudArmor: Supporting Reputation-Based Trust Management for
Cloud Services
2016
15 A Dynamical and Load-Balanced Flow Scheduling Approach for Big
Data Centers in Clouds Systems
2016
16 Analysis of classical encryption techniques in cloud computing 2016
17 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its
Application to Cloud Email
2016
18 Identity-Based Proxy-Oriented Data Uploading and Remote Data
Integrity Checking in Public Cloud
2016
19 Dynamic Resource Partitioning for Heterogeneous Multi-Core-
BasedCloud Computing in Smart Cities
2016
20 Energy-efficient Adaptive Resource Management for Real-time
Vehicular Cloud Services
2016
21 An Efficient File Hierarchy Attribute-Based Encryption Scheme in
Cloud Computing
2016
22 Encrypted Data Management with Deduplication in Cloud Computing 2016
23 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016
24 Online Resource Scheduling Under Concave Pricing for Cloud
Computing
2016
IEEE based on DATA MINING
1 A Survey on Trajectory Data Mining: Techniques and Applications 2016
2 Scalable Semi-Supervised Learning by Efficient Anchor Graph
Regularization
2016`
3 A Comprehensive Study on Willingness Maximization for Social
Activity Planning with Quality Guarantee
2016
4 Mining Graphs for Understanding Time-Varying Volumetric Data 2016
5 Location Aware Keyword Query Suggestion Based on Document
Proximity
2016
6 Cyberbullying Detection based on Semantic-Enhanced Marginalized
Denoising Auto-Encoder
2016
7 Resolving Multi-Party Privacy Conflicts in Social Media 2016
8 Pattern mining in linked data by edge-labeling 2016
9 Model of human knowledge extraction for a KBS using reasoning
cases
2016
10 Privacy-Preserving-Outsourced Association Rule Mining on Vertically
Partitioned Databases
2016
11 Cross-Platform Identification of Anonymous Identical Users in
Multiple Social Media Networks
2016
12 Mining User-Aware Rare Sequential Topic Patterns in Document
Streams
2016
13 Online Ensemble Learning of Data Streams with Gradually Evolved
Classes
2016
14 Top-k Dominating Queries on Incomplete Data 2016
15 Extracting Cross-Ontology Weighted Association Rules from Gene
Ontology Annotations
2016
16 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User
Environment
2016
17 Mining Health Examination Records — A Graph-based Approach 2016
18 Computing Tools and Techniques for Emergency Response 2016
19 Pattern Based Sequence Classification 2016
20 Mining User-Aware Rare Sequential Topic Patterns in Document
Streams
2016
21 Rating Prediction based on Social Sentiment from Textual Reviews 2016
22 User Preference Learning for Online Social Recommendation 2016
23 Predicting Student Performance Using Personalized Analytics 2016
24 Automatically Mining Facets for Queries from Their Search Results 2016
25 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016
26 Object Discovery: Soft Attributed Graph Mining 2016
27 Classification-based Mining of Reusable Components on Software
Product Lines
2016
28 Fault Diagnosis of Multimode Processes Based on Similarities 2016
29 A Reversible Data Hiding Scheme Based on Code Division
Multiplexing
2016
30 Reversible Data Hiding in Encrypted Images With Distributed Source
Encoding
2016
31 Secure Reversible Image Data Hiding Over Encrypted Domain via Key
Modulation
2016
32 Automatically Mining Facets for Queries from Their Search Results 2016
IEEE based on NETWORK SECURITY
1 A Survey of Security in Software Defined Networks 2016
2 OpenSec: Policy-Based Security Using Software-Defined Networking
Security
2016
3 Cloud Belief Rule Base Model for Network Security Situation
Prediction
2016
4 On the vulnerabilities of Voronoi-based approaches to mobile sensor
Deployment
2016
5 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc
Networks
2016
6 Comprehensive survey on security services in vehicular ad-hoc
networks
2016
7 Collusion-resistant unidirectional proxy re-encryption scheme from
lattices
2016
8 Fast multi-pattern matching algorithm on compressed network traffic 2016
9 Bayes-based ARP attack detection algorithm for cloud centers 2016
IEEE based on WEB MINING
1 Web Service Personalized Quality of Service Prediction via
Reputation-Based Matrix Factorization
2016
2 Performance Evaluation of Transactional Composite Web Services 2016
3 Connecting Social Media to E-Commerce: Cold-Start Product
Recommendation Using Micro
2016
4 Social Friend Recommendation Based on Multiple Network
Correlation
2016
IEEE based on Secure computing
1 Secure Auditing and Deduplicating Data in Cloud 2016
2 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over
Encrypted Cloud Data
2016
3 A key-centric processor architecture for secure computing 2016
4 Efficient Anonymous Message Submission 2016
5 A Secure Management Scheme Designed in Cloud 2016
6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group
User Revocation
2016
7 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in
the Cloud
2016
8 Secure Auditing and Deduplicating Data in Cloud 2016
9 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over
Encrypted Cloud Data
2016
10 Secure access delegation of encrypted medical information 2016
11 Secure inter cloud data migration 2016
12 Group Key Agreement with Local Connectivity 2016
IEEE based on IMAGES PROCESSING
1 Blind Image Blur Estimation via Deep Learning 2016
2 Bitplane Image Coding With Parallel Coefficient Processing 2016
3 Automatic Design of Color Filter Arrays in the Frequency Domain 2016
4 Texture Classification Using Dense Micro-Block Difference 2016
5 Super-Resolution of Multi-Observed RGB-D Images Based on
Nonlocal Regression and Total Variation
2016
6 Image Segmentation Using Parametric Contours With Free Endpoints 2016
7 Analyzing the Effect of JPEG Compression on Local Variance of Image
Intensity
2016
8 Multi-Scale Patch-Based Image Restoration 2016
9 Image Sharpness Assessment by Sparse Representation 2016

Contenu connexe

En vedette

Communities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech weekCommunities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech week
danielhfowler
 
Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_Attendance
Swedish Technology
 

En vedette (14)

Communities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech weekCommunities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech week
 
Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_Attendance
 
Project
ProjectProject
Project
 
A nonisolated three port dc–dc converter and three-domain control method for ...
A nonisolated three port dc–dc converter and three-domain control method for ...A nonisolated three port dc–dc converter and three-domain control method for ...
A nonisolated three port dc–dc converter and three-domain control method for ...
 
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
 
Ppt2
Ppt2Ppt2
Ppt2
 
Lektura Zypa Cupak
Lektura Zypa CupakLektura Zypa Cupak
Lektura Zypa Cupak
 
Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .
 
Vmbuddies coordinating live migration of multi tier applications in cloud env...
Vmbuddies coordinating live migration of multi tier applications in cloud env...Vmbuddies coordinating live migration of multi tier applications in cloud env...
Vmbuddies coordinating live migration of multi tier applications in cloud env...
 
Ethereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and thingsEthereum: A decentralized software platform for people and things
Ethereum: A decentralized software platform for people and things
 
Scalable distributed processing of k nearest neighbor queries over moving obj...
Scalable distributed processing of k nearest neighbor queries over moving obj...Scalable distributed processing of k nearest neighbor queries over moving obj...
Scalable distributed processing of k nearest neighbor queries over moving obj...
 
Solar Panels
Solar PanelsSolar Panels
Solar Panels
 
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
 
Retouched pictures
Retouched picturesRetouched pictures
Retouched pictures
 

Similaire à Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017

Java Project titles adrit solutions
Java Project titles adrit solutionsJava Project titles adrit solutions
Java Project titles adrit solutions
Adrit Techno Solutions
 

Similaire à Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017 (20)

2016 and 2017 IEEE for BE @ TMKS Infotech
2016 and 2017 IEEE for BE @ TMKS Infotech2016 and 2017 IEEE for BE @ TMKS Infotech
2016 and 2017 IEEE for BE @ TMKS Infotech
 
2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech2016 and 2017 Networking Projects @ TMKS Infotech
2016 and 2017 Networking Projects @ TMKS Infotech
 
2016 and 2017 IEEE For BE & MTech @ TMKS Infotech
2016 and 2017 IEEE For BE & MTech @ TMKS Infotech2016 and 2017 IEEE For BE & MTech @ TMKS Infotech
2016 and 2017 IEEE For BE & MTech @ TMKS Infotech
 
2016 and 2017 Cloud Computing Projects @ TMKS Infotech
2016 and 2017 Cloud Computing Projects @ TMKS Infotech2016 and 2017 Cloud Computing Projects @ TMKS Infotech
2016 and 2017 Cloud Computing Projects @ TMKS Infotech
 
2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech2016 and 2017 IEEE For MTech @ TMKS Infotech
2016 and 2017 IEEE For MTech @ TMKS Infotech
 
2016 and 2017 Android Projects @ TMKS Infotech
2016 and 2017 Android Projects @ TMKS Infotech2016 and 2017 Android Projects @ TMKS Infotech
2016 and 2017 Android Projects @ TMKS Infotech
 
2016 and 2017 IEEE Titles
2016 and 2017 IEEE Titles2016 and 2017 IEEE Titles
2016 and 2017 IEEE Titles
 
2016 and 2017 IEEE For IS and IT @ TMKS Infotech
2016 and 2017 IEEE For IS and IT @ TMKS Infotech2016 and 2017 IEEE For IS and IT @ TMKS Infotech
2016 and 2017 IEEE For IS and IT @ TMKS Infotech
 
2016 and 2017 IEEE For CSE and CS @ TMKS Infotech
2016 and 2017 IEEE For CSE and CS @ TMKS Infotech2016 and 2017 IEEE For CSE and CS @ TMKS Infotech
2016 and 2017 IEEE For CSE and CS @ TMKS Infotech
 
2016 and 2017 Data Mining Projects @ TMKS Infotech
2016 and 2017 Data Mining Projects @ TMKS Infotech2016 and 2017 Data Mining Projects @ TMKS Infotech
2016 and 2017 Data Mining Projects @ TMKS Infotech
 
Cloud Computing Projects in Phagwara Jalandhar
Cloud Computing Projects in Phagwara JalandharCloud Computing Projects in Phagwara Jalandhar
Cloud Computing Projects in Phagwara Jalandhar
 
Cloud Computing Projects in Chandigarh
Cloud Computing Projects in ChandigarhCloud Computing Projects in Chandigarh
Cloud Computing Projects in Chandigarh
 
Java Project titles adrit solutions
Java Project titles adrit solutionsJava Project titles adrit solutions
Java Project titles adrit solutions
 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14
 
2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor Networks2017 and 2018 Wireless Sensor Networks
2017 and 2018 Wireless Sensor Networks
 
2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc Networks2017 and 2018 Adhoc Networks
2017 and 2018 Adhoc Networks
 
2017 and 2018 Software Engineering
2017 and 2018 Software Engineering2017 and 2018 Software Engineering
2017 and 2018 Software Engineering
 
2017 and 2018 Secure Computing
2017 and 2018 Secure Computing2017 and 2018 Secure Computing
2017 and 2018 Secure Computing
 
2017 and 2018 Network Security
2017 and 2018 Network Security2017 and 2018 Network Security
2017 and 2018 Network Security
 
2017 and 2018 Neural Networks
2017 and 2018 Neural Networks2017 and 2018 Neural Networks
2017 and 2018 Neural Networks
 

Plus de LeMeniz Infotech

Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 

Plus de LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Dernier

Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017

  • 1. Dotnet IEEE Projects Titles – 2016-2017 LeMeniz Infotech 36, 100 feet Road, Natesan Nagar( Near Indira Gandhi Statue and Next to Fish-O-Fish), Pondicherry-605 005 Web : www.ieeemaster.com / www.lemenizinfotech.com Mail : info@lemenizinfotech.com / projects@lemenizinfotech.com Phone : 9566355386 / 9962588976 S.No Title Year IEEE based on CLOUD COMPUTING 1 AMTS: Adaptive multi-objective task scheduling strategy in cloud computing 2016 2 An Efficient Privacy-Preserving Ranked Keyword Search Method 2016 3 Security in Cloud-Computing-Based Mobile Health 2016 4 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 5 CDA Generation and Integration for Health Information Exchange Based on Cloud 2016 6 Model-Driven Development Patterns for Mobile Services in Cloud of Things 2016 7 An anomalous behavior detection model in cloud computing 2016
  • 2. 8 Optimizing Cost for Online Social Networks on Geo-Distributed Clouds 2016 9 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing 2016 10 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing 2016 11 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption 2016 12 Online Resource Scheduling Under Concave Pricing for Cloud Computing 2016 13 Dynamic Operations of Cloud Radio Access Networks (C-RAN) for Mobile Cloud Computing 2016 14 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services 2016 15 A Dynamical and Load-Balanced Flow Scheduling Approach for Big Data Centers in Clouds Systems 2016 16 Analysis of classical encryption techniques in cloud computing 2016 17 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email 2016 18 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud 2016
  • 3. 19 Dynamic Resource Partitioning for Heterogeneous Multi-Core- BasedCloud Computing in Smart Cities 2016 20 Energy-efficient Adaptive Resource Management for Real-time Vehicular Cloud Services 2016 21 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing 2016 22 Encrypted Data Management with Deduplication in Cloud Computing 2016 23 Dynamic and Public Auditing with Fair Arbitration for Cloud Data 2016 24 Online Resource Scheduling Under Concave Pricing for Cloud Computing 2016 IEEE based on DATA MINING 1 A Survey on Trajectory Data Mining: Techniques and Applications 2016 2 Scalable Semi-Supervised Learning by Efficient Anchor Graph Regularization 2016` 3 A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee 2016 4 Mining Graphs for Understanding Time-Varying Volumetric Data 2016 5 Location Aware Keyword Query Suggestion Based on Document Proximity 2016
  • 4. 6 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder 2016 7 Resolving Multi-Party Privacy Conflicts in Social Media 2016 8 Pattern mining in linked data by edge-labeling 2016 9 Model of human knowledge extraction for a KBS using reasoning cases 2016 10 Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases 2016 11 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks 2016 12 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 13 Online Ensemble Learning of Data Streams with Gradually Evolved Classes 2016 14 Top-k Dominating Queries on Incomplete Data 2016 15 Extracting Cross-Ontology Weighted Association Rules from Gene Ontology Annotations 2016 16 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environment 2016
  • 5. 17 Mining Health Examination Records — A Graph-based Approach 2016 18 Computing Tools and Techniques for Emergency Response 2016 19 Pattern Based Sequence Classification 2016 20 Mining User-Aware Rare Sequential Topic Patterns in Document Streams 2016 21 Rating Prediction based on Social Sentiment from Textual Reviews 2016 22 User Preference Learning for Online Social Recommendation 2016 23 Predicting Student Performance Using Personalized Analytics 2016 24 Automatically Mining Facets for Queries from Their Search Results 2016 25 Efficient Algorithms for Mining Top-K High Utility Itemsets 2016 26 Object Discovery: Soft Attributed Graph Mining 2016 27 Classification-based Mining of Reusable Components on Software Product Lines 2016 28 Fault Diagnosis of Multimode Processes Based on Similarities 2016 29 A Reversible Data Hiding Scheme Based on Code Division Multiplexing 2016
  • 6. 30 Reversible Data Hiding in Encrypted Images With Distributed Source Encoding 2016 31 Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation 2016 32 Automatically Mining Facets for Queries from Their Search Results 2016 IEEE based on NETWORK SECURITY 1 A Survey of Security in Software Defined Networks 2016 2 OpenSec: Policy-Based Security Using Software-Defined Networking Security 2016 3 Cloud Belief Rule Base Model for Network Security Situation Prediction 2016 4 On the vulnerabilities of Voronoi-based approaches to mobile sensor Deployment 2016 5 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks 2016 6 Comprehensive survey on security services in vehicular ad-hoc networks 2016 7 Collusion-resistant unidirectional proxy re-encryption scheme from lattices 2016 8 Fast multi-pattern matching algorithm on compressed network traffic 2016
  • 7. 9 Bayes-based ARP attack detection algorithm for cloud centers 2016 IEEE based on WEB MINING 1 Web Service Personalized Quality of Service Prediction via Reputation-Based Matrix Factorization 2016 2 Performance Evaluation of Transactional Composite Web Services 2016 3 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Micro 2016 4 Social Friend Recommendation Based on Multiple Network Correlation 2016 IEEE based on Secure computing 1 Secure Auditing and Deduplicating Data in Cloud 2016 2 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 3 A key-centric processor architecture for secure computing 2016 4 Efficient Anonymous Message Submission 2016 5 A Secure Management Scheme Designed in Cloud 2016 6 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 2016
  • 8. 7 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2016 8 Secure Auditing and Deduplicating Data in Cloud 2016 9 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data 2016 10 Secure access delegation of encrypted medical information 2016 11 Secure inter cloud data migration 2016 12 Group Key Agreement with Local Connectivity 2016 IEEE based on IMAGES PROCESSING 1 Blind Image Blur Estimation via Deep Learning 2016 2 Bitplane Image Coding With Parallel Coefficient Processing 2016 3 Automatic Design of Color Filter Arrays in the Frequency Domain 2016 4 Texture Classification Using Dense Micro-Block Difference 2016 5 Super-Resolution of Multi-Observed RGB-D Images Based on Nonlocal Regression and Total Variation 2016 6 Image Segmentation Using Parametric Contours With Free Endpoints 2016
  • 9. 7 Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity 2016 8 Multi-Scale Patch-Based Image Restoration 2016 9 Image Sharpness Assessment by Sparse Representation 2016