2014 2015 ieee java projects titles list globalsoft technologies
IEEE JAVA PROJECT TITLES 2013-2014
-
Upload
onepointer -
Category
Documents
-
view
65 -
download
0
description
Transcript of IEEE JAVA PROJECT TITLES 2013-2014
1POINTER TECHNOLOGY
IEEE JAVA TITLES 2013
1. Toward Privacy Preserving And Collusion Resistance In A Location Proof Updating System
2. Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption
3. Distributed Detection In Mobile Access Wireless Sensor Networks Under Byzantine Attacks
4. Lightweight Sybil Attack Detection In MANNETs5. FTH-B&B: A Fault Tolerant Hierarchical Branch And Bound For Large Scale Unreliable
Environments6. EPPDR: An Efficient Privacy Preserving Demand Response Scheme With Adaptive Key
Evaluation In Smart Grid7. SORT: A Self -Organizing Trust Model For Peer-Peer Systems8. Cross Domain Privacy Preserving Cooperative Firewall Optimization9. Using Fuzzy Logic Control To Provide Intelligent Traffic Management Service For High
Speed Networks10. A Survey Of Defense Mechanisms Against Denial Of Service (DDOS) Flooding Attacks11. Social Tube: P2p Assisted Video Sharing In Online Social Network12. Refining Reputation To Truly Select High-QoS Servers In Peer-Peer Networks13. Attribute Aware Data Aggregation Using Potential Based Dynamic Routing In Wireless
Sensor Network14. Delay Tolerant Bulk Data Transfer On The Internet15. Range Based Skyline Queries In Mobile Environment16. A Symmetric Load Balancing Algorithm With Performance Guarantees For DHT17. Towards Secure Multi Keyword Top-K Retrieval Over Encrypted Cloud Data18. Dynamic Optimization Of Multi Attribute Resource Allocation In Self Organization
Clouds19. Privacy Preserving Back-Propagation Neural Networks Learning Made Practical With
Cloud Computing20. A Cloud Based Approach For Interoperable EHRs21. Electricity Cost Saving Strategies In Data Centers By Using Energy Storage22. A Truthful Dynamic Workflow Scheduling Mechanism For Commercial Multi Cloud
Environment23. Dynamic Resource Allocation Using Virtual Machines For Cloud Computing
Environment24. Hint Based Execution Of Workload In Cloud With Nefeli
No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248
Email: [email protected] website: www.1pointer.com
1POINTER TECHNOLOGY
25. Performance Of Virtual Machines Under Networked Denial Of Service Attacks: Experiments And Analysis
26. Coaching The Exploration And Exploitation In Active Learning For Interactive Video Retrieval
27. Focus: Learning To Crawl Web Forums28. On The Investigation Of Cloud Based Mobile Media Environments With Service
Population And QoS Aware Mechanisms29. C-Mart: Benchmarking The Cloud30. Design And Implementation Of A Web Service Based Public Oriented Personalized
Health Care Platform31. Scalable Distributed Service Integrity Attestation for Software As A Service Clouds.32. Heap Graph Based Software Theft Detection33. Security And Privacy Enhancing Multi Cloud Architecture34. Nice: Network Intrusion Detection And Countermeasure Selection In Virtual Network
System35. Workload Based Software Rejuvenation In Cloud Systems36. Defeating Sql Injection37. Service Oriented Architecture In Variability Intensive Environment: Pitfalls And Best
Practices In The Example Of Local E-Government38. Systematic Elaboration Of Scalability Requirements Through Goal Obstacle Analysis39. A Software Suite For Efficient Use Of The European Qualifications Framework In
Online And Blended Courses40. Self Organizing Roles On Agile Software Development Team41. Context Dependent Logo Matching And Recognition42. Robust Document Image Binarization Technique For Degrade Document Images 43. Fingerprint Combination For Privacy Protection44. Automatic Segmentation Of Scaling In 2-D Psoriasis Skin Images45. Improving The Network Lifetime Of Mannets Through Cooperative Mac Protocol
Design46. Beyond Text QA: Multimedia Answer Generation By Harvesting Web Information47. CloudMoV: Cloud Based Mobile Social Network TV48. How To Use Search Engine Optimization Techniques To Increase Website Visibility49. A Method For Mining Infrequent Causal Association And Its Application In Finding
Adverse Drug Reaction Signal Pairs50. Reinforced Similarity Integration In Image Rich Information Networks51. Evaluating Data Reliability: An Evidential Answer With Application To A Web Enabled
Data Warehouse52. Discovering The Top-K Unexplained Sequences In Time Stamped Observation Data
No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248
Email: [email protected] website: www.1pointer.com
1POINTER TECHNOLOGY
53. CDAMA: Concealed Data Aggregation Scheme For Multiple Application In Wireless Sensor Network
54. Infusing Social Network With Culture55. Pay-As-You-Go Entity Resolution56. A User-Friendly Patent Search Paradigm 57. Incentive Compatible Privacy Preserving Data Analysis58. Bad Data Injection Attack And Defense In Electricity Market Using Game Theory Study59. DNS For Massive Scale Command And Control60. Optimal Client-Server Assignment For Internet Distributed System61. A Distributed Control Law for Load Balancing In Content Delivery Networks.62. Fuzzy Web Data Tables Integration Guided By An Ontological And Terminological
Resource63. Conditional Privacy Preserving Security Protocol For NFC Application
………Your Own Concept Papers Can Be Accepted
No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248
Email: [email protected] website: www.1pointer.com