M.tech java list 2013

8
SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com M.TECH JAVA LIST 2013-14 S. No Project Code Project Title Domain Year 1 J1301 Privacy-Preserving Public Auditing for Secure Cloud Storage Cloud Computing 2013 2 J1302 Winds of Change from Vendor Lock-In to the Meta Cloud Cloud Computing 2013 3 J1303 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in Cloud Computing 2013 4 J1304 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Cloud Computing 2013 5 J1305 Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing 2013 6 J1306 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing 2013 7 J1307 CloudMoV: Cloud-based Mobile Social TV Cloud Computing 2013 8 J1308 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Cloud Computing 2013 9 J1309 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Cloud Computing 2013 10 J1310 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Cloud Computing 2013

description

Here the list of JAVA for M.tech students. you can download the list by download option. If you have any queries contact me @ +91 9603999243

Transcript of M.tech java list 2013

Page 1: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

M.TECH JAVA LIST 2013-14

S. No Project

Code Project Title Domain Year

1 J1301 Privacy-Preserving Public Auditing for

Secure Cloud Storage

Cloud

Computing 2013

2 J1302 Winds of Change from Vendor Lock-In to

the Meta Cloud

Cloud

Computing 2013

3 J1303 AMES-Cloud: A Framework of Adaptive

Mobile Video Streaming and Efficient

Social Video Sharing in

the Clouds

Cloud

Computing 2013

4

J1304

A Load Balancing Model Based on Cloud

Partitioning for the

Public Cloud

Cloud

Computing 2013

5

J1305

Privacy Preserving Delegated Access

Control in Public Clouds

Cloud

Computing

2013

6

J1306

A Stochastic Model to Investigate Data

Center Performance and QoS in IaaS Cloud

Computing Systems

Cloud

Computing 2013

7

J1307 CloudMoV: Cloud-based Mobile Social TV

Cloud

Computing 2013

8

J1308

Dynamic Resource Allocation Using Virtual

Machines for Cloud Computing

Environment

Cloud

Computing

2013

9

J1309

Error-Tolerant Resource Allocation and

Payment Minimization for Cloud System

Cloud

Computing

2013

10

J1310

Harnessing the Cloud for Securely

Outsourcing Large-Scale Systems of Linear

Equations

Cloud

Computing

2013

Page 2: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

11

J1311 Mona: Secure Multi-Owner Data Sharing

for Dynamic Groups in the Cloud

Cloud

Computing

2013

12

J1312

PACK: Prediction-Based Cloud Bandwidth

and Cost Reduction System

Cloud

Computing

2013

13

J1313

Scalable and Secure Sharing of Personal

Health Records in Cloud Computing Using

Attribute-Based Encryption

Cloud

Computing

2013

14

J1314

Enabling Dynamic Data and Indirect Mutual

Trust for Cloud

Computing Storage Systems

Cloud

Computing 2013

15

J1315 Load Rebalancing for Distributed File

Systems in Clouds

Cloud

Computing

2013

16

J1316

Optimizing Cloud Resources for

Delivering IPTV Services Through

Virtualization

Cloud

Computing

2013

17

J1317

Attribute-Based Encryption With

Verifiable Outsourced Decryption Cloud

Computing

2013

18

J1318

A Fast Clustering-Based Feature Subset

Selection Algorithm for High-

Dimensional Data

DATA

MINING 2013

19

J1319

CloudMoV: Cloud-based Mobile Social TV

DATA

MINING 2013

20

J1320

Crowd sourcing Predictors of Behavioral

Outcomes

DATA

MINING

2013

Page 3: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

21

J1321

Spatial Approximate String Search DATA

MINING

2013

22

J1322 Incentive Compatible Privacy-Preserving

Data Analysis

DATA

MINING

2013

23

J1323 Focus Learning to Crawl Web Forums DATA

MINING 2013

24

J1324 Robust Module Based Data Management DATA

MINING 2013

25

J1325 Comparable Entity Mining from Comparative Questions

DATA

MINING 2013

26 J1326 Facilitating Effective User Navigation

through Website Structure Improvement DATA

MINING 2013

27

J1327 PMSE: A Personalized Mobile Search Engine

DATA

MINING 2013

28

J1328 Sensitive Label Privacy Protection on Social Network Data

DATA

MINING 2013

29

J1329 . A System to Filter Unwanted Messages from OSN User Walls

DATA

MINING 2013

30

J1330 A New Algorithm for Inferring User Search

Goals with Feedback Sessions

DATA

MINING 2013

31 J1331

Annotating Search Results from Web

Databases

DATA

MINING

2013

Page 4: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

32

J1332 Anomaly Detection via Online Over-

Sampling Principal Component Analysis

DATA

MINING

2013

33

J1333 Distributed Processing of Probabilistic Top-

k Queries in Wireless Sensor Networks

DATA

MINING

2013

34

J1334 m-Privacy for Collaborative Data

Publishing

DATA

MINING

2013

35

J1335 Protecting Sensitive Labels in Social

Network Data Anonymization

DATA

MINING 2013

36

J1336 Tweet Analysis for Real-Time Event

Detection and Earthquake

DATA

MINING 2013

37

J1337

Document Clustering for Forensic

Analysis: An Approach for

Improving

Computer

Inspection

DATA

MINING

2013

38

J1338

A Method for Mining Infrequent

Causal Associations and Its

Application in Finding Adverse

Drug Reaction Signal Pairs

DATA

MINING

2013

39

J1339

Clustering Sentence-Level Text Using

a Novel Fuzzy Relational

Clust

ering

Algo

rithm

DATA

MINING

2013

40

J1340

Facilitating Document Annotation

using Content and Querying

V

a

l

u

e

DATA

MINING 2013

41

J1341

A Generalized Flow-Based Method

for Analysis of Implicit

Relationsh

ips on

Wikipedia

DATA

MINING 2013

Page 5: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

42

J1342

Anonymization of Centralized and

Distributed Social Networks by

Seque

ntial

Clust

ering

DATA

MINING

2013

43

J1343

Intrusion Detection Technique by using

K-means, Fuzzy Neural

Network

and SVM

classifiers.

DATA

MINING

2013

44

J1344

Preventing Private Information

Inference Attacks on Social

N

e

t

w

o

r

k

s

DATA

MINING 2013

45

J1345

Multiparty Access Control for Online

Social Networks Model and

M

e

c

h

a

n

i

s

m

s

DATA

MINING 2013

46

J1346

EAACK—A Secure Intrusion-

Detection System for MANETs

DATA

MINING

2013

47

J1347

Identity-Based Secure Distributed Data

Storage Schemes

DATA

MINING

2013

48

J1348 Modeling the Pairwise Key

Predistribution Scheme in the Presence

of Unreliable Links

DATA

MINING

2013

49

J1349 A Highly Scalable Key Pre-Distribution

Scheme for Wireless Sensor Networks Networking

2013

50

J1350 Optimizing Cloud Resources for Delivering

IPTV Services through Virtualization Networking

2013

51

J1351 Mining contract s for business event and

temporal constraints in service engagement Networking

2013

Page 6: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

52

J1352 Fully Anonymous Profile Matching in

Mobile Social Networks Networking

2013

53

J1353 Access Policy Consolidation for Event

Processing Systems Networking

2013

54

J1354 Price Differentiation for Communication

Networks Networking 2013

55 J1355

Delay-Based Network Utility Maximization Networking 2013

56

J356 Dynamic Control of Coding for Progressive

Packet Arrivals in DTNs Networking 2013

57

J1357

Minimum Cost Blocking Problem in

Multi-path Wireless Routing

P

r

o

t

o

c

o

l

s

Networking

2013

58

J1358 On the Node Clone Detection in Wireless

Sensor Networks

Networking 2013

59

J1359 Opportunistic MANETs: Mobility

Can Make Up for LowTransmission

Power

Networking 2013

60

J1360

Back-Pressure-Based Packet-by-

Packet Adaptive Routing in

Communi

cation

Networks

Networking 2013

61

J1361

Fast Transmission to Remote

Cooperative Groups: A New Key

Manage

ment

Paradig

m

Networking

2013

Page 7: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

62

J1362

Participatory Privacy: Enabling Privacy

in Participatory Sensing

Networking

2013

63

J1363 Using Fuzzy Logic Control to Provide

Intelligent Traffic Management Service for

High-Speed Networks

Networking 2013

64

J1364 CAM: Cloud-Assisted Privacy Preserving

Mobile Health Monitoring.

Secure

Computing 2013

65

J1365 Utility-Privacy Tradeoff in Databases An

Information-theoretic Approach.

Secure

Computing 2013

66

J1366 Extracting Spread-Spectrum Hidden Data

from Digital Media

Secure

Computing 2013

67

J1367 Two tales of privacy in online social

networks

Secure

Computing 2013

68

J1368 Dynamic Resource Allocation using Virtual

Machines for Cloud Computing

Environment

Parallel and

Distributed

Systems

2013

69

J1369 Mobile Relay Configuration in Data-

intensive Wireless Sensor Networks.

Mobile

Computing

2013

70

J1370 Vampire attacks: Draining life from

wireless ad-hoc sensor networks.

Mobile

Computing

2013

71

J1371 Towards a Statistical Framework for Source

Anonymity in Sensor Networks

Mobile

Computing

2013

Page 8: M.tech java list  2013

SAK INFORMATICS (0)9603999243, 8333034195

#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad [email protected] www.sakinformatics.com

72

J1372 A Scalable Server Architecture for Mobile

Presence Services in Social Network

Applications

Mobile

Computing

2013

73

J1373 Privacy-Preserving Distributed Profile

Matching in Proximity-based Mobile Social

Networks

Mobile

Computing

2013

74

J1374 Distributed Cooperative Caching in Social

Wireless Networks

Mobile

Computing

2013