Monday, July 29, 2013

JAVA PROJECT TITLES, IEEE JAVA PROJECTS 2013-2014

JAVA PROJECTS, IEEE JAVA PROJECTS 2013-2014

Domain - Mobile Computing
Java 2013-14 IEEE Project Titles in Mobile Computing
* Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
* Vampire attacks:Draining life from wireless ad-hoc sensor networks
* Towards a Statistical Framework for Source Anonymity in Sensor Networks
* A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
* Distributed Cooperative Caching in Social Wireless Networks
* Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
* Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks
* Understanding the Scheduling Performance in Wireless Networks with Successive Interference Cancellation
* Content Sharing over Smartphone-Based Delay-Tolerant Networks
* DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
* Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
* A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
* Bicriteria Optimization in Multihop Wireless Networks: Characterizing the Throughput-Energy Envelope
* Maximizing Transmission Opportunities in Wireless Multihop Networks
* On the MDP-Based Cost Minimization for Video-on-Demand Services in a Heterogeneous Wireless Network with Multihomed Terminals
* Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective
* Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
* Dynamic Online-Calibrated Radio Maps for Indoor Positioning in Wireless Local Area Networks
* Estimating Performance of Mobile Services from Comparative Output-Input Analysis of End-to-End Throughput
* Deployment of a Connected Reinforced Backbone Network with a Limited Number of Backbone Nodes


Domain - Networking
Java 2013-14 IEEE Project Titles in Networking
* On the Node Clone Detection in Wireless Sensor Networks
* Cross-domain privacy-preserving cooperative firewall optimization
* Entrusting Private Computation and Data to Untrusted Networks
* ITA: Innocuous Topology Awareness for Unstructured P2P Networks
* Attribute-Based Encryption With Verifiable Outsourced Decryption
* Delay-Based Network Utility Maximization
* Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
* Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
* Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
* Design and Implementation of an “Approximate” Communication System for Wireless Media Applications
* On Distributed and Coordinated Resource Allocation for Interference Mitigation in Self-Organizing LTE Networks
* An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
* Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks
* Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks
* On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
* Randomized Information Dissemination in Dynamic Environments
* Predicting the Impact of Measures Against P2P Networks: Transient Behavior and Phase Transition
* An Adaptive System Based on Roadmap Profiling to Enhance Warning Message Dissemination in VANETs
* Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information
* Time-Bounded Essential Localization for Wireless Sensor Networks


Domain - Cloud Computing
Java 2013-14 IEEE ProjectTitles in Cloud Computing
* CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
* AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
* Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
* Load Rebalancing for Distributed File Systems in Clouds
* Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
* A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud
* Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
* A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud
* Privacy-Preserving Public Auditing for Secure Cloud Storage
* Cloud computing for mobile users can offloading compution save energy.
* Mining Contracts for Business Events and Temporal Constraints in Service Engagements.
* Collaboration in Multicloud Computing Environments: Framework and Security Issues.
* Security and Privacy-Enhancing Multi-cloud Architectures
* Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data
* A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Systems
* Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
* Scalable and Secure Sharing of Personal Health Records in Using Attribute-Based Encryption


Domain - Knowledge and Data Engineering
Java 2013-14 IEEE ProjectTitles in Knowledge and Data Engineering
* Multiparty Access Control for Online Social Networks: Model and Mechanisms
* Privacy Preserving Delegated Access Control in Public Clouds
* m-Privacy for Collaborative Data Publishing
* Dynamic Query Forms for Database Queries
* A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
* Dynamic Personalized Recommendation on Sparse Data
* Anomaly Detection via Online Oversampling Principal Component Analysis
* A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
* A System to Filter Unwanted Messages from OSN User Walls
* Comparable Entity Mining from Comparative Questions
* Facilitating Effective User Navigation through Website Structure Improvement
* A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
* Incentive Compatible Privacy-Preserving Data Analysis
* A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments
* Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks


Domain - Dependable and Secure Computing
Java 2013-14 IEEE ProjectTitles in Dependable and Secure Computing
* Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs
* Entrusting Private Computation and Data to Untrusted Networks
* Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
* NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
* On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
* Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing
* SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
* Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data


Domain - Parallel and Distributed System
Java 2013-14 IEEE ProjectTitles in Parallel and Distributed System
* Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Network-
* Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
* Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
* Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
* Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
* Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
* Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
* Towards Differential Query Services in Cost-Efficient Clouds
* Adaptive Network Coding for Broadband Wireless Access Networks
* Analysis of Distance-Based Location Management in Wireless Communication Networks
* Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
* QoS Ranking Prediction for Cloud Services
* A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
* IP-Geolocation Mapping for Moderately Connected Internet Regions
* Optimal Client-Server Assignment for Internet Distributed Systems


Domain - Image Processing
Java 2013-14 IEEE ProjectTitles in Image Processing
* Local Structure-Based Image Decomposition for Feature Extraction With Applications to Face Recognition
* Multi-View Video Representation Based on Fast Monte Carlo Surface Reconstruction
* Regional Bit Allocation and Rate Distortion Optimization for Multiview Depth Video Coding With View Synthesis Distortion Model
* Two-Dimensional Orthogonal DCT Expansion in Trapezoid and Triangular Blocks and Modified JPEG Image Compression
* Corner Detection and Classification Using Anisotropic Directional Derivative Representations
* Image Inpainting on the Basis of Spectral Structure From 2-D Nonharmonic Analysis
* Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization
* Coupled Variational Image Decomposition and Restoration Model for Blurred Cartoon-Plus-Texture Images With Missing Pixels
* General Framework to Histogram-Shifting-Based Reversible Data Hiding
* Learning Dynamic Hybrid Markov Random Field for Image Labeling
* Rotation Invariant Local Frequency Descriptors for Texture Classification
* Image Quality Assessment Using Multi-Method Fusion
* Scalable Coding of Depth Maps With R-D Optimized Embedding
* Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation
* Performance Evaluation Methodology for Historical Document Image Binarization


Domain - Software Engineering
Java 2013-14 IEEE ProjectTitles in Software Engineering
* Active Learning and Effort Estimation: Finding the Essential Content of Software Effort Estimation Data
* Generating Domain-Specific Visual Language Tools from Abstract Visual Specifications
* MADMatch: Many-to-Many Approximate Diagram Matching for Design Comparison
* Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm
* Scaling Up Spike-and-Slab Models for Unsupervised Feature Learning
* Validating Second-Order Mutation at System Level
* Balancing Privacy and Utility in Cross-Company Defect Prediction


Domain - Pattern Analysis and Machine Learning, PAML
Java 2013-14 IEEE ProjectTitles in Pattern Analysis and Machine Learning
* 3D Convolutional Neural Networks for Human Action Recognition
* A Globally-Variant Locally-Constant Model for Fusion of Labels from Multiple Diverse Experts without Using Reference Labels
* Efficient Classification for Additive Kernel SVMs
* Fast and Accurate Matrix Completion via Truncated Nuclear Norm Regularization
* Image Transformation Based on Learning Dictionaries across Image Spaces


Domain - Information Forensics and Security
Java 2013-14 IEEE ProjectTitles in Information Forensics and Security
* Extracting Spread-Spectrum Hidden Data from Digital Media.
* Utility-Privacy Tradeoff in Databases An Information-theoretic Approach.
* TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensor

No comments:

Post a Comment