You are on page 1of 7

IEEE JAVA 2013 -2014

Sr.
No

Project
Code

Project Title

Domain

Project
Type

Year

DKTJA131

Cloud
Computing

JAVA

2013

DKTJA136

2013

DKTJA138

Cloud
Computing
Cloud
Computing

JAVA

JAVA

2013

DKTJA139

Data Mining

JAVA

2013

DKTJA1326

Cloud
Computing

JAVA

2013

DKTJA1327

Cloud
Computing

JAVA

2013

DKTJA1328

Cloud
Computing

JAVA

2013

DKTJA1329

Cloud
Computing

JAVA

2013

DKTJA1330

Cloud
Computing

JAVA

2013

10

DKTJA1331

Cloud
Computing

JAVA

2013

11

DKTJA1332

A Stochastic Model to
Investigate Data Center
Performance and QoS in IaaS
Cloud Computing Systems
CloudMoV: Cloud-based
Mobile Social TV
Error-Tolerant Resource
Allocation and Payment
Minimization for Cloud
System
A Fast Clustering-Based
Feature Subset Selection
Algorithm for HighDimensional Data
Dynamic Resource Allocation
Using Virtual Machines for
Cloud Computing
Environment
Harnessing the Cloud for
Securely Outsourcing LargeScale Systems of Linear
Equations
Mona: Secure Multi-Owner
Data Sharing for Dynamic
Groups in the Cloud
PACK: Prediction-Based Cloud
Bandwidth and Cost
Reduction System
Privacy-Preserving Public
Auditing for Secure Cloud
Storage
Scalable and Secure Sharing
of Personal Health Records in
Cloud Computing Using
Attribute-Based Encryption
Enabling Dynamic Data and
Indirect Mutual Trust for
Cloud Computing Storage
Systems

Cloud
Computing

JAVA

2013

12

DKTJA1333

13

DKTJA1334

14

DKTJA1335

15

DKTJA1336

16

DKTJA1337

17

DKTJA1338

18

DKTJA1339

19

DKTJA1340

20

DKTJA1341

21

DKTJA1342

22

DKTJA1343

23

DKTJA1344

24

DKTJA1345

25

DKTJA1346

A Load Balancing Model


Based on Cloud Partitioning
for the Public Cloud
Load Rebalancing for
Distributed File Systems in
Clouds
Optimizing Cloud Resources
for Delivering IPTV Services
Through Virtualization
Privacy Preserving Delegated
Access Control in Public
Clouds
Attribute-Based Encryption
With Verifiable Outsourced
Decryption
A Fast Clustering-Based
Feature Subset Selection
Algorithm for HighDimensional Data
A New Algorithm for Inferring
User Search Goals with
Feedback Sessions
Annotating Search Results
from Web Databases
Anomaly Detection via
Online Over-Sampling
Principal Component
Analysis
Distributed Processing of
Probabilistic Top-k Queries in
Wireless Sensor Networks
m-Privacy for Collaborative
Data Publishing
Protecting Sensitive Labels in
Social Network Data
Anonymization
Tweet Analysis for Real-Time
Event Detection and
Earthquake Reporting
System Development
Document Clustering for
Forensic Analysis: An
Approach for Improving
Computer Inspection

Cloud
Computing

JAVA

2013

Cloud
Computing

JAVA

2013

Cloud
Computing

JAVA

2013

Cloud
Computing

JAVA

2013

Cloud
Computing

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

26

DKTJA1347

27

DKTJA1348

28

DKTJA1349

29

DKTDO135
0

30

DKTJA1351

31

DKTJA1352

32

DKTJA1353

33

DKTJA1354

34

DKTJA1355

35

DKTJA1356

36

DKTJA1357

37

DKTJA1358

38

DKTJA1359

39

DKTJA1360

A Method for Mining


Infrequent Causal
Associations and Its
Application in Finding
Adverse Drug Reaction
Signal Pairs
Clustering Sentence-Level
Text Using a Novel Fuzzy
Relational Clustering
Algorithm
Crowdsourcing Predictors of
Behavioral Outcomes
Facilitating Document
Annotation using Content
and Querying Value
A Generalized Flow-Based
Method for Analysis of
Implicit Relationships on
Wikipedia
A System to Filter Unwanted
Messages from OSN User
Walls
Anonymization of Centralized
and Distributed Social
Networks by Sequential
Clustering
Intrusion Detection
Technique by using K-means,
Fuzzy Neural Network and
SVM classifiers.
Spatial Approximate String
Search
Preventing Private
Information Inference
Attacks on Social Networks
Multiparty Access Control for
Online Social Networks
Model and Mechanisms
Incentive Compatible
Privacy-Preserving Data
Analysis
EAACKA Secure IntrusionDetection System for
MANETs
Identity-Based Secure

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

Data Mining

JAVA

2013

SECURE
COMPUTING

JAVA

2013

SECURE

JAVA

2013

40

DKTJA1361

41

DKTDO136
2

42

DKTJA1363

43

DKTJA1364

44

DKTJA1365

45

DKTJA1366

46

DKTJA1367

47

DKTJA1368

48

DKTJA1369

49

DKTJA1370

50

DKTJA1371

51

DKTJA1372

52

DKTJA1373

53

DKTJA1374

Distributed Data Storage


Schemes
Modeling the Pairwise Key
Predistribution Scheme in
the Presence of Unreliable
Links
NICE: Network Intrusion
Detection and
Countermeasure Selection in
Virtual Network Systems
Privacy Preserving Data
Sharing With Anonymous ID
Assignment
Securing Class Initialization
in Java-like Languages
Security Analysis of a Single
Sign-On Mechanism for
Distributed Computer
Networks
SORT: A Self-ORganizing
Trust Model for Peer-to-Peer
Systems
WARNINGBIRD: A Near Realtime Detection System for
Suspicious URLs in Twitter
Stream
Two tales of privacy in online
social networks
Twitsper: Tweeting Privately
Combining Cryptographic
Primitives to Prevent
Jamming Attacks in Wireless
Networks
Cross-Domain PrivacyPreserving Cooperative
Firewall Optimization
A Highly Scalable Key PreDistribution Scheme for
Wireless Sensor Networks
Delay-Based Network Utility
Maximization
Dynamic Control of Coding
for Progressive Packet
Arrivals in DTNs

COMPUTING
SECURE
COMPUTING

JAVA

2013

SECURE
COMPUTING

JAVA

2013

SECURE
COMPUTING

JAVA

2013

SECURE
COMPUTING
SECURE
COMPUTING

JAVA

2013

JAVA

2013

SECURE
COMPUTING

JAVA

2013

SECURE
COMPUTING

JAVA

2013

SECURE
COMPUTING
SECURE
COMPUTING
SECURE
COMPUTING

JAVA

2013

JAVA

2013

JAVA

2013

SECURE
COMPUTING

JAVA

2013

Networking

JAVA

2013

Networking

JAVA

2013

Networking

JAVA

2013

54

DKTJA1375

55

DKTJA1376

56

DKTJA1377

57

DKTJA1378

58

DKTJA1379

59

DKTJA1380

60

DKTDO138
1

61

DKTJA1382

62

DKTJA1383

63

DKTJA1384

64

DKTJA1385

65

DKTJA1386

66

DKTJA1387

67

DKTJA1388

Minimum Cost Blocking


Problem in Multi-path
Wireless Routing Protocols
On the Node Clone Detection
in Wireless Sensor Networks
Opportunistic MANETs:
Mobility Can Make Up for Low
Transmission Power
Back-Pressure-Based Packetby-Packet Adaptive Routing
in Communication Networks
Fast Transmission to Remote
Cooperative Groups: A New
Key Management Paradigm
Participatory Privacy:
Enabling Privacy in
Participatory Sensing
Using Fuzzy Logic Control to
Provide Intelligent Traffic
Management Service for
High-Speed Networks
A Secure Protocol for
Spontaneous Wireless Ad
Hoc Networks Creation
Security Analysis of a
Privacy-Preserving
Decentralized Key-Policy
Attribute-Based Encryption
Scheme
IP-Geolocation Mapping for
Moderately Connected
Internet Regions
Optimal Client-Server
Assignment for Internet
Distributed Systems
SocialTube P2P-assisted
Video Sharing in Online
Social Networks
A System for Denial-ofService Attack Detection
Based on Multivariate
Correlation Analysis
Content Sharing over
Smartphone-Based DelayTolerant Networks

Networking

JAVA

2013

Networking

JAVA

2013

Networking

JAVA

2013

Networking

JAVA

2013

Networking

JAVA

2013

Networking

JAVA

2013

Networking

JAVA

2013

PARALLEL AND
DISTRIBUTED
SYSTEMS
PARALLEL AND
DISTRIBUTED
SYSTEMS

JAVA

2013

JAVA

2013

PARALLEL AND
DISTRIBUTED
SYSTEMS
PARALLEL AND
DISTRIBUTED
SYSTEMS
PARALLEL AND
DISTRIBUTED
SYSTEMS
PARALLEL AND
DISTRIBUTED
SYSTEMS

JAVA

2013

JAVA

2013

JAVA

2013

JAVA

2013

MOBILE
COMPUTING

JAVA

2013

68

DKTJA1389

DCIM: Distributed Cache


Invalidation Method for
Maintaining Cache
Consistency in Wireless
Mobile Networks
Discovery and Verification of
Neighbor Positions in Mobile
Ad Hoc Networks
Toward a Statistical
Framework for Source
Anonymity in Sensor
Networks
Mobile Relay Configuration in
Data-Intensive Wireless
Sensor Networks
Vampire Attacks: Draining
Life from Wireless Ad Hoc
Sensor Networks
Toward Privacy Preserving
and Collusion Resistance in a
Location Proof Updating
System
Efficient Rekeying Framework
for Secure Multicast with
Diverse- Subscription-Period
Mobile Users
A Framework for Mining
Signatures from Event
Sequences and Its
Applications in Healthcare
Data
A Decentralized Service
Discovery Approach on Peerto-Peer Networks
Privacy-Enhanced Web
Service Composition

69

DKTJA1390

70

DKTJA1391

71

DKTJA1392

72

DKTJA1393

73

DKTJA1394

74

DKTJA1395

75

DKTJA1396

76

DKTJA1397

77

DKTJA1398

78

DKTJA1399

Whole Test Suite Generation

79

DKTJA1310
0

80

DKTJA1310
1

Understanding the External


Links of Video Sharing Sites:
Measurement and Analysis
Personalized QoS-Aware Web
Service Recommendation
and Visualization

MOBILE
COMPUTING

JAVA

2013

MOBILE
COMPUTING

JAVA

2013

MOBILE
COMPUTING

JAVA

2013

MOBILE
COMPUTING

JAVA

2013

MOBILE
COMPUTING

JAVA

2013

MOBILE
COMPUTING

JAVA

2013

MOBILE
COMPUTING

JAVA

2013

PATTERN
ANALYSIS &
MACHINE
INTELLIGENCE

JAVA

2013

SERVICE
COMPUTING
(WEB SERVICE)
SERVICE
COMPUTING
(WEB SERVICE)
SOFTWARE
ENGINEERING

JAVA

2013

JAVA

2013

JAVA

2013

MULTIMEDIA

JAVA

2013

SERVICE
COMPUTING
(WEB SERVICE)

JAVA

2013

You might also like