Follow us on Facebook

Header Ads

Java IEEE Projects 2013

2013 - 2014 JAVA IEEE Project Titles

CLOUD COMPUTING PROJECT TITLES

1) A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems

2) CloudMoV: Cloud-based Mobile Social TV

3) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment

4) Error-Tolerant Resource Allocation and Payment Minimization for Cloud System

5) Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

6) Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud

7) PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

8) Privacy-Preserving Public Auditing for Secure Cloud Storage

9) Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

10) Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

KNOWLEDGE AND DATA ENGINEERINGPROJECT TITLES

11) A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data

12) A New Algorithm for Inferring User Search Goals with Feedback Sessions

13) Annotating Search Results from Web Databases

14)Anomaly Detection via Online Over-Sampling Principal Component Analysis

15) Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

16) m-Privacy for Collaborative Data Publishing

17) Protecting Sensitive Labels in Social Network Data Anonymization

18) Tweet Analysis for Real-Time Event Detection and Earthquake

SECURE COMPUTING PROJECT TITLES

20) EAACK—A Secure Intrusion-Detection System for MANETs

21) Identity-Based Secure Distributed Data Storage Schemes

22) Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links

23) NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

24) Privacy Preserving Data Sharing With Anonymous ID Assignment

25) Securing Class Initialization in Java-like Languages

26) Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

27) SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

28) WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream

NETWORKING PROJECT TITLES

29) A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

30) Delay-Based Network Utility Maximization

31) Dynamic Control of Coding for Progressive Packet Arrivals in DTNs

 

PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES

32) A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

33) Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme

34) IP-Geolocation Mapping for Moderately Connected Internet Regions

35) Optimal Client-Server Assignment for Internet Distributed Systems

MOBILE COMPUTING PROJECT TITLES

36) Content Sharing over Smartphone-Based Delay-Tolerant Networks

37) DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks

38) Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

39) Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users

PATTERN ANALYSIS AND MACHINE INTELLIGENCE PROJECT TITLES

40) A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data

SERVICES COMPUTING PROJECT TITLES

41) A Decentralized Service Discovery Approach on Peer-to-Peer Networks

42) Personalized QoS-Aware Web Service Recommendation and Visualization

43) Privacy-Enhanced Web Service Composition

 

SOFTWARE ENGINEERING PROJECT TITLES

44) Whole Test Suite Generation

LATEST PROJECT TITLES:

A Load Balancing Model Based on Cloud Partitioning for the Public Cloud

Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection

A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs

Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm

Two tales of privacy in online social networks

Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols

On the Node Clone Detection in Wireless Sensor Networks

Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power

Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks

Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm

Load Rebalancing for Distributed File Systems in Clouds

Toward a Statistical Framework for Source Anonymity in Sensor Networks

Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks

Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

Crowdsourcing Predictors of Behavioral Outcomes

Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization

Participatory Privacy: Enabling Privacy in Participatory Sensing

Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs

Facilitating Document Annotation using Content and Querying Value

Privacy Preserving Delegated Access Control in Public Clouds

Twitsper: Tweeting Privately

A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

A System to Filter Unwanted Messages from OSN User Walls

Anonymization of Centralized and Distributed Social Networks by Sequential Clustering

Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

Understanding the External Links of Video Sharing Sites: Measurement and Analysis

Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers.

Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks

Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

Spatial Approximate String Search

Preventing Private Information Inference Attacks on Social Networks

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks

SocialTube P2P-assisted Video Sharing in Online Social Networks

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

Multiparty Access Control for Online Social Networks Model and Mechanisms

Incentive Compatible Privacy-Preserving Data Analysis

Attribute-Based Encryption With Verifiable Outsourced Decryption

Securing Online Reputation Systems through Trust Modeling and Temporal Analysis

Fault Node Recovery Algorithm for a Wireless Sensor Network

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

ABACUS: An Auction-Based Approach to Cloud Service Differentiation

Facilitating Effective User Navigation through Website Structure Improvement

The Target Tracking in Mobile Sensor Networks

Comparable Entity Mining from Comparative Questions

Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks