Wednesday, 22 January 2014

ieee 2013 java projects

MOBILE COMPUTING - WIRELESS COMMUNICATIONS
1. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks.

      Mech : 
"Optimal Mobile Relay Configuration"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
2. Vampire attacks:Draining life from wireless ad-hoc sensor networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
3. Towards a Statistical Framework for Source Anonymity in Sensor Networks.

      Alg : 
"AR and AF"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
4. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications.

      Phase 2 : 
"Scalable Mobile PresenceCloud with Communication Security"

      Alg : 
"Directed Buddy Search Algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
5. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks.

      Phase 2 : 
"FindU : Profile Matching in Ssecure Multi-party Computation (SMC)"

      Alg : 
"Shamir secret sharing scheme Algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
6. Distributed Cooperative Caching in Social Wireless Networks.

      Alg : 
"Split Cache object replacement policy,A distributed heuristic for object replacement in SWNETs"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
7. Community-Aware Opportunistic Routing in Mobile Social Networks.

      Alg : 
"Community-Aware Opportunistic Routing (CAOR) algorithm "

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
8. Search Me If You Can Privacy-preserving Location Query Service.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
9. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
10. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
SOFTWARE ENGINEERING
11. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
NETWORKING
12. Cross-Domain Privacy-Preserving Protocol for Cooperative Firewall Optimization.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
13. Price Differentiation for Communication Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
14. Fault Node Recovery Algorithm for a Wireless Sensor Network.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
15. On the Role of Mobility for Multi-message Gossip.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
16. Topological Conditions for In-Network Stabilization of Dynamical Systems.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
17. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
18. Participatory Privacy Enabling Privacy in Participatory Sensing.

      Mech : 
"Participatory Privacy"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
19. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
20. Access Policy Consolidation for Event Processing Systems.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
21. Fully Anonymous Profile Matching in Mobile Social Networks.

      Phase 2 : 
"Secure and Logical Multiparty Computation (SMC) Profile Matching"

      Alg : 
"Homomorphic Encryption"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
22. A Fast Re-Route Method.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
23. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
24. Seed Block Algorithm A Remote Smart Data Back-up Technique for Cloud Computing.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
25. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
IMAGE PROCESSING - MULTIMEDIA
26. Understanding the External Links of Video Sharing Sites Measurement and Analysis.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
27. Circular Reranking for Visual Search.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
28. Super-Resolution-based Inpainting.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
29. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.

      Alg : 
"Answer medium selection"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
30. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
31. Bootstrapping Visual Categorization With Relevant Negatives.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
32. An extended visual cryptography scheme without pixel expansion for halftone images.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
33. Image Authentication Using Stochastic Diffusion.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
SECURE COMPUTING
34. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.

      Mech : 
"Branching program"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
35.Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.

      Phase 2 : 
"MeetUp : Framework for constructing encounter-based social networks"

      Alg : 
"rusted Certification"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
36.Two tales of privacy in online social networks.

      Mech : 
"surveillance problem,social privacy,institutional privacy"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
37.Extracting Spread-Spectrum Hidden Data from Digital Media.

      Mech : 
"Multi-carrier spread-spectrum embedding,Steganography"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
38.Utility-Privacy Tradeoff in Databases An Information-theoretic Approach.

      Mech : 
"Encryption & Decryption Algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
39.TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensing.

      Alg : 
"Trajectory Graph Construction,Weight Construction Algorithm "

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
40. Craigslist Scams and Community Composition Investigating Online Fraud Victimization.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
41. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
42. SORT A Self-ORganizing Trust Model for Peer-to-Peer Systems.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
43. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
44. NICE Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
45. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
46. Efficiently Outsourcing Multiparty Computation under Multiple Keys.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
47. Security Using Colors and Armstrong Numbers.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
48. Document Clustering for Forensic Analysis An Approach for Improving Computer Inspection.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
CLOUD COMPUTING

49.Storing Shared Data on the Cloud via Security-Mediator.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
50.CloudFTP A Case Study of Migrating Traditional Applications to the Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
51.A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
52.Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
53.Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
54.A Log-based Approach to Make Digital Forensics Easier on Cloud Computing.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
56.A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
57. Outsourcing Privacy-Preserving Social Networks to a Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
58.Privacy-Preserving Public Auditing for Secure Cloud Storage.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
59.Winds of Change From Vendor Lock-In to the Meta Cloud.

      Mech : 
"Migration From Cloud Service Provider To Another From Identifying Cheats Of Provider"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
60.Cloud computing for mobile users can offloading compution save energy.

      Phase 2 : 
"Cloud based Energy Saving for Mobil User"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
61.AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds.

      Alg : 
"SVC Algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
62.Mining Contracts for Business Events and Temporal Constraints in Service Engagements.

      Phase 2 : 
"Knowledge Based Business Service Engagement Identification (KBS)"

      Alg : 
"Grammar Tree Pruning"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
63.Collaboration in Multicloud Computing Environments: Framework and Security Issues.

      Phase 2 : 
“Proxy based Dynamic Data Outsourcing Multi clouds”

      Alg : 
"Geometric Data Perturbation"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
PARALLEL AND DISTRIBUTED SYSTEMS
64. Hint-based Execution of Workloads in Clouds with Nefeli.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
65. Load Rebalancing for Distributed File Systems in Clouds.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
66.QoS Ranking Prediction for Cloud Services.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
67. IP-Geolocation Mapping for Moderately Connected Internet Regions.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
68. Identity-Based Secure Distributed Data Storage Schemes.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
69. Efficient Two-Server Password-Only Authenticated Key Exchange.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
70. SocialTube P2P-assisted Video Sharing in Online Social Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
71. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
72. Mona Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
73. Priority-Based Consolidation of Parallel Workloads in the Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
74. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
75. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
76. A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud.

      Phase 2 : 
"Cost effective Privacy preserving for intermediate datasets on Cloud"

      Alg : 
"practical heuristic algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
77. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment.

      Phase 2 : 
"Cloud on Dynamic Virtual Resource Allocation"

      Alg : 
"Skewness"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
78. Towards Differential Query Services in Cost-Efficient Clouds.

      Mech : 
"Efficient Information Retrieval for Ranked Query (EIRQ),Aggregation and Distribution Layer (ADL)"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
79. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks.

      Alg : 
"Static Route Algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
80. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data

      Alg : 
"Fast clustering-based feature selection algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
81. CloudMoV: Cloud-based Mobile Social TV

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
82. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
83.m-Privacy for Collaborative Data Publishing

      Alg : 
"Provider-Aware Algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
84. Crowdsourcing Predictors of Behavioral Outcomes.

      Phase 2 : 
"Internet-based collaborative activity"

      Alg : 
"Crowdsourcing"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
85. Spatial Approximate String Search.

      Alg : 
"Novel Adaptive Algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
86. Facilitating Document Annotation Using Content And Querying Value.

      Mech : 
"Information Extraction"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
87.Incentive Compatible Privacy-Preserving Data Analysis.

      Mech : 
"Key theorems,Association Rule Mining"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
88.FoCUS Learning to Crawl Web Forums.

      Alg : 
"Index/thread URL detection,Page-flipping URL detection"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
89.ROBUST MODULE BASED DATA MANAGEMENT.

      Mech : 
"Novel properties of robustness"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
90.A Probabilistic Approach to String Transformation.

      Alg : 
"Aho-Corasick"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
91.Comparable Entity Mining from Comparative Questions.

      Alg : 
"Bootstrapping algorithm"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
92.Facilitating Effective User Navigation through Website Structure Improvement.

      Alg : 
"Mathematical Programming (MP) Model"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
93.PMSE A Personalized Mobile Search Engine.

      Alg : 
"Naïve Bayes"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
94.Fast Nearest Neighbor Search with Keywords.

      Mech : 
"Spatial Inverted Index"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
95.Secure Mining of Association Rules in Horizontally Distributed Databases.

      Mech : 
"Unifying lists of locally Frequent Itemsets ,Kantarcioglu and Clifton"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
96. A System to Filter Unwanted Messages from OSN User Walls.

      Mech : 
"Short Text Classifier"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
97. Anomaly Detection via Online Oversampling Principal Component Analysis.

      Alg : 
"Online oversampling principal component analysis"

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
98. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia.

      Alg : 
"primal-dual algorithm "

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
99. A Data-Mining Model for Protection of FACTS-Based Transmission Line.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
100. Sensitive Label Privacy Protection on Social Network Data.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
101. Preventing Private Information Inference Attacks on Social Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
102. Privacy against Aggregate Knowledge Attacks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
103. Ranking on Data Manifold with Sink Points.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
104. Secure Logging As a Service—Delegating Log Management to the Cloud.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
105. SybilDefender Defend Against Sybil Attacks in Large Social Networks.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
106. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
107. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
108. Improving Security and Efficiency in Attribute-Based Data Sharing.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
109. Dynamic Personalized Recommendation on Sparse Data.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
110. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
111. User Action Interpretation for Online Content Optimization.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
112. Annotating Search Results from Web Databases.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
113. A Survey of XML Tree Patterns.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
114. Dynamic Query Forms for Database Queries.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
115. A Learning Approach to SQL Query Results Ranking Using Skyline and Users’ Current Navigational Behavior.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
116. Co-Occurrence-Based Diffusion for Expert Search on the Web.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
117. Spatial Query Integrity with Voronoi Neighbors.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
118. Anomaly Detection Approach Using Hidden Markov Model.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
119. Efficient Evaluation of SUM Queries over Probabilistic Data.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
120. Vickrey-Clarke-Groves for privacy-preserving collaborative classi?cation.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
121. Efficient Evaluation of SUM Queries over Probabilistic Data.

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         
122. Location Based Intelligent Mobile Organizer.(Using Android - 2011)

    
View :Abstract Basepaper       Description: http://www.chennaisunday.com/images/new.gif         

No comments:

Post a Comment