Monday 29 July 2013

JAVA PROJECT TITLES, IEEE JAVA PROJECTS 2013-2014

JAVA PROJECTS, IEEE JAVA PROJECTS 2013-2014

Domain - Mobile Computing
Java 2013-14 IEEE Project Titles in Mobile Computing
* Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
* Vampire attacks:Draining life from wireless ad-hoc sensor networks
* Towards a Statistical Framework for Source Anonymity in Sensor Networks
* A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
* Distributed Cooperative Caching in Social Wireless Networks
* Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
* Joint Optimal Sensor Selection and Scheduling in Dynamic Spectrum Access Networks
* Understanding the Scheduling Performance in Wireless Networks with Successive Interference Cancellation
* Content Sharing over Smartphone-Based Delay-Tolerant Networks
* DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
* Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
* A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks
* Bicriteria Optimization in Multihop Wireless Networks: Characterizing the Throughput-Energy Envelope
* Maximizing Transmission Opportunities in Wireless Multihop Networks
* On the MDP-Based Cost Minimization for Video-on-Demand Services in a Heterogeneous Wireless Network with Multihomed Terminals
* Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective
* Routing-Toward-Primary-User Attack and Belief Propagation-Based Defense in Cognitive Radio Networks
* Dynamic Online-Calibrated Radio Maps for Indoor Positioning in Wireless Local Area Networks
* Estimating Performance of Mobile Services from Comparative Output-Input Analysis of End-to-End Throughput
* Deployment of a Connected Reinforced Backbone Network with a Limited Number of Backbone Nodes


Domain - Networking
Java 2013-14 IEEE Project Titles in Networking
* On the Node Clone Detection in Wireless Sensor Networks
* Cross-domain privacy-preserving cooperative firewall optimization
* Entrusting Private Computation and Data to Untrusted Networks
* ITA: Innocuous Topology Awareness for Unstructured P2P Networks
* Attribute-Based Encryption With Verifiable Outsourced Decryption
* Delay-Based Network Utility Maximization
* Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
* Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
* Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
* Design and Implementation of an “Approximate” Communication System for Wireless Media Applications
* On Distributed and Coordinated Resource Allocation for Interference Mitigation in Self-Organizing LTE Networks
* An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks
* Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks
* Fast Algorithms and Performance Bounds for Sum Rate Maximization in Wireless Networks
* On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
* Randomized Information Dissemination in Dynamic Environments
* Predicting the Impact of Measures Against P2P Networks: Transient Behavior and Phase Transition
* An Adaptive System Based on Roadmap Profiling to Enhance Warning Message Dissemination in VANETs
* Throughput-Optimal Scheduling in Multihop Wireless Networks Without Per-Flow Information
* Time-Bounded Essential Localization for Wireless Sensor Networks


Domain - Cloud Computing
Java 2013-14 IEEE Project Titles in Cloud Computing
* CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
* AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
* Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
* Load Rebalancing for Distributed File Systems in Clouds
* Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
* A Privacy Leakage Upper-bound Constraint based Approach for Cost-effective Privacy Preserving of Intermediate Datasets in Cloud
* Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
* A Load Balancing Model Based on Cloud Partitioningfor the Public Cloud
* Privacy-Preserving Public Auditing for Secure Cloud Storage
* Cloud computing for mobile users can offloading compution save energy.
* Mining Contracts for Business Events and Temporal Constraints in Service Engagements.
* Collaboration in Multicloud Computing Environments: Framework and Security Issues.
* Security and Privacy-Enhancing Multi-cloud Architectures
* Toward Secure Multi-keyword Top-k Retrieval over Encrypted Cloud Data
* A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Systems
* Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
* Scalable and Secure Sharing of Personal Health Records in Using Attribute-Based Encryption


Domain - Knowledge and Data Engineering
Java 2013-14 IEEE Project Titles in Knowledge and Data Engineering
* Multiparty Access Control for Online Social Networks: Model and Mechanisms
* Privacy Preserving Delegated Access Control in Public Clouds
* m-Privacy for Collaborative Data Publishing
* Dynamic Query Forms for Database Queries
* A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
* Dynamic Personalized Recommendation on Sparse Data
* Anomaly Detection via Online Oversampling Principal Component Analysis
* A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
* A System to Filter Unwanted Messages from OSN User Walls
* Comparable Entity Mining from Comparative Questions
* Facilitating Effective User Navigation through Website Structure Improvement
* A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
* Incentive Compatible Privacy-Preserving Data Analysis
* A Rough-Set-Based Incremental Approach for Updating Approximations under Dynamic Maintenance Environments
* Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks


Domain - Dependable and Secure Computing
Java 2013-14 IEEE Project Titles in Dependable and Secure Computing
* Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs
* Entrusting Private Computation and Data to Untrusted Networks
* Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing
* NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
* On the Privacy Risks of Virtual Keyboards: Automatic Reconstruction of Typed Input from Compromising Reflections
* Predicting Architectural Vulnerability on Multithreaded Processors under Resource Contention and Sharing
* SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
* Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data


Domain - Parallel and Distributed System
Java 2013-14 IEEE Project Titles in Parallel and Distributed System
* Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Network-
* Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
* Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
* Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks
* Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
* Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
* Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
* Towards Differential Query Services in Cost-Efficient Clouds
* Adaptive Network Coding for Broadband Wireless Access Networks
* Analysis of Distance-Based Location Management in Wireless Communication Networks
* Automatic Semantic Content Extraction in Videos Using a Fuzzy Ontology and Rule-Based Model
* QoS Ranking Prediction for Cloud Services
* A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
* IP-Geolocation Mapping for Moderately Connected Internet Regions
* Optimal Client-Server Assignment for Internet Distributed Systems


Domain - Image Processing
Java 2013-14 IEEE Project Titles in Image Processing
* Local Structure-Based Image Decomposition for Feature Extraction With Applications to Face Recognition
* Multi-View Video Representation Based on Fast Monte Carlo Surface Reconstruction
* Regional Bit Allocation and Rate Distortion Optimization for Multiview Depth Video Coding With View Synthesis Distortion Model
* Two-Dimensional Orthogonal DCT Expansion in Trapezoid and Triangular Blocks and Modified JPEG Image Compression
* Corner Detection and Classification Using Anisotropic Directional Derivative Representations
* Image Inpainting on the Basis of Spectral Structure From 2-D Nonharmonic Analysis
* Self-Supervised Online Metric Learning With Low Rank Constraint for Scene Categorization
* Coupled Variational Image Decomposition and Restoration Model for Blurred Cartoon-Plus-Texture Images With Missing Pixels
* General Framework to Histogram-Shifting-Based Reversible Data Hiding
* Learning Dynamic Hybrid Markov Random Field for Image Labeling
* Rotation Invariant Local Frequency Descriptors for Texture Classification
* Image Quality Assessment Using Multi-Method Fusion
* Scalable Coding of Depth Maps With R-D Optimized Embedding
* Fuzzy C-Means Clustering With Local Information and Kernel Metric for Image Segmentation
* Performance Evaluation Methodology for Historical Document Image Binarization


Domain - Software Engineering
Java 2013-14 IEEE Project Titles in Software Engineering
* Active Learning and Effort Estimation: Finding the Essential Content of Software Effort Estimation Data
* Generating Domain-Specific Visual Language Tools from Abstract Visual Specifications
* MADMatch: Many-to-Many Approximate Diagram Matching for Design Comparison
* Ranking and Clustering Software Cost Estimation Models through a Multiple Comparisons Algorithm
* Scaling Up Spike-and-Slab Models for Unsupervised Feature Learning
* Validating Second-Order Mutation at System Level
* Balancing Privacy and Utility in Cross-Company Defect Prediction


Domain - Pattern Analysis and Machine Learning, PAML
Java 2013-14 IEEE Project Titles in Pattern Analysis and Machine Learning
* 3D Convolutional Neural Networks for Human Action Recognition
* A Globally-Variant Locally-Constant Model for Fusion of Labels from Multiple Diverse Experts without Using Reference Labels
* Efficient Classification for Additive Kernel SVMs
* Fast and Accurate Matrix Completion via Truncated Nuclear Norm Regularization
* Image Transformation Based on Learning Dictionaries across Image Spaces


Domain - Information Forensics and Security
Java 2013-14 IEEE Project Titles in Information Forensics and Security
* Extracting Spread-Spectrum Hidden Data from Digital Media.
* Utility-Privacy Tradeoff in Databases An Information-theoretic Approach.
* TrPF A Trajectory Privacy-Preserving Framework for Participatory Sensor

3 comments:

  1. Wiztech Automation Pvt. Ltd., Anna Nagar, Chennai, an ISO & IAO certified organization, has been for years enabling & supporting the engineering students by helping them to do their Final Year IEEE Projects, which are very essential and are the reflection of their academic performances all through their engineering course. Wiztech has been able to support and develop for students several of Final Year IEEE Projects covering various domains including mechanical projects in Chennai.

    Fianl year projects in chennai
    ECE projects in chennai
    Mechanical projects in Chennai
    CSE and IT Projects in chennai
    EEE Projects in Chennai
    Industrial projects in chennai
    VLSI projects in chennai

    ReplyDelete
  2. Hi Great Blog I Have Read Your Post It Is Very Informative And Useful Thanks For Posting And Sharing With Us And Your Writting Style Is Very Nice And Please Give Me More Information For Mca Intership Traning.
    Project Centres In Bangalore

    ReplyDelete