IEEE JAVA PROJECT TITLES 2013-2014

4
1POINTER TECHNOLOGY IEEE JAVA TITLES 2013 1. Toward Privacy Preserving And Collusion Resistance In A Location Proof Updating System 2. Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption 3. Distributed Detection In Mobile Access Wireless Sensor Networks Under Byzantine Attacks 4. Lightweight Sybil Attack Detection In MANNETs 5. FTH-B&B: A Fault Tolerant Hierarchical Branch And Bound For Large Scale Unreliable Environments 6. EPPDR: An Efficient Privacy Preserving Demand Response Scheme With Adaptive Key Evaluation In Smart Grid 7. SORT: A Self -Organizing Trust Model For Peer-Peer Systems 8. Cross Domain Privacy Preserving Cooperative Firewall Optimization 9. Using Fuzzy Logic Control To Provide Intelligent Traffic Management Service For High Speed Networks 10. A Survey Of Defense Mechanisms Against Denial Of Service (DDOS) Flooding Attacks 11. Social Tube: P2p Assisted Video Sharing In Online Social Network 12. Refining Reputation To Truly Select High-QoS Servers In Peer-Peer Networks 13. Attribute Aware Data Aggregation Using Potential Based Dynamic Routing In Wireless Sensor Network 14. Delay Tolerant Bulk Data Transfer On The Internet 15. Range Based Skyline Queries In Mobile Environment No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248 Email: [email protected] website: www.1pointer.com

description

FINAL YEAR CSE PROJECTS

Transcript of IEEE JAVA PROJECT TITLES 2013-2014

Page 1: IEEE JAVA PROJECT TITLES 2013-2014

1POINTER TECHNOLOGY

IEEE JAVA TITLES 2013

1. Toward Privacy Preserving And Collusion Resistance In A Location Proof Updating System

2. Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption

3. Distributed Detection In Mobile Access Wireless Sensor Networks Under Byzantine Attacks

4. Lightweight Sybil Attack Detection In MANNETs5. FTH-B&B: A Fault Tolerant Hierarchical Branch And Bound For Large Scale Unreliable

Environments6. EPPDR: An Efficient Privacy Preserving Demand Response Scheme With Adaptive Key

Evaluation In Smart Grid7. SORT: A Self -Organizing Trust Model For Peer-Peer Systems8. Cross Domain Privacy Preserving Cooperative Firewall Optimization9. Using Fuzzy Logic Control To Provide Intelligent Traffic Management Service For High

Speed Networks10. A Survey Of Defense Mechanisms Against Denial Of Service (DDOS) Flooding Attacks11. Social Tube: P2p Assisted Video Sharing In Online Social Network12. Refining Reputation To Truly Select High-QoS Servers In Peer-Peer Networks13. Attribute Aware Data Aggregation Using Potential Based Dynamic Routing In Wireless

Sensor Network14. Delay Tolerant Bulk Data Transfer On The Internet15. Range Based Skyline Queries In Mobile Environment16. A Symmetric Load Balancing Algorithm With Performance Guarantees For DHT17. Towards Secure Multi Keyword Top-K Retrieval Over Encrypted Cloud Data18. Dynamic Optimization Of Multi Attribute Resource Allocation In Self Organization

Clouds19. Privacy Preserving Back-Propagation Neural Networks Learning Made Practical With

Cloud Computing20. A Cloud Based Approach For Interoperable EHRs21. Electricity Cost Saving Strategies In Data Centers By Using Energy Storage22. A Truthful Dynamic Workflow Scheduling Mechanism For Commercial Multi Cloud

Environment23. Dynamic Resource Allocation Using Virtual Machines For Cloud Computing

Environment24. Hint Based Execution Of Workload In Cloud With Nefeli

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com

Page 2: IEEE JAVA PROJECT TITLES 2013-2014

1POINTER TECHNOLOGY

25. Performance Of Virtual Machines Under Networked Denial Of Service Attacks: Experiments And Analysis

26. Coaching The Exploration And Exploitation In Active Learning For Interactive Video Retrieval

27. Focus: Learning To Crawl Web Forums28. On The Investigation Of Cloud Based Mobile Media Environments With Service

Population And QoS Aware Mechanisms29. C-Mart: Benchmarking The Cloud30. Design And Implementation Of A Web Service Based Public Oriented Personalized

Health Care Platform31. Scalable Distributed Service Integrity Attestation for Software As A Service Clouds.32. Heap Graph Based Software Theft Detection33. Security And Privacy Enhancing Multi Cloud Architecture34. Nice: Network Intrusion Detection And Countermeasure Selection In Virtual Network

System35. Workload Based Software Rejuvenation In Cloud Systems36. Defeating Sql Injection37. Service Oriented Architecture In Variability Intensive Environment: Pitfalls And Best

Practices In The Example Of Local E-Government38. Systematic Elaboration Of Scalability Requirements Through Goal Obstacle Analysis39. A Software Suite For Efficient Use Of The European Qualifications Framework In

Online And Blended Courses40. Self Organizing Roles On Agile Software Development Team41. Context Dependent Logo Matching And Recognition42. Robust Document Image Binarization Technique For Degrade Document Images 43. Fingerprint Combination For Privacy Protection44. Automatic Segmentation Of Scaling In 2-D Psoriasis Skin Images45. Improving The Network Lifetime Of Mannets Through Cooperative Mac Protocol

Design46. Beyond Text QA: Multimedia Answer Generation By Harvesting Web Information47. CloudMoV: Cloud Based Mobile Social Network TV48. How To Use Search Engine Optimization Techniques To Increase Website Visibility49. A Method For Mining Infrequent Causal Association And Its Application In Finding

Adverse Drug Reaction Signal Pairs50. Reinforced Similarity Integration In Image Rich Information Networks51. Evaluating Data Reliability: An Evidential Answer With Application To A Web Enabled

Data Warehouse52. Discovering The Top-K Unexplained Sequences In Time Stamped Observation Data

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com

Page 3: IEEE JAVA PROJECT TITLES 2013-2014

1POINTER TECHNOLOGY

53. CDAMA: Concealed Data Aggregation Scheme For Multiple Application In Wireless Sensor Network

54. Infusing Social Network With Culture55. Pay-As-You-Go Entity Resolution56. A User-Friendly Patent Search Paradigm 57. Incentive Compatible Privacy Preserving Data Analysis58. Bad Data Injection Attack And Defense In Electricity Market Using Game Theory Study59. DNS For Massive Scale Command And Control60. Optimal Client-Server Assignment For Internet Distributed System61. A Distributed Control Law for Load Balancing In Content Delivery Networks.62. Fuzzy Web Data Tables Integration Guided By An Ontological And Terminological

Resource63. Conditional Privacy Preserving Security Protocol For NFC Application

………Your Own Concept Papers Can Be Accepted

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.Ph – 044 342323407; Mobile –9043350456, 9500139248

Email: [email protected] website: www.1pointer.com