amazon

Friday, November 7, 2014

IEEE 2014-2015 JAVA PROJECT TITLES

                                   
                                                                Software Training & Development, IEEE Projects and Research Division
IEEE 2014-2015 JAVA  PROJECT TITLES
Big Data

  1. Big Data and the SP Theory of Intelligence
  2. Big Data Deep Learning Challenges and Perspectives
  3. Dache A Data Aware Caching for Big-Data Applications Using the MapReduce Framework
  4. Finding the Needle in the Image Stack Performance Metrics for Big Data Image Analysis
  5. Data Mining with Big Data

CLOUD COMPUTING
  1. A Hybrid Cloud Approach for Secure Authorized Deduplication
  2. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
  3. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
  4. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
  5. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
  6. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
  7. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
  8. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
  9. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
  10. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
  11. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  12. Scalable Distributed Service Integrity Attestation for Software-as- a-Service Clouds
  13. Towards Differential Query Services in Cost-Efficient Clouds
DATA MINING
  1. A Cocktail Approach for Travel Package Recommendation
  2. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
  3. BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
  4. Data Mining with Big Data
  5. Dealing With Concept Drifts in Process Mining
  6. Discovering Emerging Topics in Social Streams via Link-Anomaly
  7. Efficient Prediction of Difficult Keyword Queries over Databases
  8. Facilitating Document Annotation Using Content and Querying Value
  9. Fast Nearest Neighbor Search with Keywords
  10. Keyword Query Routing
  11. Privacy-Preserving and Content-Protecting Location Based Queries
  12. Security Evaluation of Pattern Classifiers under Attack
  13. Supporting Privacy Protection in Personalized Web Search
  14. Towards Online Shortest Path Computation
  15. A K-Main Routes Approach to Spatial Network Activity Summarization
  16. A Probabilistic Approach to String Transformation
  17. A System for Automatic Notification and Severity Estimation of Automotive Accidents
  18. Commuter Route Optimized Energy Management of Hybrid Electric Vehicles
  19. Effective and Efficient Clustering Methods for Correlated Probabilistic Graphs
  20. Mining Probabilistically Frequent Sequential Patterns in Large Uncertain Databases
  21. Mining Statistically Significant Co-location and Segregation Patterns
  22. Random Projection Random Discretization Ensembles—Ensembles of Linear Multivariate Decision Trees
  23. Secure Mining of Association Rules in Horizontally Distributed Databases
  24. Using Incomplete Information for Complete Weight Annotation of Road Networks
  25. Web-Based Traffic Sentiment Analysis Methods and Applications
SECURE COMPUTING
  1. Privacy-Enhanced Web Service Composition
  2. Web Service Recommendation via Exploiting Location and QoS Information
  3. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
  4. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
  5. PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
  6. Top-k Query Result Completeness Verification in Tiered Sensor Networks
  7. A Denial of Service Attack to UMTS Networks Using SIM-Less Devices
  8. Generating Summary Risk Scores for Mobile Applications
  9. Modeling the Propagation of Worms in Networks A Survey
  10. Toward Unified Security and Privacy Protection for Smart Meter Networks
  11. Security Analysis of Handover Key Management in 4G LTESAE Networks
NETWORKING
1.      Automatic Test Packet Generation
2.      Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
3.      Boundary Cutting for Packet Classification
4.      Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
5.    Congestion Aware Routing in Nonlinear Elastic Optical Networks
6.    A Geometric Deployment and Routing Scheme for Directional Wireless Mesh Networks
7.    An Economic Framework for Routing and Channel Allocation in Cognitive Wireless Mesh Networks
8.    Degraded Service Provisioning in Mixed-Line-Rate WDM Backbone Networks Using Multipath Routing
9.    On the Network Sharing of Mixed Network Coding and Routing Data Flows in Congestion Networks
10. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
11. Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Networks
12.  Scalable Dynamic Routing Protocol for Cognitive Radio Sensor Networks
PARALLEL & DISTRIBUTED SYSTEMS
  1. RRE: A Game-Theoretic Intrusion Response and Recovery Engine
  2. Securing Broker-Less Publish/Subscribe Systems Using Identity- Based Encryption
  3. SOS: A Distributed Mobile Q&A System Based on Social Networks
  4. The Client Assignment Problem for Continuous Distributed
  5. Interactive Applications: Analysis, Algorithms, and Evaluation
  6. The Design and Evaluation of An Information Sharing System for Human Networks
  7. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
  8. Secure Outsourced Attribute-based Signatures
  9. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
  10. Exploiting Service Similarity for Privacy in Location-Based Search Queries
  11. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
  12. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
MOBILE COMPUTING
  1. An Incentive Framework for Cellular Traffic Offloading
  2. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
  3. Efficient Authentication for Mobile and Pervasive Computing
  4. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
  5. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
CLOUDSIM (JAVA)
  1. Towards Differential Query Services in Cost-Efficient Clouds
  2. Developing Vehicular Data Cloud Services in the IoT Environment
  3. CLOUDQUAL A Quality Model for Cloud Services
  4. A Scalable and Modular Architecture for High-Performance Packet Classification
  5. Efficient Data Collection for Large-Scale Mobile Monitoring Applications 



No comments:

Post a Comment