SlideShare a Scribd company logo
1 of 8
Download to read offline
JAVA
Contact: +91 9158547792
www.candorminds.com
1
CandorMinds
CODE TITLE DESCRIPTION
IEEE2014-CLOUDCOMPUTING
JCC01
Lifelong Personal Health Data and
Application Software via Virtual
MachinesintheCloud
Softwareengineering,healthcarerecord,virtualmachine.
JCC02
Consistency as a Service: Auditing
CloudConsistency
Networksecurity,auditing,CAAS,heuristicalgorithm.
JCC03
Balancing Performance, Accuracy,
and Precision for Secure Cloud
Transactions
Cloud data base, quality of service, performance evaluation, Security, key
accessing.
JCC04
A Scalable Two-Phase Top-Down
Specialization Approach for Data
Anonymization Using Map Reduce on
Cloud
Datamining,privacypreservation,distributedalgorithm, TDS approach.
JCC05
Proactive Workload Management in
HybridCloudComputing
Multi-cloud, workload management, load balance, performance
evaluation.
JCC06
Decreasing Impact of SLA Violations:
A Proactive Resource Allocation
Approach for Cloud Computing
Environments
Resourceallocation,qualityofservice,IAAS,virtualmachine.
JCC07
KASR: A Keyword-Aware Service
Recommendation Method on Map
Reduce for Big Data Applications
Data mining, big data, keyword search parallel computing, filtering
algorithm.
JCC08
Distributed, Concurrent, and
Independent Access to Encrypted
CloudDatabases
Networksecurity,encryptionsecuredatabase,cryptographicschemes.
JCC09
A Hybrid Cloud Approach for Secure
A u t h o r i z e d D e d u p l i c a t i o n
Hybrid cloud, authentication, deduplication private cloud, authorized
duplicatecheck.
JAVA
Contact: +91 9158547792
www.candorminds.com
2
CandorMinds
CODE TITLE DESCRIPTION
IEEE2014-CLOUDCOMPUTING
JCC10
Shared Authority Based Privacy-
preserving Authentication Protocol
in Cloud Computing
Network security, privacy preserving, shared authority, authentication
protocol.
JCC11
Privacy-Preserving Multi-Keyword
Ranked Search over Encrypted Cloud
Data
Privacy preserving, searchable encryption rank search, cryptographic
scheme.
JCC12
Resource Availability Characteristics
and Node Selection in Cooperatively
SharedComputingPlatforms
Resourceallocation,datamining,faulttolerance,quality control.
JCC13
Decentralized Access Control with
Anonymous Authentication of Data
StoredinClouds
Authentication,encryption,attributebased signature,multi-cloud.
JCC14
Scalable Distributed Service Integrity
Attestation for Software-as-a-Service
Clouds
Security, data mining, networking, software-as-a-service, secure
distributeddataprocessing.
JCC15
Privacy Preserving Back-Propagation
Neural Network Learning Made
Practicalwith CloudComputing
Neural networking, networking, data mining, security, privacy Preserving,
learning,back-propagation.
JDM01
Building Confidential and Efficient
Query Services in the Cloud with RASP
DataPerturbation
Cloud, QOS, KNN query, cryptographic schemes.
IEEE2014-DATAMINING
JDM02
A Fuzzy Preference Tree-Based
Recommender System for
Personalized Business-to-Business E-
Services
Web service, tree matching, fuzzy recommender system.
JDM03
Scalable Keyword Search on Large
RDF Data
Keywordsearch,resourcedescriptionframework.
JAVA
Contact: +91 9158547792
www.candorminds.com
3
CandorMinds
IEEE2014-DATAMINING
CODE TITLE DESCRIPTION
JDM04
Adaptive Replica Synchronization for
Distributed File Systems
Adaptive replica synchronization, version-based update, distribution
system.
JDM05
OCCT: A One-Class Clustering Tree for
Implementing One-to-Many Data
Linkage
Tree matching, clustering, data matching.
JDM06
Probabilistic Aspect Mining Model
for Drug Reviews
Data mining, medical centers, association rules, data mining algorithms,
healthcare,decision model.
JDM07
Efficient Range-Based Storage
Management for Scalable Data
stores
Distributed system, performance evaluation, quality-measurement,
Networking.
JDM08
PSMPA: Patient Self-controllable and
Multi-level Privacy-preserving
Cooperative Authentication in
Distributed m- Healthcare Cloud
ComputingSystem
Cloud, health care, authentication, encryption and privacy storage.
JDM09
Automatic Generation of the Domain
Module from Electronic Textbooks:
Method and Validation
Ontology, text mining, software engineering.
JDM10
Task Trail: An Effective Segmentation
of User Search Behavior
Software engineering, task evaluation, file mining, performance
evaluation.
JDM11
Supporting Privacy Protection in
Personalized Web Search
Security, privacy protection, search engine.
JDM12
An Empirical Performance Evaluation
of Relational Keyword Search
Techniques
Keyword search, relational database, information retrieval, empirical
evaluation, performance evaluation.
JAVA
Contact: +91 9158547792
www.candorminds.com
4
CandorMinds
IEEE2014-
DATAMINING
IEEE2014-
NETWORKING
IEEE2014-NETWORKSECURITY
CODE TITLE DESCRIPTION
JDM13
Discovering the Top-k Unexplained
Sequences in Time-Stamped
Observation Data
Data mining, artificial intelligence, security, knowledge base
management, knowledge representation formalisms and methods
JNS01
Secure Two-Party Differentially
Private Data Release for Vertically
Partitioned Data
Security, differential privacy, secure data integration, classification
analysis
JNS02
Private Searching on Streaming Data
BasedonKeywordFrequency
Security, private searching on streaming data, fully homomorphic
encryption, binary linear code, encryption.
JNS03
BuildingaScalableSystemforStealthy
P2P-BotnetDetection
Networking, botnet, p2p, intrusion detection, network security.
JNS04
The Client Assignment Problem for
Continuous Distributed Interactive
Applications: Analysis, Algorithms,
andEvaluations
Networking, distributed interactive application, client assignment,
interactivity, consistency, fairness, np-complete
JNS05
An Empirical Study of Ontology-Based
Multi-Document Summarization in
DisasterManagement
Data mining, disaster management, multi-document summarization,
ontology, query expansion, domain description.
JNS06
PPTP: Privacy-Preserving Traffic
Padding in Web-Based Applications
Networking, traffic padding, web application, side-channel Leak,
privacy-preserving.
JNS07
Securing Broker-Less
Publish/Subscribe Systems Using
Identity-Based Encryption
Content-based, publish/subscribe, P2P, broker-less, identity-based
encryption
JNW01
Evolving Fuzzy Rules for Anomaly
Detection in Data Streams
.
Network security, fuzzy rules, anomaly detection, anomaly detection,
auto-regressive model.
JNW02
Secure Data Retrieval for
Decentralized Disruption-Tolerant
Military Networks
Network security, access control, attribute-based encryption (ABE),
disruption-tolerant network (DTN), multi authority, secure Data
retrieval.
JAVA
Contact: +91 9158547792
www.candorminds.com
5
CandorMinds
IEEE2014-
SOFTWAREENGINEERING
IEEE2014
MOBILECOMPUTINGIEEE2014-NETWORKING
CODE TITLE DESCRIPTION
JNW03
List Scheduling Algorithm for
Heterogeneous Systems by an
OptimisticCostTable
Application scheduling, dag scheduling, random graphs generator, static
scheduling,optimisticcost.
JNW04
Cloning, Resource Exchange, and
Relation Adaptation: An Integrative
Self-Organization Mechanism in a
Distributed Agent Network
Distributed multi-agent system, self-organization, reinforcement
learning,andagentnetwork.
JNW05
Breaking the Barrier to Transferring
Link Information across Networks
Network security, Data mining, link prediction, link transfer, cross-
network
Bias, node attribution, link richness.
JNW06
Neighbor Similarity Trust against
Sybil Attack in P2P E-Commerce
P2p;trust;Sybilattack;collusionattack;neighbor similarity,e-commerce.
JNW07
Network Aware Scheduling for
Virtual Machine Workloads with
Interference Models
Cloud computing, virtualization, xen, profiling, performance modeling,
supportVectormachines, scheduling.
JNW08
A Model Approach to the Estimation
ofPeer-to-PeerTrafficMatrices
Network security, traffic matrix, peer-to-peer (p2p), traffic engineering,
costestimation.
JSW01
Embedding reflection and learning
into agile software Development
Agile software development, reflective practice, reflection in action,
reflection-on-action,learningorganization,leaningteams
JSW02
Online Feature Selection and Its
Applications
Web services ,feature selection, online learning, large-scale data
mining, classification, big data analytics
JSW03
Continuous and Transparent User
Identity Verification for Secure
Internet Services
Security,webservers,mobileenvironments,authentication
JMC01
Interference and Outage in Mobile
Random Networks: Expectation,
Distribution,andCorrelation
Aloha,CSMA,correlation,parallelprocess
JAVA
Contact: +91 9158547792
www.candorminds.com
6
CandorMinds
IEEE2014-
GRIDCOMPUTING
IEEE2014
IMAGEPROCESSING
IEEE2014
MOBILECOMPUTING
CODE TITLE DESCRIPTION
JMC02
Efficient Rekeying Framework for
Secure Multicast with Diverse-
Subscription-PeriodMobileUsers
Multicast,security,groupkeymanagement,faulttolerance
JMC03
Achieving Maximum Throughput in
Random Access Protocols with Multi
packetReception
Multipacketreception,slotted-aloha,CSMA,MACprotocol
JMC04
QOF: Towards Comprehensive Path
Quality measurement in Wireless
Sensor Networks
Networking, path quality, node quality, quality of forwarding, quality
Measurement,
JMC05
Distributed Detection in Mobile
Access Wireless Sensor Networks
under Byzantine Attacks
Security, security in wireless sensor networks (WSN), byzantine attacks,
distributeddetection,mobileaccess.
JIM01
Fuzzy Clustering With a Modified MRF
Energy Function for Change Detection
inSyntheticApertureRadarImages
Fuzzy clustering, image change detection, Markov random field (MRF),
syntheticapertureradar(SAR).
JIM02
MeasuresofEffectiveVideo Tracking Multi-target video tracking, evaluation measure, accuracy, cardinality
error,idchanges.
JIM03
Image Quality Assessment for Fake
Biometric Detection: Application to
IRIS, Fingerprint, and Face
Recognition
Image quality assessment, biometrics, security, attacks, counter
measures.
JIM04
Object-Oriented Shadow Detection
and Removal From Urban High-
Resolution Remote Sensing Images
Changedetection,inner–outeroutlineprofileline
(ioopl), object-oriented, relative radiometric correction, shadow
Detection,shadowremoval.
JGC01
Containing Byzantine Failures with
ControlZones
Byzantine failures, Multihop networks, asynchronous networks, reliable
broadcast, fault tolerance, distributed computing, protocol, random
failures.
JGC02
Rate less Codes and Random Walks
forP2PResourceDiscoveryinGrids
Networking resource discovery, peer to peer, rateless codes, random
walks
JAVA
Contact: +91 9158547792
www.candorminds.com
7
CandorMinds
IEEE2014-
MULTIMEDIAIEEE2014-J2EE
CODE TITLE DESCRIPTION
JMM01
Uniform Embedding for Efficient JPEG
Steganography
JPEG steganography, minimal - distortion embedding, uniform
embedding,qualityanalyzer
JMM02
Performance Analysis of Media
Cloud-Based Multimedia Systems
With Retrying Fault-Tolerance
Technique
Cloud ,performance evaluation, fault-tolerance technique, interactive
videoRetrieval
JMM03
Composing Kerberos and Multimedia
Internet Keying (MIKEY) for
Authenticated Transport of Group
Keys
Cryptographic protocols, authentication, multicast communication,
cryptographicprotocols,groupkeysmanagement,encryption
J2EE01
Building Confidential and Efficient
Query Services in the Cloud with RASP
DataPerturbation
Cloud,QOS,KNNquery,cryptographicschemes.
J2EE02
A Fuzzy Preference Tree-Based
Recommender System for
Personalized Business-to-Business E-
Services
Webservice,treematching,fuzzyrecommender system.
J2EE03
Scalable Keyword Search on Large
RDF Data
Keyword search, resource description framework.
J2EE04
Adaptive Replica Synchronization for
DistributedFileSystems
Adaptive replica synchronization, version-based update, distribution
system.
J2EE05
OCCT: A One-Class Clustering Tree for
Implementing One-to-Many Data
Linkage
Treematching,clustering,datamatching.
J2EE06
Probabilistic Aspect Mining Model for
DrugReviews
Data mining, medical centers, association rules, data mining algorithms,
healthcare, decision model.
J2EE07
Efficient Range-Based Storage
ManagementforScalableDatastores
Distributed system, performance evaluation, quality-measurement,
Networking.
Ourtechnique maximizes mixed workload performance while providing
servicedifferentiation basedonhigh-levelperformancegoals.
JAVA
Contact: +91 9158547792
www.candorminds.com
8
CandorMinds
CODE TITLE DESCRIPTION
IEEE2014-J2EE
J2EE08
PSMPA: Patient Self-controllable and
Multi-level Privacy-preserving
Cooperative Authentication in
Distributed m- Healthcare Cloud
ComputingSystem
Cloud,healthcare,authentication,encryptionandprivacystorage.
J2EE09
Automatic Generation of the Domain
Module from Electronic Textbooks:
MethodandValidation
Ontology, text mining, software engineering.
J2EE10
Task Trail: An Effective Segmentation
ofUserSearchBehavior
Software engineering, task evaluation, file mining, performance
evaluation.
J2EE11
Supporting Privacy Protection in
PersonalizedWebSearch
Security,privacyprotection,searchengine.
J2EE12
An Empirical Performance Evaluation
of Relational Keyword Search
Techniques
Keyword search, relational database, information retrieval, empirical
evaluation,performanceevaluation,
J2EE13
Discovering the Top-k Unexplained
Sequences in Time-Stamped
ObservationData
Data mining, artificial intelligence, security, knowledge base
management,knowledgerepresentation formalismsand methods.

More Related Content

What's hot

Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17Java Team
 
Pantech ns2 projects 2016-17
Pantech   ns2 projects 2016-17Pantech   ns2 projects 2016-17
Pantech ns2 projects 2016-17Java Team
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17praba123456
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudIJMTST Journal
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Editor IJARCET
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computingijsptm
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects listManju Nath
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...IRJET Journal
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...Migrant Systems
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects MSR PROJECTS
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET Journal
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
77201924
7720192477201924
77201924IJRAT
 

What's hot (18)

Pantech java projects 2016-17
Pantech   java projects 2016-17Pantech   java projects 2016-17
Pantech java projects 2016-17
 
Pantech ns2 projects 2016-17
Pantech   ns2 projects 2016-17Pantech   ns2 projects 2016-17
Pantech ns2 projects 2016-17
 
Dotnet titles 2016 17
Dotnet titles 2016 17Dotnet titles 2016 17
Dotnet titles 2016 17
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
Acquisition of Secured Data from Cloud
Acquisition of Secured Data from CloudAcquisition of Secured Data from Cloud
Acquisition of Secured Data from Cloud
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 
Dotnet topics 2014-15
Dotnet  topics 2014-15Dotnet  topics 2014-15
Dotnet topics 2014-15
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
 
H1803035056
H1803035056H1803035056
H1803035056
 
2013 and 2014 ieee projects list
2013 and 2014 ieee projects list2013 and 2014 ieee projects list
2013 and 2014 ieee projects list
 
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
A Survey on Cross-License Cloud Storage Environment of Revelatory, Proficient...
 
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD USING KEY POLICY ATTRIBU...
 
2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects
 
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in CloudletIRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
IRJET- Medical Data Sharing for Protection and Intrusion Avoidance in Cloudlet
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
77201924
7720192477201924
77201924
 

Viewers also liked

MAIKEL BONGAERTS READY TO ENTER THE ADULT WORLD
MAIKEL BONGAERTS READY TO ENTER THE ADULT WORLDMAIKEL BONGAERTS READY TO ENTER THE ADULT WORLD
MAIKEL BONGAERTS READY TO ENTER THE ADULT WORLDMaikel Bongaerts
 
Dailogue Meeting for Children Parliament May 20th 2010
Dailogue Meeting for Children Parliament May 20th 2010Dailogue Meeting for Children Parliament May 20th 2010
Dailogue Meeting for Children Parliament May 20th 2010Patrick Obita
 
Achal_Resume_7.4
Achal_Resume_7.4Achal_Resume_7.4
Achal_Resume_7.4Achal Dalvi
 
Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...
Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...
Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...Robert Rydge
 
Seks w związku - dlaczego jest go mniej
Seks w związku -  dlaczego jest go mniejSeks w związku -  dlaczego jest go mniej
Seks w związku - dlaczego jest go mniejpufal
 
Mahagun moderne Noida call 9560090033
Mahagun moderne Noida call 9560090033Mahagun moderne Noida call 9560090033
Mahagun moderne Noida call 9560090033Nivesh Singh
 
Home renovation services
Home renovation servicesHome renovation services
Home renovation servicesMiamitile
 
Prashant resume 2015 pdf
Prashant resume 2015 pdfPrashant resume 2015 pdf
Prashant resume 2015 pdfPrashant Patil
 
開業支援(日本配食サービス協会)
開業支援(日本配食サービス協会)開業支援(日本配食サービス協会)
開業支援(日本配食サービス協会)haisyoku2015
 

Viewers also liked (12)

MAIKEL BONGAERTS READY TO ENTER THE ADULT WORLD
MAIKEL BONGAERTS READY TO ENTER THE ADULT WORLDMAIKEL BONGAERTS READY TO ENTER THE ADULT WORLD
MAIKEL BONGAERTS READY TO ENTER THE ADULT WORLD
 
Dailogue Meeting for Children Parliament May 20th 2010
Dailogue Meeting for Children Parliament May 20th 2010Dailogue Meeting for Children Parliament May 20th 2010
Dailogue Meeting for Children Parliament May 20th 2010
 
Achal_Resume_7.4
Achal_Resume_7.4Achal_Resume_7.4
Achal_Resume_7.4
 
Chocomachine_English
Chocomachine_EnglishChocomachine_English
Chocomachine_English
 
Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...
Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...
Functional Choice For Your Short Term Urgency Situation By Personal Loan Bad ...
 
Seks w związku - dlaczego jest go mniej
Seks w związku -  dlaczego jest go mniejSeks w związku -  dlaczego jest go mniej
Seks w związku - dlaczego jest go mniej
 
Mahagun moderne Noida call 9560090033
Mahagun moderne Noida call 9560090033Mahagun moderne Noida call 9560090033
Mahagun moderne Noida call 9560090033
 
Home renovation services
Home renovation servicesHome renovation services
Home renovation services
 
Prashant resume 2015 pdf
Prashant resume 2015 pdfPrashant resume 2015 pdf
Prashant resume 2015 pdf
 
Social Media Campaign
Social Media CampaignSocial Media Campaign
Social Media Campaign
 
Opark אור עקיבא
Opark אור עקיבאOpark אור עקיבא
Opark אור עקיבא
 
開業支援(日本配食サービス協会)
開業支援(日本配食サービス協会)開業支援(日本配食サービス協会)
開業支援(日本配食サービス協会)
 

Similar to Java 2014 15

Java projects
Java projectsJava projects
Java projectsshahu2212
 
IEEE 2014 .Net & Java Projects List
IEEE 2014 .Net & Java Projects ListIEEE 2014 .Net & Java Projects List
IEEE 2014 .Net & Java Projects Listlogicsystemsprojects
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvrtechnologies Nellore
 
IEEE 2014 Dotnet Projects
IEEE 2014 Dotnet ProjectsIEEE 2014 Dotnet Projects
IEEE 2014 Dotnet ProjectsChinnasamy C
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsgagnertechnologies
 
IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC excellertechnoly
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesSrinivasan Natarajan
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 Ganesh Ganesan
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSIJCNCJournal
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsIJCNCJournal
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015kishu0005
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantechSrinivasan Natarajan
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantechPantech ProEd Pvt Ltd
 

Similar to Java 2014 15 (20)

Java projects
Java projectsJava projects
Java projects
 
IEEE 2011 October titles
IEEE 2011 October titles IEEE 2011 October titles
IEEE 2011 October titles
 
IEEE 2014 .Net & Java Projects List
IEEE 2014 .Net & Java Projects ListIEEE 2014 .Net & Java Projects List
IEEE 2014 .Net & Java Projects List
 
IEEE Projects 2012
IEEE Projects 2012IEEE Projects 2012
IEEE Projects 2012
 
Pvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titlesPvr technologies 2014 java ieee project titles
Pvr technologies 2014 java ieee project titles
 
IEEE 2014 Dotnet Projects
IEEE 2014 Dotnet ProjectsIEEE 2014 Dotnet Projects
IEEE 2014 Dotnet Projects
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science students
 
IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC
 
2013 2014 ieee project titles
2013 2014 ieee project titles2013 2014 ieee project titles
2013 2014 ieee project titles
 
2013 2014 bulk ieee projects
2013 2014 bulk ieee projects2013 2014 bulk ieee projects
2013 2014 bulk ieee projects
 
IEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titlesIEEE 2012 CSE & IT java_2012-13_titles
IEEE 2012 CSE & IT java_2012-13_titles
 
5. _java_2012-13_titles
5.  _java_2012-13_titles5.  _java_2012-13_titles
5. _java_2012-13_titles
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
 
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTSACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGE COMPUTING ENVIRONMENTS
 
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing EnvironmentsActor Critic Approach based Anomaly Detection for Edge Computing Environments
Actor Critic Approach based Anomaly Detection for Edge Computing Environments
 
JAVA IEEE -2015
JAVA IEEE -2015JAVA IEEE -2015
JAVA IEEE -2015
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
 
2014 list
2014 list2014 list
2014 list
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech
 
2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech2013 14-java-project-titles-me-tech-pantech
2013 14-java-project-titles-me-tech-pantech
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 

Java 2014 15

  • 1. JAVA Contact: +91 9158547792 www.candorminds.com 1 CandorMinds CODE TITLE DESCRIPTION IEEE2014-CLOUDCOMPUTING JCC01 Lifelong Personal Health Data and Application Software via Virtual MachinesintheCloud Softwareengineering,healthcarerecord,virtualmachine. JCC02 Consistency as a Service: Auditing CloudConsistency Networksecurity,auditing,CAAS,heuristicalgorithm. JCC03 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Cloud data base, quality of service, performance evaluation, Security, key accessing. JCC04 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud Datamining,privacypreservation,distributedalgorithm, TDS approach. JCC05 Proactive Workload Management in HybridCloudComputing Multi-cloud, workload management, load balance, performance evaluation. JCC06 Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approach for Cloud Computing Environments Resourceallocation,qualityofservice,IAAS,virtualmachine. JCC07 KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications Data mining, big data, keyword search parallel computing, filtering algorithm. JCC08 Distributed, Concurrent, and Independent Access to Encrypted CloudDatabases Networksecurity,encryptionsecuredatabase,cryptographicschemes. JCC09 A Hybrid Cloud Approach for Secure A u t h o r i z e d D e d u p l i c a t i o n Hybrid cloud, authentication, deduplication private cloud, authorized duplicatecheck.
  • 2. JAVA Contact: +91 9158547792 www.candorminds.com 2 CandorMinds CODE TITLE DESCRIPTION IEEE2014-CLOUDCOMPUTING JCC10 Shared Authority Based Privacy- preserving Authentication Protocol in Cloud Computing Network security, privacy preserving, shared authority, authentication protocol. JCC11 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Privacy preserving, searchable encryption rank search, cryptographic scheme. JCC12 Resource Availability Characteristics and Node Selection in Cooperatively SharedComputingPlatforms Resourceallocation,datamining,faulttolerance,quality control. JCC13 Decentralized Access Control with Anonymous Authentication of Data StoredinClouds Authentication,encryption,attributebased signature,multi-cloud. JCC14 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Security, data mining, networking, software-as-a-service, secure distributeddataprocessing. JCC15 Privacy Preserving Back-Propagation Neural Network Learning Made Practicalwith CloudComputing Neural networking, networking, data mining, security, privacy Preserving, learning,back-propagation. JDM01 Building Confidential and Efficient Query Services in the Cloud with RASP DataPerturbation Cloud, QOS, KNN query, cryptographic schemes. IEEE2014-DATAMINING JDM02 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E- Services Web service, tree matching, fuzzy recommender system. JDM03 Scalable Keyword Search on Large RDF Data Keywordsearch,resourcedescriptionframework.
  • 3. JAVA Contact: +91 9158547792 www.candorminds.com 3 CandorMinds IEEE2014-DATAMINING CODE TITLE DESCRIPTION JDM04 Adaptive Replica Synchronization for Distributed File Systems Adaptive replica synchronization, version-based update, distribution system. JDM05 OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage Tree matching, clustering, data matching. JDM06 Probabilistic Aspect Mining Model for Drug Reviews Data mining, medical centers, association rules, data mining algorithms, healthcare,decision model. JDM07 Efficient Range-Based Storage Management for Scalable Data stores Distributed system, performance evaluation, quality-measurement, Networking. JDM08 PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m- Healthcare Cloud ComputingSystem Cloud, health care, authentication, encryption and privacy storage. JDM09 Automatic Generation of the Domain Module from Electronic Textbooks: Method and Validation Ontology, text mining, software engineering. JDM10 Task Trail: An Effective Segmentation of User Search Behavior Software engineering, task evaluation, file mining, performance evaluation. JDM11 Supporting Privacy Protection in Personalized Web Search Security, privacy protection, search engine. JDM12 An Empirical Performance Evaluation of Relational Keyword Search Techniques Keyword search, relational database, information retrieval, empirical evaluation, performance evaluation.
  • 4. JAVA Contact: +91 9158547792 www.candorminds.com 4 CandorMinds IEEE2014- DATAMINING IEEE2014- NETWORKING IEEE2014-NETWORKSECURITY CODE TITLE DESCRIPTION JDM13 Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data Data mining, artificial intelligence, security, knowledge base management, knowledge representation formalisms and methods JNS01 Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data Security, differential privacy, secure data integration, classification analysis JNS02 Private Searching on Streaming Data BasedonKeywordFrequency Security, private searching on streaming data, fully homomorphic encryption, binary linear code, encryption. JNS03 BuildingaScalableSystemforStealthy P2P-BotnetDetection Networking, botnet, p2p, intrusion detection, network security. JNS04 The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, andEvaluations Networking, distributed interactive application, client assignment, interactivity, consistency, fairness, np-complete JNS05 An Empirical Study of Ontology-Based Multi-Document Summarization in DisasterManagement Data mining, disaster management, multi-document summarization, ontology, query expansion, domain description. JNS06 PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications Networking, traffic padding, web application, side-channel Leak, privacy-preserving. JNS07 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Content-based, publish/subscribe, P2P, broker-less, identity-based encryption JNW01 Evolving Fuzzy Rules for Anomaly Detection in Data Streams . Network security, fuzzy rules, anomaly detection, anomaly detection, auto-regressive model. JNW02 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Network security, access control, attribute-based encryption (ABE), disruption-tolerant network (DTN), multi authority, secure Data retrieval.
  • 5. JAVA Contact: +91 9158547792 www.candorminds.com 5 CandorMinds IEEE2014- SOFTWAREENGINEERING IEEE2014 MOBILECOMPUTINGIEEE2014-NETWORKING CODE TITLE DESCRIPTION JNW03 List Scheduling Algorithm for Heterogeneous Systems by an OptimisticCostTable Application scheduling, dag scheduling, random graphs generator, static scheduling,optimisticcost. JNW04 Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization Mechanism in a Distributed Agent Network Distributed multi-agent system, self-organization, reinforcement learning,andagentnetwork. JNW05 Breaking the Barrier to Transferring Link Information across Networks Network security, Data mining, link prediction, link transfer, cross- network Bias, node attribution, link richness. JNW06 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce P2p;trust;Sybilattack;collusionattack;neighbor similarity,e-commerce. JNW07 Network Aware Scheduling for Virtual Machine Workloads with Interference Models Cloud computing, virtualization, xen, profiling, performance modeling, supportVectormachines, scheduling. JNW08 A Model Approach to the Estimation ofPeer-to-PeerTrafficMatrices Network security, traffic matrix, peer-to-peer (p2p), traffic engineering, costestimation. JSW01 Embedding reflection and learning into agile software Development Agile software development, reflective practice, reflection in action, reflection-on-action,learningorganization,leaningteams JSW02 Online Feature Selection and Its Applications Web services ,feature selection, online learning, large-scale data mining, classification, big data analytics JSW03 Continuous and Transparent User Identity Verification for Secure Internet Services Security,webservers,mobileenvironments,authentication JMC01 Interference and Outage in Mobile Random Networks: Expectation, Distribution,andCorrelation Aloha,CSMA,correlation,parallelprocess
  • 6. JAVA Contact: +91 9158547792 www.candorminds.com 6 CandorMinds IEEE2014- GRIDCOMPUTING IEEE2014 IMAGEPROCESSING IEEE2014 MOBILECOMPUTING CODE TITLE DESCRIPTION JMC02 Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-PeriodMobileUsers Multicast,security,groupkeymanagement,faulttolerance JMC03 Achieving Maximum Throughput in Random Access Protocols with Multi packetReception Multipacketreception,slotted-aloha,CSMA,MACprotocol JMC04 QOF: Towards Comprehensive Path Quality measurement in Wireless Sensor Networks Networking, path quality, node quality, quality of forwarding, quality Measurement, JMC05 Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks Security, security in wireless sensor networks (WSN), byzantine attacks, distributeddetection,mobileaccess. JIM01 Fuzzy Clustering With a Modified MRF Energy Function for Change Detection inSyntheticApertureRadarImages Fuzzy clustering, image change detection, Markov random field (MRF), syntheticapertureradar(SAR). JIM02 MeasuresofEffectiveVideo Tracking Multi-target video tracking, evaluation measure, accuracy, cardinality error,idchanges. JIM03 Image Quality Assessment for Fake Biometric Detection: Application to IRIS, Fingerprint, and Face Recognition Image quality assessment, biometrics, security, attacks, counter measures. JIM04 Object-Oriented Shadow Detection and Removal From Urban High- Resolution Remote Sensing Images Changedetection,inner–outeroutlineprofileline (ioopl), object-oriented, relative radiometric correction, shadow Detection,shadowremoval. JGC01 Containing Byzantine Failures with ControlZones Byzantine failures, Multihop networks, asynchronous networks, reliable broadcast, fault tolerance, distributed computing, protocol, random failures. JGC02 Rate less Codes and Random Walks forP2PResourceDiscoveryinGrids Networking resource discovery, peer to peer, rateless codes, random walks
  • 7. JAVA Contact: +91 9158547792 www.candorminds.com 7 CandorMinds IEEE2014- MULTIMEDIAIEEE2014-J2EE CODE TITLE DESCRIPTION JMM01 Uniform Embedding for Efficient JPEG Steganography JPEG steganography, minimal - distortion embedding, uniform embedding,qualityanalyzer JMM02 Performance Analysis of Media Cloud-Based Multimedia Systems With Retrying Fault-Tolerance Technique Cloud ,performance evaluation, fault-tolerance technique, interactive videoRetrieval JMM03 Composing Kerberos and Multimedia Internet Keying (MIKEY) for Authenticated Transport of Group Keys Cryptographic protocols, authentication, multicast communication, cryptographicprotocols,groupkeysmanagement,encryption J2EE01 Building Confidential and Efficient Query Services in the Cloud with RASP DataPerturbation Cloud,QOS,KNNquery,cryptographicschemes. J2EE02 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E- Services Webservice,treematching,fuzzyrecommender system. J2EE03 Scalable Keyword Search on Large RDF Data Keyword search, resource description framework. J2EE04 Adaptive Replica Synchronization for DistributedFileSystems Adaptive replica synchronization, version-based update, distribution system. J2EE05 OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage Treematching,clustering,datamatching. J2EE06 Probabilistic Aspect Mining Model for DrugReviews Data mining, medical centers, association rules, data mining algorithms, healthcare, decision model. J2EE07 Efficient Range-Based Storage ManagementforScalableDatastores Distributed system, performance evaluation, quality-measurement, Networking. Ourtechnique maximizes mixed workload performance while providing servicedifferentiation basedonhigh-levelperformancegoals.
  • 8. JAVA Contact: +91 9158547792 www.candorminds.com 8 CandorMinds CODE TITLE DESCRIPTION IEEE2014-J2EE J2EE08 PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m- Healthcare Cloud ComputingSystem Cloud,healthcare,authentication,encryptionandprivacystorage. J2EE09 Automatic Generation of the Domain Module from Electronic Textbooks: MethodandValidation Ontology, text mining, software engineering. J2EE10 Task Trail: An Effective Segmentation ofUserSearchBehavior Software engineering, task evaluation, file mining, performance evaluation. J2EE11 Supporting Privacy Protection in PersonalizedWebSearch Security,privacyprotection,searchengine. J2EE12 An Empirical Performance Evaluation of Relational Keyword Search Techniques Keyword search, relational database, information retrieval, empirical evaluation,performanceevaluation, J2EE13 Discovering the Top-k Unexplained Sequences in Time-Stamped ObservationData Data mining, artificial intelligence, security, knowledge base management,knowledgerepresentation formalismsand methods.