SlideShare a Scribd company logo
1 of 8
Download to read offline
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
M.TECH JAVA LIST 2013-14
S. No
Project
Code
Project Title Domain Year
1 J1301
Privacy-Preserving Public Auditing for
Secure Cloud Storage
Cloud
Computing
2013
2 J1302
Winds of Change from Vendor Lock-In to
the Meta Cloud
Cloud
Computing
2013
3 J1303
AMES-Cloud: A Framework of Adaptive
Mobile Video Streaming and Efficient
Social Video Sharing in
the Clouds
Cloud
Computing
2013
4
J1304
A Load Balancing Model Based on Cloud
Partitioning for the
Public Cloud
Cloud
Computing 2013
5
J1305 Privacy Preserving Delegated Access
Control in Public Clouds
Cloud
Computing
2013
6
J1306
A Stochastic Model to Investigate Data
Center Performance and QoS in IaaS Cloud
Computing Systems
Cloud
Computing 2013
7
J1307
CloudMoV: Cloud-based Mobile Social TV
Cloud
Computing 2013
8
J1308
Dynamic Resource Allocation Using Virtual
Machines for Cloud Computing
Environment
Cloud
Computing
2013
9
J1309
Error-Tolerant Resource Allocation and
Payment Minimization for Cloud System
Cloud
Computing
2013
10
J1310
Harnessing the Cloud for Securely
Outsourcing Large-Scale Systems of Linear
Equations
Cloud
Computing
2013
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
11
J1311
Mona: Secure Multi-Owner Data Sharing
for Dynamic Groups in the Cloud
Cloud
Computing
2013
12
J1312
PACK: Prediction-Based Cloud Bandwidth
and Cost Reduction System
Cloud
Computing
2013
13
J1313
Scalable and Secure Sharing of Personal
Health Records in Cloud Computing Using
Attribute-Based Encryption
Cloud
Computing
2013
14
J1314
Enabling Dynamic Data and Indirect Mutual
Trust for Cloud
Computing Storage Systems
Cloud
Computing 2013
15
J1315
Load Rebalancing for Distributed File
Systems in Clouds
Cloud
Computing
2013
16
J1316
Optimizing Cloud Resources for
Delivering IPTV Services Through
Virtualization
Cloud
Computing
2013
17
J1317
Attribute-Based Encryption With
Verifiable Outsourced Decryption
Cloud
Computing
2013
18
J1318
A Fast Clustering-Based Feature Subset
Selection Algorithm for High-
Dimensional Data
DATA
MINING
2013
19
J1319
CloudMoV: Cloud-based Mobile Social TV
DATA
MINING 2013
20
J1320
Crowd sourcing Predictors of Behavioral
Outcomes
DATA
MINING
2013
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
21
J1321
Spatial Approximate String Search
DATA
MINING
2013
22
J1322 Incentive Compatible Privacy-Preserving
Data Analysis
DATA
MINING
2013
23
J1323 Focus Learning to Crawl Web Forums DATA
MINING 2013
24
J1324 Robust Module Based Data Management DATA
MINING 2013
25
J1325 Comparable Entity Mining from
Comparative Questions
DATA
MINING 2013
26
J1326 Facilitating Effective User Navigation
through Website Structure Improvement
DATA
MINING 2013
27
J1327 PMSE: A Personalized Mobile Search
Engine
DATA
MINING 2013
28
J1328 Sensitive Label Privacy Protection on Social
Network Data
DATA
MINING 2013
29
J1329 . A System to Filter Unwanted Messages
from OSN User Walls
DATA
MINING 2013
30
J1330
A New Algorithm for Inferring User Search
Goals with Feedback Sessions
DATA
MINING 2013
31
J1331
Annotating Search Results from Web
Databases
DATA
MINING
2013
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
32
J1332
Anomaly Detection via Online Over-
Sampling Principal Component Analysis
DATA
MINING
2013
33
J1333
Distributed Processing of Probabilistic Top-
k Queries in Wireless Sensor Networks
DATA
MINING
2013
34
J1334
m-Privacy for Collaborative Data
Publishing
DATA
MINING
2013
35
J1335
Protecting Sensitive Labels in Social
Network Data Anonymization
DATA
MINING 2013
36
J1336
Tweet Analysis for Real-Time Event
Detection and Earthquake
DATA
MINING 2013
37
J1337
Document Clustering for Forensic
Analysis: An Approach for
Improving
Computer
Inspection
DATA
MINING
2013
38
J1338
A Method for Mining Infrequent
Causal Associations and Its
Application in Finding Adverse
Drug Reaction Signal Pairs
DATA
MINING
2013
39
J1339
Clustering Sentence-Level Text Using
a Novel Fuzzy Relational
Clust
ering
Algo
rithm
DATA
MINING
2013
40
J1340
Facilitating Document Annotation
using Content and Querying
V
a
l
u
e
DATA
MINING 2013
41
J1341
A Generalized Flow-Based Method
for Analysis of Implicit
Relationsh
ips on
Wikipedia
DATA
MINING 2013
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
42
J1342
Anonymization of Centralized and
Distributed Social Networks by
Seque
ntial
Clust
ering
DATA
MINING
2013
43
J1343
Intrusion Detection Technique by using
K-means, Fuzzy Neural
Network
and SVM
classifiers.
DATA
MINING
2013
44
J1344
Preventing Private Information
Inference Attacks on Social
N
e
t
w
o
r
k
s
DATA
MINING 2013
45
J1345
Multiparty Access Control for Online
Social Networks Model and
M
e
c
h
a
n
i
s
m
s
DATA
MINING 2013
46
J1346
EAACK—A Secure Intrusion-
Detection System for MANETs
DATA
MINING
2013
47
J1347
Identity-Based Secure Distributed Data
Storage Schemes
DATA
MINING
2013
48
J1348 Modeling the Pairwise Key
Predistribution Scheme in the Presence
of Unreliable Links
DATA
MINING
2013
49
J1349
A Highly Scalable Key Pre-Distribution
Scheme for Wireless Sensor Networks
Networking
2013
50
J1350
Optimizing Cloud Resources for Delivering
IPTV Services through Virtualization
Networking
2013
51
J1351
Mining contract s for business event and
temporal constraints in service engagement
Networking
2013
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
52
J1352
Fully Anonymous Profile Matching in
Mobile Social Networks
Networking
2013
53
J1353
Access Policy Consolidation for Event
Processing Systems
Networking
2013
54
J1354
Price Differentiation for Communication
Networks Networking 2013
55 J1355 Delay-Based Network Utility Maximization Networking 2013
56
J356
Dynamic Control of Coding for Progressive
Packet Arrivals in DTNs
Networking 2013
57
J1357
Minimum Cost Blocking Problem in
Multi-path Wireless Routing
P
r
o
t
o
c
o
l
s
Networking
2013
58
J1358 On the Node Clone Detection in Wireless
Sensor Networks
Networking 2013
59
J1359 Opportunistic MANETs: Mobility
Can Make Up for LowTransmission
Power
Networking 2013
60
J1360
Back-Pressure-Based Packet-by-
Packet Adaptive Routing in
Communi
cation
Networks
Networking 2013
61
J1361
Fast Transmission to Remote
Cooperative Groups: A New Key
Manage
ment
Paradig
m
Networking
2013
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
62
J1362
Participatory Privacy: Enabling Privacy
in Participatory Sensing
Networking
2013
63
J1363 Using Fuzzy Logic Control to Provide
Intelligent Traffic Management Service for
High-Speed Networks
Networking 2013
64
J1364
CAM: Cloud-Assisted Privacy Preserving
Mobile Health Monitoring.
Secure
Computing
2013
65
J1365
Utility-Privacy Tradeoff in Databases An
Information-theoretic Approach.
Secure
Computing
2013
66
J1366
Extracting Spread-Spectrum Hidden Data
from Digital Media
Secure
Computing
2013
67
J1367
Two tales of privacy in online social
networks
Secure
Computing
2013
68
J1368 Dynamic Resource Allocation using Virtual
Machines for Cloud Computing
Environment
Parallel and
Distributed
Systems
2013
69
J1369
Mobile Relay Configuration in Data-
intensive Wireless Sensor Networks.
Mobile
Computing
2013
70
J1370
Vampire attacks: Draining life from
wireless ad-hoc sensor networks.
Mobile
Computing
2013
71
J1371
Towards a Statistical Framework for Source
Anonymity in Sensor Networks
Mobile
Computing
2013
SAK INFORMATICS (0)9603999243, 8333034195
#C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com
www.sakinformatics.com
72
J1372 A Scalable Server Architecture for Mobile
Presence Services in Social Network
Applications
Mobile
Computing
2013
73
J1373 Privacy-Preserving Distributed Profile
Matching in Proximity-based Mobile Social
Networks
Mobile
Computing
2013
74
J1374
Distributed Cooperative Caching in Social
Wireless Networks
Mobile
Computing
2013

More Related Content

What's hot

2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotech2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotech
maheshmtech123
 

What's hot (10)

Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles
 
Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16
 
Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...
Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...
Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...
 
Java ieee projects titles 2014 2015
Java ieee projects  titles 2014 2015Java ieee projects  titles 2014 2015
Java ieee projects titles 2014 2015
 
BULK IEEE 2019-20 PROJECTS IN JAVA,BULK IEEE PROJECTS, IEEE 2019-20 JAVA PR...
 BULK IEEE  2019-20 PROJECTS IN JAVA,BULK IEEE PROJECTS, IEEE 2019-20 JAVA PR... BULK IEEE  2019-20 PROJECTS IN JAVA,BULK IEEE PROJECTS, IEEE 2019-20 JAVA PR...
BULK IEEE 2019-20 PROJECTS IN JAVA,BULK IEEE PROJECTS, IEEE 2019-20 JAVA PR...
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
Ieee 2013 projects titles
Ieee 2013 projects titlesIeee 2013 projects titles
Ieee 2013 projects titles
 
2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotech2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotech
 

Viewers also liked

Mersin’in nüfus özellikleri sunu
Mersin’in nüfus özellikleri sunuMersin’in nüfus özellikleri sunu
Mersin’in nüfus özellikleri sunu
Irem Koçyiğit
 
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
Aan Skiletto
 

Viewers also liked (15)

TICS
TICSTICS
TICS
 
M.tech embedded list 2014 15
M.tech embedded list 2014 15 M.tech embedded list 2014 15
M.tech embedded list 2014 15
 
Arm 7 m.tech list
Arm 7 m.tech listArm 7 m.tech list
Arm 7 m.tech list
 
Jora ppt
Jora pptJora ppt
Jora ppt
 
M.tech embedded 2013 14 list
M.tech embedded 2013 14 listM.tech embedded 2013 14 list
M.tech embedded 2013 14 list
 
M.tech vlsi list 2014 15
M.tech vlsi list 2014 15M.tech vlsi list 2014 15
M.tech vlsi list 2014 15
 
Logistics Consulting Firm LLC
Logistics Consulting Firm LLCLogistics Consulting Firm LLC
Logistics Consulting Firm LLC
 
M.tech java 2014 15 list
M.tech java 2014 15 listM.tech java 2014 15 list
M.tech java 2014 15 list
 
Bab i
Bab  iBab  i
Bab i
 
Curso de moodle
Curso de moodleCurso de moodle
Curso de moodle
 
Mersin’in nüfus özellikleri sunu
Mersin’in nüfus özellikleri sunuMersin’in nüfus özellikleri sunu
Mersin’in nüfus özellikleri sunu
 
M.tech eee list 2014 15
M.tech eee list 2014 15M.tech eee list 2014 15
M.tech eee list 2014 15
 
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
Kti skripsi no.59 gambaran pengetahuan petugas kesehatan tentang mutu pelayan...
 
İdrarda Mikroskobik Analiz
İdrarda Mikroskobik Analizİdrarda Mikroskobik Analiz
İdrarda Mikroskobik Analiz
 
Ppt menajmen logistik
Ppt menajmen logistik Ppt menajmen logistik
Ppt menajmen logistik
 

Similar to M.tech java list 2013

Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
sybiantech
 
2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informatics2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informatics
Papitha Velumani
 
2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics
Papitha Velumani
 
IEEE Project Titles 2022-2023
IEEE Project Titles 2022-2023IEEE Project Titles 2022-2023
IEEE Project Titles 2022-2023
Shakas Technologies
 

Similar to M.tech java list 2013 (20)

Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
 
dotnet-projects in madurai
dotnet-projects in maduraidotnet-projects in madurai
dotnet-projects in madurai
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
 
2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informatics2013 ieee java project titles-lans a-informatics
2013 ieee java project titles-lans a-informatics
 
2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics2013 ieee dotnet project titles - lans a informatics
2013 ieee dotnet project titles - lans a informatics
 
Java 2015
Java 2015Java 2015
Java 2015
 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project list
 
Main p roject list for csc it
Main p roject list for  csc itMain p roject list for  csc it
Main p roject list for csc it
 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
 
IEEE Project Titles 2022-2023
IEEE Project Titles 2022-2023IEEE Project Titles 2022-2023
IEEE Project Titles 2022-2023
 
Java ieee titles2016 student
Java ieee titles2016  studentJava ieee titles2016  student
Java ieee titles2016 student
 
2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE
 
Mca dotnet projects titles@ dreamweb techno solution trichy
Mca  dotnet projects titles@ dreamweb techno solution trichyMca  dotnet projects titles@ dreamweb techno solution trichy
Mca dotnet projects titles@ dreamweb techno solution trichy
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
 
Mca dotnet projects titles@ dreamweb techno solution trichy
Mca  dotnet projects titles@ dreamweb techno solution trichyMca  dotnet projects titles@ dreamweb techno solution trichy
Mca dotnet projects titles@ dreamweb techno solution trichy
 
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
Final year mca dotnet projects titles@ dreamweb techno solution trichy - copy...
 
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
Mca final year projects dotnet projects titles@ dreamweb techno solution tric...
 
Final year dotnet projects titles@ dreamweb techno solution trichy -
Final year  dotnet projects titles@ dreamweb techno solution trichy -Final year  dotnet projects titles@ dreamweb techno solution trichy -
Final year dotnet projects titles@ dreamweb techno solution trichy -
 

More from SAK Informatics

More from SAK Informatics (9)

M.tech .net 2014 15 list
M.tech .net 2014 15 listM.tech .net 2014 15 list
M.tech .net 2014 15 list
 
M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
 
Vlsi b.tech 2014 15
Vlsi b.tech 2014 15Vlsi b.tech 2014 15
Vlsi b.tech 2014 15
 
Dsp b.tech 2014 15
Dsp b.tech 2014 15Dsp b.tech 2014 15
Dsp b.tech 2014 15
 
M.tech dsp list 2014 15
M.tech dsp list 2014 15M.tech dsp list 2014 15
M.tech dsp list 2014 15
 
Dsp mini list 2014
Dsp mini list 2014Dsp mini list 2014
Dsp mini list 2014
 
Embedded mini list 2014
Embedded mini list 2014Embedded mini list 2014
Embedded mini list 2014
 
M.Tech NS2 List
M.Tech NS2 List M.Tech NS2 List
M.Tech NS2 List
 
M.Tech VLSI List of new titles for the year 2014
M.Tech VLSI List of new titles for the year 2014 M.Tech VLSI List of new titles for the year 2014
M.Tech VLSI List of new titles for the year 2014
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

M.tech java list 2013

  • 1. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com M.TECH JAVA LIST 2013-14 S. No Project Code Project Title Domain Year 1 J1301 Privacy-Preserving Public Auditing for Secure Cloud Storage Cloud Computing 2013 2 J1302 Winds of Change from Vendor Lock-In to the Meta Cloud Cloud Computing 2013 3 J1303 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds Cloud Computing 2013 4 J1304 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Cloud Computing 2013 5 J1305 Privacy Preserving Delegated Access Control in Public Clouds Cloud Computing 2013 6 J1306 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing 2013 7 J1307 CloudMoV: Cloud-based Mobile Social TV Cloud Computing 2013 8 J1308 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Cloud Computing 2013 9 J1309 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Cloud Computing 2013 10 J1310 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Cloud Computing 2013
  • 2. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 11 J1311 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Cloud Computing 2013 12 J1312 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Cloud Computing 2013 13 J1313 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption Cloud Computing 2013 14 J1314 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Cloud Computing 2013 15 J1315 Load Rebalancing for Distributed File Systems in Clouds Cloud Computing 2013 16 J1316 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization Cloud Computing 2013 17 J1317 Attribute-Based Encryption With Verifiable Outsourced Decryption Cloud Computing 2013 18 J1318 A Fast Clustering-Based Feature Subset Selection Algorithm for High- Dimensional Data DATA MINING 2013 19 J1319 CloudMoV: Cloud-based Mobile Social TV DATA MINING 2013 20 J1320 Crowd sourcing Predictors of Behavioral Outcomes DATA MINING 2013
  • 3. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 21 J1321 Spatial Approximate String Search DATA MINING 2013 22 J1322 Incentive Compatible Privacy-Preserving Data Analysis DATA MINING 2013 23 J1323 Focus Learning to Crawl Web Forums DATA MINING 2013 24 J1324 Robust Module Based Data Management DATA MINING 2013 25 J1325 Comparable Entity Mining from Comparative Questions DATA MINING 2013 26 J1326 Facilitating Effective User Navigation through Website Structure Improvement DATA MINING 2013 27 J1327 PMSE: A Personalized Mobile Search Engine DATA MINING 2013 28 J1328 Sensitive Label Privacy Protection on Social Network Data DATA MINING 2013 29 J1329 . A System to Filter Unwanted Messages from OSN User Walls DATA MINING 2013 30 J1330 A New Algorithm for Inferring User Search Goals with Feedback Sessions DATA MINING 2013 31 J1331 Annotating Search Results from Web Databases DATA MINING 2013
  • 4. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 32 J1332 Anomaly Detection via Online Over- Sampling Principal Component Analysis DATA MINING 2013 33 J1333 Distributed Processing of Probabilistic Top- k Queries in Wireless Sensor Networks DATA MINING 2013 34 J1334 m-Privacy for Collaborative Data Publishing DATA MINING 2013 35 J1335 Protecting Sensitive Labels in Social Network Data Anonymization DATA MINING 2013 36 J1336 Tweet Analysis for Real-Time Event Detection and Earthquake DATA MINING 2013 37 J1337 Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection DATA MINING 2013 38 J1338 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs DATA MINING 2013 39 J1339 Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clust ering Algo rithm DATA MINING 2013 40 J1340 Facilitating Document Annotation using Content and Querying V a l u e DATA MINING 2013 41 J1341 A Generalized Flow-Based Method for Analysis of Implicit Relationsh ips on Wikipedia DATA MINING 2013
  • 5. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 42 J1342 Anonymization of Centralized and Distributed Social Networks by Seque ntial Clust ering DATA MINING 2013 43 J1343 Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. DATA MINING 2013 44 J1344 Preventing Private Information Inference Attacks on Social N e t w o r k s DATA MINING 2013 45 J1345 Multiparty Access Control for Online Social Networks Model and M e c h a n i s m s DATA MINING 2013 46 J1346 EAACK—A Secure Intrusion- Detection System for MANETs DATA MINING 2013 47 J1347 Identity-Based Secure Distributed Data Storage Schemes DATA MINING 2013 48 J1348 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links DATA MINING 2013 49 J1349 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Networking 2013 50 J1350 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Networking 2013 51 J1351 Mining contract s for business event and temporal constraints in service engagement Networking 2013
  • 6. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 52 J1352 Fully Anonymous Profile Matching in Mobile Social Networks Networking 2013 53 J1353 Access Policy Consolidation for Event Processing Systems Networking 2013 54 J1354 Price Differentiation for Communication Networks Networking 2013 55 J1355 Delay-Based Network Utility Maximization Networking 2013 56 J356 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs Networking 2013 57 J1357 Minimum Cost Blocking Problem in Multi-path Wireless Routing P r o t o c o l s Networking 2013 58 J1358 On the Node Clone Detection in Wireless Sensor Networks Networking 2013 59 J1359 Opportunistic MANETs: Mobility Can Make Up for LowTransmission Power Networking 2013 60 J1360 Back-Pressure-Based Packet-by- Packet Adaptive Routing in Communi cation Networks Networking 2013 61 J1361 Fast Transmission to Remote Cooperative Groups: A New Key Manage ment Paradig m Networking 2013
  • 7. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 62 J1362 Participatory Privacy: Enabling Privacy in Participatory Sensing Networking 2013 63 J1363 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks Networking 2013 64 J1364 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. Secure Computing 2013 65 J1365 Utility-Privacy Tradeoff in Databases An Information-theoretic Approach. Secure Computing 2013 66 J1366 Extracting Spread-Spectrum Hidden Data from Digital Media Secure Computing 2013 67 J1367 Two tales of privacy in online social networks Secure Computing 2013 68 J1368 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Parallel and Distributed Systems 2013 69 J1369 Mobile Relay Configuration in Data- intensive Wireless Sensor Networks. Mobile Computing 2013 70 J1370 Vampire attacks: Draining life from wireless ad-hoc sensor networks. Mobile Computing 2013 71 J1371 Towards a Statistical Framework for Source Anonymity in Sensor Networks Mobile Computing 2013
  • 8. SAK INFORMATICS (0)9603999243, 8333034195 #C4, KVR Enclave, Near ICICI Bank, Ameerpet, Hyderabad sakinformatics@gmail.com www.sakinformatics.com 72 J1372 A Scalable Server Architecture for Mobile Presence Services in Social Network Applications Mobile Computing 2013 73 J1373 Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks Mobile Computing 2013 74 J1374 Distributed Cooperative Caching in Social Wireless Networks Mobile Computing 2013