IEEE PROJECTS JAVA 2013

1 CPJ1301 Privacy Preserving Public Auditing for Secure Cloud Storage
CLOUD COMPUTING
2 CPJ1302 Winds of Change from Vendor Lock-In to the Meta Cloud
CLOUD COMPUTING
3 CPJ1303 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
CLOUD COMPUTING
CPJ1304 A Fast Clustering-Based Feature Subset Selection algorithm for High Dimensional Datarks
DATA MINING
5 CPJ1305 A System to Filter Unwanted Messages from OSN User Walls
DATA MINING
6 CPJ1306 CloudMoV: Cloud-based Mobile Social TV
CLOUD COMPUTING
7 CPJ1307 Comparable Entity Mining from Comparative Questions
DATA MINING
8 CPJ1308 Crowd sourcing Predictors of Behavioral Outcomes
DATA MINING
9 CPJ1309 Facilitating Effective User Navigation through Website Structure Improvement
DATA MINING
10 CPJ1310 Focus Learning to Crawl Web Forums
DATA MINING
11 CPJ1311 Incentive Compatible Privacy-Preserving Data Analysis
DATA MINING
12 CPJ1312 PMSE: A Personalized Mobile Search Engine
DATA MINING
13 CPJ1313 Sensitive Label Privacy Protection on Social Network Data
DATA MINING
14 CPJ1314 Robust Module Based Data Management
DATA MINING
15 CPJ1315 Spatial Approximate String Search
DATA MINING
16 CPJ1316 Mobile Relay Configuration in Data-intensive Wireless Sensor Networks.
MOBILE COMPUTING
17 CPJ1317 Vampire attacks: Draining life from wireless ad-hoc sensor networks.
MOBILE COMPUTING
18 CPJ1318 Towards a Statistical Framework for Source Anonymity in Sensor Networks
MOBILE COMPUTING
19 CPJ1319 A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
MOBILE COMPUTING
20 CPJ1320 Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
MOBILE COMPUTING
21 CPJ1321 Distributed Cooperative Caching in Social Wireless Networks
MOBILE COMPUTING
22 CPJ1322 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
NETWORKING
23 CPJ1323 Access Policy Consolidation for Event Processing Systems
NETWORKING
24 CPJ1324 Mining Contracts for Business Events and Temporal Constraint in Service Engagements
NETWORKING
25 CPJ1325 Fully Anonymous Profile Matching in Mobile Social Networks
NETWORKING
26 CPJ1326 Price Differentiation for Communication Networks
NETWORKING
27 CPJ1327 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
PARALLEL AND DISTRIBUTED SYSTEMS
28 CPJ1328 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
SECURE COMPUTING
29 CPJ1329 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
PARALLEL AND DISTRIBUTED SYSTEMS
30 CPJ1330 Extracting Spread-Spectrum Hidden Data from Digital Media
SECURE COMPUTING
31 CPJ1331 Two tales of privacy in online social networks
SECURE COMPUTING
32 CPJ1332 Utility-Privacy Tradeoff in Databases An Information-theoretic Approach
SECURE COMPUTING
33 CPJ1333 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Development
CLOUD COMPUTING
34 CPJ1334 Privacy Preserving Delegated Access Control in Public Cloud
SECURE COMPUTING
35 CPJ1335 Super Resolution Based In painting
IMAGE PROCESSING
36 CPJ1336 Collaboration in Multi Cloud Computing Environments Framework & Security Issues
NETWORKING
37 CPJ1337 Social Tube P2P-assisted Video Sharing in Online Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
38 CPJ1338 Towards Differential Query Services in Cost-Efficient Clouds
PARALLEL & DISTRIBUTED SYSTEMS
39 CPJ1339 Beyond Text QA Multimedia Answer Generation by Harvesting Web Information
IMAGE PROCESSING
40 CPJ1340 IP-Geo location Mapping for Moderately Connected Internet Regions
PARALLEL & DISTRIBUTED SYSTEMS
41 CPJ1341 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
PARALLEL & DISTRIBUTED SYSTEMS
42 CPJ1342 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
NETWORKING
43 CPJ1343 Delay-Based Network Utility Maximization
NETWORKING
44 CPJ1344 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
NETWORKING
45 CPJ1345 Privacy Preserving Data Sharing With Anonymous ID Assignment
SECURE COMPUTING
46 CPJ1346 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
SECURE COMPUTING
47 CPJ1347 Load Rebalancing for Distributed File Systems in Clouds
CLOUD COMPUTING
48 CPJ1348 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
CLOUD COMPUTING
49 CPJ1349 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
CLOUD COMPUTING
50 CPJ1350 On the Node Clone Detection in Wireless Sensor Networks
NETWORKING
51 CPJ1351 Optimal Client-Server Assignment for Internet Distributed Systems
PARALLEL & DISTRIBUTED SYSTEMS
52 CPJ1352 EAACK´┐ŻA Secure Intrusion-Detection System for MANETs.
SECURE COMPUTING
53 CPJ1353 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks.
SECURE COMPUTING
54 CPJ1354 Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code words
IMAGE PROCESSING
55 CPJ1355 Cloud computing for mobile users can off loading computation save energy
CLOUD COMPUTING
56 CPJ1356 Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
PARALLEL AND DISTRIBUTED SYSTEMS
57 CPJ1357 m-Privacy for Collaborative Data Publishing
DATA MINING
58 CPJ1358 Facilitating Document Annotation Using Content And Querying Value
DATA MINING
59 CPJ1359 Secure Mining of Association Rules in Horizontally Distributed Databases
DATA MINING
60 CPJ1360 Anomaly Detection via Online Oversampling Principal Component Analysis
DATA MINING
61 CPJ1361 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
DATA MINING
62 CPJ1362 Annotating Search Results From Web Databases
DATA MINING
63 CPJ1363 Preventing Private Information Inference Attacks on Social Networks
DATA MINING
64 CPJ1364 Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
SECURE COMPUTING
65 CPJ1365 Discovery and Verification of neighbor Positions in Mobile Adhoc Networks
MOBILE COMPUTING
66 CPJ1366 Security Analysis in Single Sign on Mechanism for Distributed Computer Networks
NDUSTRIAL INFORMATICS
67 CPJ1367 A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
KNOWLEDGE & DATA ENGINEERING