High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
Java 2014 15
1. JAVA
Contact: +91 9158547792
www.candorminds.com
1
CandorMinds
CODE TITLE DESCRIPTION
IEEE2014-CLOUDCOMPUTING
JCC01
Lifelong Personal Health Data and
Application Software via Virtual
MachinesintheCloud
Softwareengineering,healthcarerecord,virtualmachine.
JCC02
Consistency as a Service: Auditing
CloudConsistency
Networksecurity,auditing,CAAS,heuristicalgorithm.
JCC03
Balancing Performance, Accuracy,
and Precision for Secure Cloud
Transactions
Cloud data base, quality of service, performance evaluation, Security, key
accessing.
JCC04
A Scalable Two-Phase Top-Down
Specialization Approach for Data
Anonymization Using Map Reduce on
Cloud
Datamining,privacypreservation,distributedalgorithm, TDS approach.
JCC05
Proactive Workload Management in
HybridCloudComputing
Multi-cloud, workload management, load balance, performance
evaluation.
JCC06
Decreasing Impact of SLA Violations:
A Proactive Resource Allocation
Approach for Cloud Computing
Environments
Resourceallocation,qualityofservice,IAAS,virtualmachine.
JCC07
KASR: A Keyword-Aware Service
Recommendation Method on Map
Reduce for Big Data Applications
Data mining, big data, keyword search parallel computing, filtering
algorithm.
JCC08
Distributed, Concurrent, and
Independent Access to Encrypted
CloudDatabases
Networksecurity,encryptionsecuredatabase,cryptographicschemes.
JCC09
A Hybrid Cloud Approach for Secure
A u t h o r i z e d D e d u p l i c a t i o n
Hybrid cloud, authentication, deduplication private cloud, authorized
duplicatecheck.
2. JAVA
Contact: +91 9158547792
www.candorminds.com
2
CandorMinds
CODE TITLE DESCRIPTION
IEEE2014-CLOUDCOMPUTING
JCC10
Shared Authority Based Privacy-
preserving Authentication Protocol
in Cloud Computing
Network security, privacy preserving, shared authority, authentication
protocol.
JCC11
Privacy-Preserving Multi-Keyword
Ranked Search over Encrypted Cloud
Data
Privacy preserving, searchable encryption rank search, cryptographic
scheme.
JCC12
Resource Availability Characteristics
and Node Selection in Cooperatively
SharedComputingPlatforms
Resourceallocation,datamining,faulttolerance,quality control.
JCC13
Decentralized Access Control with
Anonymous Authentication of Data
StoredinClouds
Authentication,encryption,attributebased signature,multi-cloud.
JCC14
Scalable Distributed Service Integrity
Attestation for Software-as-a-Service
Clouds
Security, data mining, networking, software-as-a-service, secure
distributeddataprocessing.
JCC15
Privacy Preserving Back-Propagation
Neural Network Learning Made
Practicalwith CloudComputing
Neural networking, networking, data mining, security, privacy Preserving,
learning,back-propagation.
JDM01
Building Confidential and Efficient
Query Services in the Cloud with RASP
DataPerturbation
Cloud, QOS, KNN query, cryptographic schemes.
IEEE2014-DATAMINING
JDM02
A Fuzzy Preference Tree-Based
Recommender System for
Personalized Business-to-Business E-
Services
Web service, tree matching, fuzzy recommender system.
JDM03
Scalable Keyword Search on Large
RDF Data
Keywordsearch,resourcedescriptionframework.
3. JAVA
Contact: +91 9158547792
www.candorminds.com
3
CandorMinds
IEEE2014-DATAMINING
CODE TITLE DESCRIPTION
JDM04
Adaptive Replica Synchronization for
Distributed File Systems
Adaptive replica synchronization, version-based update, distribution
system.
JDM05
OCCT: A One-Class Clustering Tree for
Implementing One-to-Many Data
Linkage
Tree matching, clustering, data matching.
JDM06
Probabilistic Aspect Mining Model
for Drug Reviews
Data mining, medical centers, association rules, data mining algorithms,
healthcare,decision model.
JDM07
Efficient Range-Based Storage
Management for Scalable Data
stores
Distributed system, performance evaluation, quality-measurement,
Networking.
JDM08
PSMPA: Patient Self-controllable and
Multi-level Privacy-preserving
Cooperative Authentication in
Distributed m- Healthcare Cloud
ComputingSystem
Cloud, health care, authentication, encryption and privacy storage.
JDM09
Automatic Generation of the Domain
Module from Electronic Textbooks:
Method and Validation
Ontology, text mining, software engineering.
JDM10
Task Trail: An Effective Segmentation
of User Search Behavior
Software engineering, task evaluation, file mining, performance
evaluation.
JDM11
Supporting Privacy Protection in
Personalized Web Search
Security, privacy protection, search engine.
JDM12
An Empirical Performance Evaluation
of Relational Keyword Search
Techniques
Keyword search, relational database, information retrieval, empirical
evaluation, performance evaluation.
4. JAVA
Contact: +91 9158547792
www.candorminds.com
4
CandorMinds
IEEE2014-
DATAMINING
IEEE2014-
NETWORKING
IEEE2014-NETWORKSECURITY
CODE TITLE DESCRIPTION
JDM13
Discovering the Top-k Unexplained
Sequences in Time-Stamped
Observation Data
Data mining, artificial intelligence, security, knowledge base
management, knowledge representation formalisms and methods
JNS01
Secure Two-Party Differentially
Private Data Release for Vertically
Partitioned Data
Security, differential privacy, secure data integration, classification
analysis
JNS02
Private Searching on Streaming Data
BasedonKeywordFrequency
Security, private searching on streaming data, fully homomorphic
encryption, binary linear code, encryption.
JNS03
BuildingaScalableSystemforStealthy
P2P-BotnetDetection
Networking, botnet, p2p, intrusion detection, network security.
JNS04
The Client Assignment Problem for
Continuous Distributed Interactive
Applications: Analysis, Algorithms,
andEvaluations
Networking, distributed interactive application, client assignment,
interactivity, consistency, fairness, np-complete
JNS05
An Empirical Study of Ontology-Based
Multi-Document Summarization in
DisasterManagement
Data mining, disaster management, multi-document summarization,
ontology, query expansion, domain description.
JNS06
PPTP: Privacy-Preserving Traffic
Padding in Web-Based Applications
Networking, traffic padding, web application, side-channel Leak,
privacy-preserving.
JNS07
Securing Broker-Less
Publish/Subscribe Systems Using
Identity-Based Encryption
Content-based, publish/subscribe, P2P, broker-less, identity-based
encryption
JNW01
Evolving Fuzzy Rules for Anomaly
Detection in Data Streams
.
Network security, fuzzy rules, anomaly detection, anomaly detection,
auto-regressive model.
JNW02
Secure Data Retrieval for
Decentralized Disruption-Tolerant
Military Networks
Network security, access control, attribute-based encryption (ABE),
disruption-tolerant network (DTN), multi authority, secure Data
retrieval.
5. JAVA
Contact: +91 9158547792
www.candorminds.com
5
CandorMinds
IEEE2014-
SOFTWAREENGINEERING
IEEE2014
MOBILECOMPUTINGIEEE2014-NETWORKING
CODE TITLE DESCRIPTION
JNW03
List Scheduling Algorithm for
Heterogeneous Systems by an
OptimisticCostTable
Application scheduling, dag scheduling, random graphs generator, static
scheduling,optimisticcost.
JNW04
Cloning, Resource Exchange, and
Relation Adaptation: An Integrative
Self-Organization Mechanism in a
Distributed Agent Network
Distributed multi-agent system, self-organization, reinforcement
learning,andagentnetwork.
JNW05
Breaking the Barrier to Transferring
Link Information across Networks
Network security, Data mining, link prediction, link transfer, cross-
network
Bias, node attribution, link richness.
JNW06
Neighbor Similarity Trust against
Sybil Attack in P2P E-Commerce
P2p;trust;Sybilattack;collusionattack;neighbor similarity,e-commerce.
JNW07
Network Aware Scheduling for
Virtual Machine Workloads with
Interference Models
Cloud computing, virtualization, xen, profiling, performance modeling,
supportVectormachines, scheduling.
JNW08
A Model Approach to the Estimation
ofPeer-to-PeerTrafficMatrices
Network security, traffic matrix, peer-to-peer (p2p), traffic engineering,
costestimation.
JSW01
Embedding reflection and learning
into agile software Development
Agile software development, reflective practice, reflection in action,
reflection-on-action,learningorganization,leaningteams
JSW02
Online Feature Selection and Its
Applications
Web services ,feature selection, online learning, large-scale data
mining, classification, big data analytics
JSW03
Continuous and Transparent User
Identity Verification for Secure
Internet Services
Security,webservers,mobileenvironments,authentication
JMC01
Interference and Outage in Mobile
Random Networks: Expectation,
Distribution,andCorrelation
Aloha,CSMA,correlation,parallelprocess
6. JAVA
Contact: +91 9158547792
www.candorminds.com
6
CandorMinds
IEEE2014-
GRIDCOMPUTING
IEEE2014
IMAGEPROCESSING
IEEE2014
MOBILECOMPUTING
CODE TITLE DESCRIPTION
JMC02
Efficient Rekeying Framework for
Secure Multicast with Diverse-
Subscription-PeriodMobileUsers
Multicast,security,groupkeymanagement,faulttolerance
JMC03
Achieving Maximum Throughput in
Random Access Protocols with Multi
packetReception
Multipacketreception,slotted-aloha,CSMA,MACprotocol
JMC04
QOF: Towards Comprehensive Path
Quality measurement in Wireless
Sensor Networks
Networking, path quality, node quality, quality of forwarding, quality
Measurement,
JMC05
Distributed Detection in Mobile
Access Wireless Sensor Networks
under Byzantine Attacks
Security, security in wireless sensor networks (WSN), byzantine attacks,
distributeddetection,mobileaccess.
JIM01
Fuzzy Clustering With a Modified MRF
Energy Function for Change Detection
inSyntheticApertureRadarImages
Fuzzy clustering, image change detection, Markov random field (MRF),
syntheticapertureradar(SAR).
JIM02
MeasuresofEffectiveVideo Tracking Multi-target video tracking, evaluation measure, accuracy, cardinality
error,idchanges.
JIM03
Image Quality Assessment for Fake
Biometric Detection: Application to
IRIS, Fingerprint, and Face
Recognition
Image quality assessment, biometrics, security, attacks, counter
measures.
JIM04
Object-Oriented Shadow Detection
and Removal From Urban High-
Resolution Remote Sensing Images
Changedetection,inner–outeroutlineprofileline
(ioopl), object-oriented, relative radiometric correction, shadow
Detection,shadowremoval.
JGC01
Containing Byzantine Failures with
ControlZones
Byzantine failures, Multihop networks, asynchronous networks, reliable
broadcast, fault tolerance, distributed computing, protocol, random
failures.
JGC02
Rate less Codes and Random Walks
forP2PResourceDiscoveryinGrids
Networking resource discovery, peer to peer, rateless codes, random
walks
7. JAVA
Contact: +91 9158547792
www.candorminds.com
7
CandorMinds
IEEE2014-
MULTIMEDIAIEEE2014-J2EE
CODE TITLE DESCRIPTION
JMM01
Uniform Embedding for Efficient JPEG
Steganography
JPEG steganography, minimal - distortion embedding, uniform
embedding,qualityanalyzer
JMM02
Performance Analysis of Media
Cloud-Based Multimedia Systems
With Retrying Fault-Tolerance
Technique
Cloud ,performance evaluation, fault-tolerance technique, interactive
videoRetrieval
JMM03
Composing Kerberos and Multimedia
Internet Keying (MIKEY) for
Authenticated Transport of Group
Keys
Cryptographic protocols, authentication, multicast communication,
cryptographicprotocols,groupkeysmanagement,encryption
J2EE01
Building Confidential and Efficient
Query Services in the Cloud with RASP
DataPerturbation
Cloud,QOS,KNNquery,cryptographicschemes.
J2EE02
A Fuzzy Preference Tree-Based
Recommender System for
Personalized Business-to-Business E-
Services
Webservice,treematching,fuzzyrecommender system.
J2EE03
Scalable Keyword Search on Large
RDF Data
Keyword search, resource description framework.
J2EE04
Adaptive Replica Synchronization for
DistributedFileSystems
Adaptive replica synchronization, version-based update, distribution
system.
J2EE05
OCCT: A One-Class Clustering Tree for
Implementing One-to-Many Data
Linkage
Treematching,clustering,datamatching.
J2EE06
Probabilistic Aspect Mining Model for
DrugReviews
Data mining, medical centers, association rules, data mining algorithms,
healthcare, decision model.
J2EE07
Efficient Range-Based Storage
ManagementforScalableDatastores
Distributed system, performance evaluation, quality-measurement,
Networking.
Ourtechnique maximizes mixed workload performance while providing
servicedifferentiation basedonhigh-levelperformancegoals.
8. JAVA
Contact: +91 9158547792
www.candorminds.com
8
CandorMinds
CODE TITLE DESCRIPTION
IEEE2014-J2EE
J2EE08
PSMPA: Patient Self-controllable and
Multi-level Privacy-preserving
Cooperative Authentication in
Distributed m- Healthcare Cloud
ComputingSystem
Cloud,healthcare,authentication,encryptionandprivacystorage.
J2EE09
Automatic Generation of the Domain
Module from Electronic Textbooks:
MethodandValidation
Ontology, text mining, software engineering.
J2EE10
Task Trail: An Effective Segmentation
ofUserSearchBehavior
Software engineering, task evaluation, file mining, performance
evaluation.
J2EE11
Supporting Privacy Protection in
PersonalizedWebSearch
Security,privacyprotection,searchengine.
J2EE12
An Empirical Performance Evaluation
of Relational Keyword Search
Techniques
Keyword search, relational database, information retrieval, empirical
evaluation,performanceevaluation,
J2EE13
Discovering the Top-k Unexplained
Sequences in Time-Stamped
ObservationData
Data mining, artificial intelligence, security, knowledge base
management,knowledgerepresentation formalismsand methods.