2013 - 2014 JAVA IEEE Project Titles
CLOUD COMPUTING PROJECT TITLES
1) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
2) CloudMoV: Cloud-based Mobile Social TV
3) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
4) Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
5) Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
6) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
7) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
8) Privacy-Preserving Public Auditing for Secure Cloud Storage
10) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
KNOWLEDGE AND DATA ENGINEERINGPROJECT TITLES
11) A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
12) A New Algorithm for Inferring User Search Goals with Feedback Sessions
13) Annotating Search Results from Web Databases
14)Anomaly Detection via Online Over-Sampling Principal Component Analysis
15) Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
16) m-Privacy for Collaborative Data Publishing
17) Protecting Sensitive Labels in Social Network Data Anonymization
18) Tweet Analysis for Real-Time Event Detection and Earthquake
SECURE COMPUTING PROJECT TITLES
20) EAACK—A Secure Intrusion-Detection System for MANETs
21) Identity-Based Secure Distributed Data Storage Schemes
22) Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
23) NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
24) Privacy Preserving Data Sharing With Anonymous ID Assignment
25) Securing Class Initialization in Java-like Languages
26) Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
27) SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
28) WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
NETWORKING PROJECT TITLES
29) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
30) Delay-Based Network Utility Maximization
31) Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
32) A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
33) Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
34) IP-Geolocation Mapping for Moderately Connected Internet Regions
35) Optimal Client-Server Assignment for Internet Distributed Systems
MOBILE COMPUTING PROJECT TITLES
36) Content Sharing over Smartphone-Based Delay-Tolerant Networks
38) Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
39) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
PATTERN ANALYSIS AND MACHINE INTELLIGENCE PROJECT TITLES
40) A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
SERVICES COMPUTING PROJECT TITLES
41) A Decentralized Service Discovery Approach on Peer-to-Peer Networks
42) Personalized QoS-Aware Web Service Recommendation and Visualization
43) Privacy-Enhanced Web Service Composition
SOFTWARE ENGINEERING PROJECT TITLES
44) Whole Test Suite Generation
LATEST PROJECT TITLES:
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
Two tales of privacy in online social networks
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
On the Node Clone Detection in Wireless Sensor Networks
Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
Load Rebalancing for Distributed File Systems in Clouds
Toward a Statistical Framework for Source Anonymity in Sensor Networks
Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
Crowdsourcing Predictors of Behavioral Outcomes
Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
Participatory Privacy: Enabling Privacy in Participatory Sensing
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
Facilitating Document Annotation using Content and Querying Value
Privacy Preserving Delegated Access Control in Public Clouds
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
A System to Filter Unwanted Messages from OSN User Walls
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
Understanding the External Links of Video Sharing Sites: Measurement and Analysis
Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers.
Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
Spatial Approximate String Search
Preventing Private Information Inference Attacks on Social Networks
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
SocialTube P2P-assisted Video Sharing in Online Social Networks
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
Multiparty Access Control for Online Social Networks Model and Mechanisms
Incentive Compatible Privacy-Preserving Data Analysis
Attribute-Based Encryption With Verifiable Outsourced Decryption
Securing Online Reputation Systems through Trust Modeling and Temporal Analysis
Fault Node Recovery Algorithm for a Wireless Sensor Network
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
ABACUS: An Auction-Based Approach to Cloud Service Differentiation
Facilitating Effective User Navigation through Website Structure Improvement
The Target Tracking in Mobile Sensor Networks
Comparable Entity Mining from Comparative Questions
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks