JAVA PROJECTS

JAVA-2013 IEEE PROJECTS
CLOUD COMPUTING

S.NO
TITLES
1A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
2CloudMoV: Cloud-based Mobile Social TV
3Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment
4Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
5Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
6Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
7PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
8Privacy-Preserving Public Auditing for Secure Cloud Storage
9Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
10Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
11A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
12Load Rebalancing for Distributed File Systems in Clouds
13Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization
14Privacy Preserving Delegated Access Control in Public Clouds
15Attribute-Based Encryption With Verifiable Outsourced Decryption

JAVA-2013 IEEE PROJECTS
DATA MINING

S.NO
TITLES
16A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
17A New Algorithm for Inferring User Search Goals with Feedback Sessions
18Annotating Search Results from Web Databases
19Anomaly Detection via Online Over-Sampling Principal Component Analysis
20Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
21m-Privacy for Collaborative Data Publishing
22Protecting Sensitive Labels in Social Network Data Anonymization
23Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
24Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
25A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs
26Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
27Crowdsourcing Predictors of Behavioral Outcomes
28Facilitating Document Annotation using Content and Querying Value
29A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
30A System to Filter Unwanted Messages from OSN User Walls
31Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
32Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers.
33Spatial Approximate String Search
34Preventing Private Information Inference Attacks on Social Networks
35Multiparty Access Control for Online Social Networks Model and Mechanisms
36Incentive Compatible Privacy-Preserving Data Analysis

JAVA-2013 IEEE PROJECTS
SECURE COMPUTING

S.NO
TITLES
37EAACK—A Secure Intrusion-Detection System for MANETs
38Identity-Based Secure Distributed Data Storage Schemes
39Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
40NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
41Privacy Preserving Data Sharing With Anonymous ID Assignment
42Securing Class Initialization in Java-like Languages
43Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
44SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
45WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
46Two tales of privacy in online social networks
47Secure Encounter-based Mobile Social Networks: Requirements,Designs, and Tradeoffs
48Twitsper: Tweeting Privately
49Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
50Cross-Domain Privacy-Preserving Cooperative Firewall Optimization

JAVA-2013 IEEE PROJECTS
NETWORKING

S.NO
TITLES
51A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
52Delay-Based Network Utility Maximization
53Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
54Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
55On the Node Clone Detection in Wireless Sensor Networks
56Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
57Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
58Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
59Participatory Privacy: Enabling Privacy in Participatory Sensing
60Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks

JAVA-2013 IEEE PROJECTS
PARALLEL & DISTRIBUTED SYSTEMS

S.NO
TITLES
61A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
62Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme
63IP-Geolocation Mapping for Moderately Connected Internet Regions
64Optimal Client-Server Assignment for Internet Distributed Systems
65SocialTube P2P-assisted Video Sharing in Online Social Networks
66A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

JAVA-2013 IEEE PROJECTS
MOBILE COMPUTING

S.NO
TITLES
67Content Sharing over Smartphone-Based Delay-Tolerant Networks
68DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
69Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
70Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
71Toward a Statistical Framework for Source Anonymity in Sensor Networks
72Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks
73Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
74Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

JAVA-2013 IEEE PROJECTS
PATTERN ANALYSIS & MACHINE INTELLIGENCE

S.NO
TITLES
75A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data

JAVA-2013 IEEE PROJECTS
SERVICE COMPUTING(WEB SERVICE)

S.NO
TITLES
76A Decentralized Service Discovery Approach on Peer-to-Peer Networks
77Personalized QoS-Aware Web Service Recommendation and Visualization
78Privacy-Enhanced Web Service Composition

JAVA-2013 IEEE PROJECTS
SOFTWARE ENGINEERING

S.NO
TITLES
79Whole Test Suite Generation

JAVA-2013 IEEE PROJECTS
MULTIMEDIA

S.NO
TITLES
80Understanding the External Links of Video Sharing Sites:Measurement and Analysis