Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...Brainrich Technology
Project Guidance by Experienced Developers.
Provides real time training on information technology and provide projects on the following
• M.E
• M.Tech
. M.Phil
• BE/BTech (CSE & IT)
• B.Sc/ M.Sc (CSE)
• MSc (IT)
• BCA
• MCA
• Diploma Student’s.
Very Low cost….
LATEST TECHNOLOGIES USED IN OUR IEEE PROJECTS
We would be really glad to help you with your project development.
Our Service Address:
Contact : Mr.S. Sakthivel
Mobile : 9894604623
: 9965191941
Phone : 0422-4377414
Address : 6/1,Selvanayaki Complex 1st Floor, Gokhale Street, Ramnagar, Coimbatore
website : http://www.brainrichtech.com
: http://www.brainrichprojects.com
Mail : info@brainrichtech.com
: brainrichtech@gmail.com
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Best IEEE Projects 2017 -2018 Titles - IEEE Final Year Projects @ Brainrich T...Brainrich Technology
Project Guidance by Experienced Developers.
Provides real time training on information technology and provide projects on the following
• M.E
• M.Tech
. M.Phil
• BE/BTech (CSE & IT)
• B.Sc/ M.Sc (CSE)
• MSc (IT)
• BCA
• MCA
• Diploma Student’s.
Very Low cost….
LATEST TECHNOLOGIES USED IN OUR IEEE PROJECTS
We would be really glad to help you with your project development.
Our Service Address:
Contact : Mr.S. Sakthivel
Mobile : 9894604623
: 9965191941
Phone : 0422-4377414
Address : 6/1,Selvanayaki Complex 1st Floor, Gokhale Street, Ramnagar, Coimbatore
website : http://www.brainrichtech.com
: http://www.brainrichprojects.com
Mail : info@brainrichtech.com
: brainrichtech@gmail.com
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Embedpark Projects : BE, MTech, DIPLOMA Projects for Final Year IEEE Projects
Dear IT Aspirants ,
Greetings from Embedpark , Bangalore!!!
Embedpark Innovations pvt ltd, Bangalore offers Total Developement solutions and Embedpark Innovations projects for freshers, working professionals and corporate in the below mentioned technologies:-
Final Year Projects Include:
1. Embedded Systems(Embedded / ARM / PIC/ MC/ MP)
2. Robotics
3. Linux Based Projects
4. Developement on FPGA / VLSI
5. Android
6. Mobile Applications
7. Website Developement
8. Database Design and Applicatios
9. MS ASP.Net, C# .Net, VB.Net, VC++ .net
10.JAVA / Advance - Java Projct
11.Big Data Hadoop
12.PHP
Embedpark Innovations pvt ltd, Bangalore has a dedicated total Developement & solutions in the Industry.
For further IEEE Projects details about Embedded System , VLSI, Android, Dot net, JAVA for IEEE 2013-14 Projects,
Feel free to contact the concerned person mentioned below:
Contact:Name: Kumar Amar
Address: Embedpark Innovations Pvt.Ltd, #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block Bangalore, India-560011
Contact: 9886733705 / 9886289694
Building confidential and efficient query services in the cloud with rasp dat...eSAT Journals
Abstract With the advent of Cloud computing technology, the cost of computation, application hosting, content storage and delivery is reduced significantly. So now-a-days at an increased speed cloud computing infrastructures are used by the people. Security and Privacy is the biggest concern about cloud computing, since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to such providers until and unless data confidentiality and secure query processing is guaranteed by the cloud service provider. To fully realize the benefits of cloud computing the workload must be reduced and efficient query processing must be provided. Therefore, to provide confidential and efficient query service RASP method is proposed, where RASP denotes Random Space Perturbation. Data Perturbation technique allows users to ascertain key summary information about the data that is not distorted and does not lead to a security breach. Exclusive security features are provided by the RASP. The RASP approach satisfies the data Confidentiality, query Privacy, Efficient query processing and Low working cost (CPEL) criteria for hosting queries in the cloud. KNN-R algorithm is used here to process the Range query to the kNN query. Users have been authorized by using the randomly generated product key value provided by the admin after successful registration by the user thus maintaining confidentiality. User queries are retrieved within a very short period of time i.e., less than a second. Outsourcing the management of the data related to organizations and individuals to a service provider are enabled by cloud computing services in order to save on the hardware costs and reducing maintenance cost. Also analyzed how the RASP method will provide confidentiality of data and will increase the working process of query. Key Words: query services in the cloud, low in-house processing, RASP perturbation, Range query, KNN query.
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
SPECTRUM SOLUTIONS is a Pondicherry based R&D firm which always looks forward in the field of science and technology to provide best technical support for the final year students. SPECTRUM has a great team of technical experts for the design development of Electronic and software Systems using Embedded, MATLAB, Java, Dot Net Technology.
SPECTRUM SOLUTIONS always concentrate us to provide quality products for various institutions and students. We offer the projects in all domains for the students of Diploma, B.Tech/B.E,M.Tech/M.E,MS,BCA,MCA etc. Our major concern is in the field of technical education to bridge the gap between Industry and Academics. We are always in the good eyes of the Educational Institutions in India to provide training & projects in Embedded Systems MATLAB and software technologies. We also provide interview training for free of cost. We never stop in going that extra mile ahead in providing greater value to own ideas of students, may it be in terms of providing adequate workforce proficient in highly application cost oriented Embedded Systems or Software Systems.
WEBSITE : www.spectrumpondicherry.blogspot.in/
FACEBOOK : https://www.facebook.com/pages/Spectrum-Solutions/548721691855495?ref=hl
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing.
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
contact number :: 9535866270
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechTmks Infotech
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Final Year 2014 and 2015 IEEE projects Tmks Infotech
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Embedpark Projects : BE, MTech, DIPLOMA Projects for Final Year IEEE Projects
Dear IT Aspirants ,
Greetings from Embedpark , Bangalore!!!
Embedpark Innovations pvt ltd, Bangalore offers Total Developement solutions and Embedpark Innovations projects for freshers, working professionals and corporate in the below mentioned technologies:-
Final Year Projects Include:
1. Embedded Systems(Embedded / ARM / PIC/ MC/ MP)
2. Robotics
3. Linux Based Projects
4. Developement on FPGA / VLSI
5. Android
6. Mobile Applications
7. Website Developement
8. Database Design and Applicatios
9. MS ASP.Net, C# .Net, VB.Net, VC++ .net
10.JAVA / Advance - Java Projct
11.Big Data Hadoop
12.PHP
Embedpark Innovations pvt ltd, Bangalore has a dedicated total Developement & solutions in the Industry.
For further IEEE Projects details about Embedded System , VLSI, Android, Dot net, JAVA for IEEE 2013-14 Projects,
Feel free to contact the concerned person mentioned below:
Contact:Name: Kumar Amar
Address: Embedpark Innovations Pvt.Ltd, #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block Bangalore, India-560011
Contact: 9886733705 / 9886289694
Building confidential and efficient query services in the cloud with rasp dat...eSAT Journals
Abstract With the advent of Cloud computing technology, the cost of computation, application hosting, content storage and delivery is reduced significantly. So now-a-days at an increased speed cloud computing infrastructures are used by the people. Security and Privacy is the biggest concern about cloud computing, since data management and infrastructure management in cloud is provided by third-party, it is always a risk to handover the sensitive information to such providers until and unless data confidentiality and secure query processing is guaranteed by the cloud service provider. To fully realize the benefits of cloud computing the workload must be reduced and efficient query processing must be provided. Therefore, to provide confidential and efficient query service RASP method is proposed, where RASP denotes Random Space Perturbation. Data Perturbation technique allows users to ascertain key summary information about the data that is not distorted and does not lead to a security breach. Exclusive security features are provided by the RASP. The RASP approach satisfies the data Confidentiality, query Privacy, Efficient query processing and Low working cost (CPEL) criteria for hosting queries in the cloud. KNN-R algorithm is used here to process the Range query to the kNN query. Users have been authorized by using the randomly generated product key value provided by the admin after successful registration by the user thus maintaining confidentiality. User queries are retrieved within a very short period of time i.e., less than a second. Outsourcing the management of the data related to organizations and individuals to a service provider are enabled by cloud computing services in order to save on the hardware costs and reducing maintenance cost. Also analyzed how the RASP method will provide confidentiality of data and will increase the working process of query. Key Words: query services in the cloud, low in-house processing, RASP perturbation, Range query, KNN query.
BEST FINAL YEAR PROJECT IEEE 2015 BY SPECTRUM SOLUTIONS PONDICHERRYRaushan Kumar Singh
SPECTRUM SOLUTIONS is a Pondicherry based R&D firm which always looks forward in the field of science and technology to provide best technical support for the final year students. SPECTRUM has a great team of technical experts for the design development of Electronic and software Systems using Embedded, MATLAB, Java, Dot Net Technology.
SPECTRUM SOLUTIONS always concentrate us to provide quality products for various institutions and students. We offer the projects in all domains for the students of Diploma, B.Tech/B.E,M.Tech/M.E,MS,BCA,MCA etc. Our major concern is in the field of technical education to bridge the gap between Industry and Academics. We are always in the good eyes of the Educational Institutions in India to provide training & projects in Embedded Systems MATLAB and software technologies. We also provide interview training for free of cost. We never stop in going that extra mile ahead in providing greater value to own ideas of students, may it be in terms of providing adequate workforce proficient in highly application cost oriented Embedded Systems or Software Systems.
WEBSITE : www.spectrumpondicherry.blogspot.in/
FACEBOOK : https://www.facebook.com/pages/Spectrum-Solutions/548721691855495?ref=hl
Integrity Privacy to Public Auditing for Shared Data in Cloud ComputingIJERA Editor
In cloud computing, many mechanisms have been proposed to allow not only a data owner itself but also a public verifier to efficiently perform integrity checking without downloading the entire data from the cloud, which is referred to as public auditing . In these mechanisms, data is divided into many small blocks, where each block is independently signed by the owner; and a random combination of all the blocks instead of the whole data is retrieved during integrity checking .However, public auditing for such shared data— while preserving identity privacy — remains to be an open challenge. Here, we only consider how to audit the integrity of shared data in the cloud with static groups. It means the group is pre-defined before shared data is created in the cloud and the membership of users in the group is not changed during data sharing. The original user is responsible for deciding who is able to share her data before outsourcing data to the cloud. Another interesting problem is how to audit the integrity of shared data in the cloud with dynamic groups — a new user can be added into the group and an existing group member can be revoked during data sharing.
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
contact number :: 9535866270
Bulk 2014 and 2015 ieee Projects @ TMKS InfotechTmks Infotech
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Final Year 2014 and 2015 IEEE projects Tmks Infotech
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Contact Address
#1510,Sri Gowri Shankara Complex,
2nd Floor,MKK Road,
Near Harishchandra Ghat,
Mariyappanapalya,
Rajajinagar 2nd Stage,
Bangalore - 560021.
Land Mark
Near Harishchandra Ghat,
Navrang Theatre to Malleshwaram - Mid Metro Pillar No - 203,204.
Contact Number :: 9535866270
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
1. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
1 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Java 2014 IEEE Titles
S No Title Name Year
CLOUD COMPUTING
1
Oruta: Privacy-Preserving Public Auditing for Shared Data in the
Cloud
2014
2
Decentralized Access Control with Anonymous Authentication of
Data Stored in Clouds - Parallel Distributed Systems
2014
3
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud
Storage - Parallel Distributed Systems
2014
4
On the Knowledge Soundness of a Cooperative Provable Data
Possession Scheme in Multi cloud Storage - Parallel Distributed
Systems
2014
5
Privacy Preserving Back-Propagation Neural Network Learning
Made Practical with Cloud Computing
2014
6 A Hybrid Cloud Approach for Secure Authorized Deduplication 2014
7
Automatic Scaling of Internet Applications for Cloud Computing
Services
2014
8
CCIoT-CMfg Cloud Computing and Internet of Things-Based Cloud
Manufacturing Service System
2014
9
Cloud Service Negotiation in Internet of Things Environment A
Mixed Approach
2014
2. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
2 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
10 CLOUDQUAL A Quality Model for Cloud Services 2014
11 Developing Vehicular Data Cloud Services in the IoT Environment 2014
12
Enabling Smart Cloud Services Through Remote Sensing An
Internet of Everything Enabler
2014
13
Toward Transcoding as a Service in a Multimedia Cloud Energy-
Efficient Job-Dispatching Algorithm
2014
14 Integrity for Join Queries in the Cloud 2014
15 Dynamic Heterogeneity-Aware Resource Provisioning in the 2014
16 Building Confidential and Efficient Query Services in the Cloud
with RASP Data Perturbation
2014
17 Scalable Analytics for IaaS Cloud Availability 2014
18
Transformation-Based Monetary Cost Optimizations for
Workflows in the Cloud
2014
19 Data Similarity-Aware Computation Infrastructure for the Cloud 2014
20 Towards Differential Query Services in Cost Efficient Clouds 2014
21 Scalable Distributed Service Integrity Attestation for Software-as-
a-Service Clouds
2014
22 Dynamic Cloud Pricing for Revenue Maximization 2014
23 Hybrid Attribute- and Re-Encryption-Based Key Management for
Secure and Scalable Mobile Applications in Clouds
2014
24
Privacy Preserving Multi keyword Ranked Search over Encrypted
Cloud Data
2014
3. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
3 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
25 Probabilistic Consolidation of Virtual Machines in Self-Organizing
Cloud Data Centers
2014
26 Enabling Data Integrity Protection in Regenerating-Coding-Based
Cloud Storage: Theory and Implementation
2014
27 An Efficient and Trustworthy Resource Sharing Platform for
Collaborative Cloud Computing
2014
28 Identity Based Distributed Provable Data Possession in Multi-
Cloud Storage
2014
29
A Scalable Two-Phase Top-Down Specialization Approach for Data
Anonymization Using MapReduce on Cloud
2014
30
A Stochastic Model to Investigate Data Center Performance and
QoS in IaaS Cloud Computing Systems
2014
31
Distributed, Concurrent, and Independent Access to Encrypted
Cloud Databases
2014
32
Expressive, Efficient, and Revocable Data Access Control for
Multi-Authority Cloud Storage
2014
33
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction
System
2014
34
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted
Cloud Data
2014
35 Towards Differential Query Services in Cost-Efficient Clouds 2014
36 Decreasing Impact of SLA Violations: A Proactive Resource
Allocation Approach for Cloud Computing Environments
2014
2014
4. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
4 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
DATA MINING
1 Supporting Privacy Protection in Personalized Web Search 2014
2 Fast Nearest Neighbor Search with Keywords 2014
3
Approximate Shortest Distance Computing: A Query-Dependent
Local Landmark Scheme
2014
4
LARS: An Efficient and Scalable Location-Aware Recommender
System
2014
5 Dynamic Query Forms for Database Queries 2014
6 Privacy Preserving Delegated Access Control in Public Clouds 2014
7 m-Privacy for Collaborative Data Publishing 2014
8 Scalable Keyword Search on Large RDF Data 2014
9 Secure Outsourced Attribute-Based Signatures 2014
10 Dealing With Concept Drifts in Process Mining 2014
11
Building Confidential and Efficient Query Services in the Cloud
with RASP Data Perturbation
2014
12
A K-Main Routes Approach to Spatial Network Activity
Summarization
2014
13 A Probabilistic Approach to String Transformation 2014
14
A System for Automatic Notification and Severity Estimation of
Automotive Accidents
2014
5. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
5 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
15
Commuter Route Optimized Energy Management of Hybrid
Electric Vehicles
2014
16
Effective and Efficient Clustering Methods for Correlated
Probabilistic Graphs
2014
17
Mining Probabilistically Frequent Sequential Patterns in Large
Uncertain Databases
2014
18
Mining Statistically Significant Co-location and Segregation
Patterns
2014
19
Random Projection Random Discretization Ensembles—
Ensembles of Linear Multivariate Decision Trees
2014
20
Secure Mining of Association Rules in Horizontally Distributed
Databases
2014
21
Using Incomplete Information for Complete Weight Annotation of
Road Networks
2014
22 Web-Based Traffic Sentiment Analysis Methods and Applications 2014
23
CoRE: A Context-Aware Relation Extraction Method for Relation
Completion
2014
24
Best Peer++: A Peer-to-Peer Based Large-Scale Data Processing
Platform
2014
25 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
26 A Generic Framework for Top-${schmi k}$ Pairs and Top- ${schmi
k}$ Objects
2014
6. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
6 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Queries over Sliding Windows
27 Incremental Detection of Inconsistencies in Distributed Data 2014
28
LARS*: An Efficient and Scalable Location-Aware Recommender
System
2014
29 Mapping XML to a Wide Sparse Table 2014
30
Efficient Ranking on Entity Graphs with Personalized
Relationships
2014
31 Towards Multi-Tenant Performance SLOs 2014
32
Authenticating Location-Based Skyline Queries in Arbitrary
Subspaces
2014
33 Authentication of k Nearest Neighbor Query on Road Networks 2014
34 Efficient Prediction of Difficult Keyword Queries over Databases 2014
35 Privacy-Preserving Authenticated Key-Exchange Over Internet. 2014
36
Responsibility Analysis for Lineages of Conjunctive Queries with
Inequalities
2014
37
Trinity: On Using Trinary Trees for Unsupervised Web Data
Extraction
2014
38 Data mining with big data 2014
39
An Empirical Performance Evaluation of Relational Keyword
Search Systems
2014
7. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
7 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
40
A Two-Level Topic Model Towards Knowledge Discovery from
Citation Networks
2014
41
A Methodology for Direct and Indirect Discrimination Prevention
in Data Mining
2014
42 Shortest Path Computing in Relational DBMSs 2014
43 Active Learning of Constraints for Semi-Supervised Clustering 2014
44
Toward integrating feature selection algorithms for classification
and clustering
2014
45 A Fast Clustering-Based Feature Subset Selection Algorithm for
High-Dimensional Data
2014
46
MultiComm: Finding Community Structure in Multi-Dimensional
Networks
2014
47 Searching Dimension Incomplete Databases 2014
48
Secure Mining of Association Rules in Horizontally Distributed
Databases
2014
49 CLARANS: a method for clustering objects for spatial data mining 2014
50
Facilitating Effective User Navigation through Website Structure
Improvement
2014
51 Ontology Matching: State of the Art and Future Challenges 2014
52 A Graph Derivation Based Approach for Measuring and
Comparing Structural Semantics of Ontologies
2014
53 A Myopic Approach to Ordering Nodes for Parameter Elicitation in
Bayesian Belief Networks
2014
8. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
8 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
2014
54 A Cocktail Approach for Travel Package Recommendation 2014
55
Accuracy-Constrained Privacy-Preserving Access Control
Mechanism for Relational Data
2014
56
Facilitating Document Annotation Using Content and Querying
Value
2014
57
Discovering Emerging Topics in Social Streams via Link-Anomaly
Detection
2014
58 Keyword Query Routing 2014
59
Privacy-Preserving and Content-Protecting Location Based
Queries
2014
60 Security Evaluation of Pattern Classifiers under Attack 2014
61 Towards Online Shortest Path Computation 2014
62
OCCT: A One-Class Clustering Tree for Implementing
One-to-Many Data Linkage
2014
63
TrustedDB: A Trusted Hardware based Database with Privacy and
Data Confidentiality
2014
SECURE COMPUTING 2014
1
Hiding in the Mobile Crowd: Location Privacy through
Collaboration
2014
2
MOSES: Supporting and Enforcing Security Profiles on
Smartphones
2014
9. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
9 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
3 Mobiflage: Deniable Storage Encryption for Mobile Devices 2014
4 Generating Summary Risk Scores for Mobile Applications 2014
5 Effective Risk Communication for Android Apps 2014
6
Hiding in the Mobile Crowd: Location Privacy through
Collaboration
2014
7
A Denial of Service Attack to UMTS Networks Using SIM-Less
Devices
2014
8 Supporting Privacy Protection in Personalized Web Search 2014
9
A Large-Scale Study of the Time Required to Compromise a
Computer System
2014
10 Fault-Tolerant Network Interfaces for Networks-on-Chip 2014
11 k-Zero Day Safety: A Network Security Metric for Measuring the
Risk of Unknown Vulnerabilities
2014
12
Robustness Analysis of Embedded Control Systems with Respect
to Signal Perturbations: Finding Minimal Counterexamples Using
Fault Injection
2014
13
Secure Two-Party Differentially Private Data Release for Vertically
Partitioned Data
2014
14
Security Games for Node Localization through Verifiable
Multilateration
2014
15 Authorization Control for a Semantic Data Repository through an
Inference Policy Engine
2014
2014
10. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
10 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
16
Discovery and Resolution of Anomalies in Web Access Control
Policies
2014
17
Formal Analysis of Secure Neighbor Discovery in Wireless
Networks
2014
18
Captcha as Graphical Passwords—A New Security Primitive Based
on Hard AI Problems
2014
19 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing 2014
20
PROFILR: Toward Preserving Privacy and Functionality in
Geosocial Networks
2014
21
Top-k Query Result Completeness Verification in Tiered Sensor
Networks
2014
22 Ensuring the Performance of Apache HTTP Server Affected by
Aging
2014
23 Human Effects of Enhanced Privacy Management Models
2014
24 Analysis of Field Data on Web Security Vulnerabilities Private
Searching on Streaming Data Based on Keyword Frequency
2014
NETWORKING 2014
1
Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
2014
2 Congestion Aware Routing in Nonlinear Elastic Optical Networks 2014
3
A Geometric Deployment and Routing Scheme for Directional
Wireless Mesh Networks
2014
4 An Economic Framework for Routing and Channel Allocation in 2014
11. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
11 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Cognitive Wireless Mesh Networks
5
Degraded Service Provisioning in Mixed-Line-Rate WDM
Backbone Networks Using Multipath Routing
2014
6
On the Network Sharing of Mixed Network Coding and Routing
Data Flows in Congestion Networks
2014
7
QoS Aware Geographic Opportunistic Routing in Wireless Sensor
Networks
2014
8
Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile
Sensor Networks
2014
9
Scalable Dynamic Routing Protocol for Cognitive Radio Sensor
Networks
2014
10 Modeling the Propagation of Worms in Networks A Survey 2014
11
Toward Unified Security and Privacy Protection for Smart Meter
Networks
2014
12
Security Analysis of Handover Key Management in 4G LTESAE
Networks
2014
13 Leveraging Social Networks for P2P Content-Based File Sharing in
Disconnected MANETs
2014
14
A Cross-Layer Backpressure Architecture for Wireless Multihop
Networks
2014
15
Streaming Solutions for Fine-Grained Network Traffic
Measurements and Analysis
2014
12. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
12 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
16 Energy Efficient Reliable Routing Considering Residual Energy in
Wireless Ad Hoc Networks
2014
17
An Error Minimizing Framework for Localizing Jammers in
Wireless Networks
2014
18
Compact DFA: Scalable Pattern Matching Using Longest Prefix
Match Solutions
2014
19 A Comparative Analysis of the Effects of Dynamic Optical Circuit
Provisioning on IP Routing
2014
20 Optimal Multicast Capacity and Delay Tradeoffs in MANETs
2014
21 Dynamic Trust Management for Delay Tolerant Networks and Its
Application to Secure Routing
2014
22 Impact of UPFC on Power Swing Characteristic and Distance Relay
Behavior
2014
23 Hop-by-Hop Message Authentication and Source Privacy in
Wireless Sensor Networks
2014
24
Secure and Efficient Data Transmission for Cluster-based Wireless
Sensor Networks
2014
25 Cost-Effective Resource Allocation of Overlay Routing Relay
Nodes
2014
26 An Adaptive Video Streaming Control System: Modeling,
Validation, and Performance Evaluation
2014
27 Data Retrieval Scheduling for Multi-Item Requests in Multi-
Channel Wireless Broadcast Environments
2014
28 Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
2014
29 Optimization Decomposition for Scheduling and System
Configuration in Wireless Networks
2014
30
Fair Scheduling in Cellular Systems in the Presence of Non-
cooperative Mobiles
2014
31 Secure and Efficient Data Transmission for Cluster-based Wireless 2014
13. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
13 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Sensor Networks
32
Iterative Localization of Wireless Sensor Networks: An Accurate
and Robust
Approach
2014
33 Secure Continuous Aggregation in Wireless Sensor Networks 2014
34 Incentive Mechanisms for Internet Congestion Management:
Fixed-Budget Rebate Versus Time-of-Day Pricing
2014
35
Snapshot and Continuous Data Collection in Probabilistic Wireless
Sensor Networks
2014
36 Mobile Data Offloading: How Much Can WiFi Deliver 2014
37
A comparison of mechanisms for improving TCP performance
over wireless links
2014
38 Adaptive Transmission for Delay-Constrained Wireless Video 2014
39 Network Resource Allocation for Users With Multiple
Connections: Fairness and Stability
2014
40 Medium access control with coordinated adaptive sleeping for
wireless sensor networks
2014
41 Optimally Adaptive Power-Saving Protocols for Ad Hoc Networks
Using the Hyper Quorum System
2014
42
An Adaptive Video Streaming Control System: Modeling,
Validation, and
Performance Evaluation
2014
43
Optimization Decomposition for Scheduling and System
Configuration in Wireless Networks
2014
44 A Probabilistic Misbehavior Detection Scheme toward Efficient
Trust Establishment in Delay-Tolerant Networks
2014
14. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
14 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
45 Automatic Test Packet Generation 2014
46
Cost-Effective Resource Allocation of Overlay Routing Relay
Nodes
2014
47 Boundary Cutting for Packet Classification 2014
48
Secure Data Retrieval for Decentralized Disruption-Tolerant
Military Networks
2014
49
LBDP: Localized Boundary Detection and
Parameterization for 3-D Sensor Networks
2014
50
Improving Fairness, Efficiency, and Stability in HTTP-
Based Adaptive Video Streaming With Festive
2014
51 A Study on the Performance of a Three-Stage LoadBalancing
Switch
2014
52
Stochastic Bandwidth Estimation in Networks With
Random Service
2014
53 Cost-Effective Resource Allocation of Overlay Routing
Relay Nodes
2014
54
Optimization Decomposition for Scheduling and System
Configuration in Wireless Networks
2014
MOBILE COMPUTING 2014
1 Energy-Efficient Reliable Routing Considering Residual Energy in
Wireless Ad Hoc Networks
2014
2 Video Dissemination over Hybrid Cellular and Ad Hoc Networks 2014
3 Energy-optimum Throughput and Carrier Sensing Rate in CSMA-
based Wireless Networks
2014
4 Cooperative Caching for Efficient Data Access in Disruption 2014
15. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
15 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Tolerant Networks
5
Privacy-Preserving and Truthful Detection of Packet Dropping
Attacks in Wireless Ad Hoc Networks
2014
6
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless
Networks
2014
7
A Study on False Channel Condition Reporting Attacks in Wireless
Networks
2014
8 A Fade Level-Based Spatial Model for Radio Tomographic Imaging 2014
9 Adaptive Context Dissemination in Heterogeneous Environments 2014
10
(E^{2}D) Wi-Fi: A Mechanism to Achieve Energy Efficient
Discovery in Wi-Fi
2014
11 Energy-Optimum Throughput and Carrier Sensing Rate in CSMA-
Based Wireless Networks
2014
12 Fault Tolerant Localization and Tracking of Multiple Sources in
WSNs Using Binary Data
2014
13 How Long to Wait? Predicting Bus Arrival Time With Mobile
Phone Based Participatory Sensing
2014
14 Intelligent Channel Bonding in 802.11n WLANs 2014
15
Maximum Stable Throughput of Network-Coded Multiple
Broadcast Sessions for Wireless Tandem Random Access
Networks
2014
16
Mobility and Intruder Prior Information Improving the Barrier
Coverage of SSN
2014
17 NETWRAP: An NDN Based Real-Time Wireless Recharging
Framework for Wireless Sensor Networks
2014
16. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
16 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
18
On Queue Length and Link Buffer Size Estimation in 3G/4G Mobile
Data Networks
2014
19
SEAMLOC: Seamless Indoor Localization Based on Reduced
Number of C_ Points
2014
20
The K-hop Cooperative Video Streaming Protocol Using
H.264/SVC Over the HVNs
2014
21 Token-MAC: A Fair MAC Protocol for Passive RFID Systems 2014
22
Uplink Soft Frequency Reuse for Self-Coexistence of Cognitive
Radio Networks
2014
23 WizSync: Exploiting Wi-Fi Infrastructure for Clock Synchronization
in Wireless Sensor Networks
2014
24 Efficient Authentication for Mobile and Pervasive Computing 2014
25 An Incentive Framework for Cellular Traffic Offloading 2014
26
Friendbook: A Semantic-based Friend Recommendation System
for Social Networks
2014
27
Optimal Distributed Malware Defense in Mobile Networks with
Heterogeneous Devices
2014
28
Large-Scale Synthetic Social Mobile Networks with SWIM 2014
29 Real-Time Misbehavior Detection in IEEE 802.11-Based Wireless
Networks: An Analytical Approach
2014
30 Enabling Spectrum Sharing in Secondary Market Auction
2014
31 Preserving Location Privacy in Geo social Applications
2014
32 Investigating the Privacy versus Forwarding Accuracy Tradeoff in
Opportunistic Interest-Casting
2014
17. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
17 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
33 Design and Implementation of Efficient Integrity Protection for
Open Mobile Platforms
2014
34 Energy-Efficient Relaying via Store-Carry and Forward
within the Cell
2014
35 TagSense: Leveraging Smartphones for Automatic Image Tagging
2014
36 Energy-Aware Resource Allocation Strategies for LTE Uplink with
Synchronous HARQ Constraints
2014
37 Cooperative Caching for Efficient Data Access in Disruption
Tolerant Networks
2014
PARALLEL AND DISTRIBUTED SYSTEM 2014
1
Securing Broker-Less Publish/Subscribe Systems Using Identity-
Based Encryption
2014
2
Traffic pattern-based content leakage detection for trusted
content delivery networks
2014
3
A System for Denial-of-Service Attack Detection Based on
Multivariate Correlation Analysis
2014
4 Behavioral Malware Detection in Delay Tolerant Networks 2014
5
A Model Approach to the Estimation of Peer-to-Peer Traffic
Matrices
2014
6
A Scalable and Mobility-Resilient Data Search System for Large-
Scale Mobile Wireless Networks
2014
7
A Scalable and Modular Architecture for High-Performance Packet
Classification
2014
8
CPU Scheduling for Power Energy Management on Multicore
Processors Using Cache Miss and Context Switch Data
2014
9
Dynamic Trust Management for Delay Tolerant Networks and Its
Application to Secure Routing
2014
10 Hop-by-Hop Message Authenticationand Source Privacy in 2014
18. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
18 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
WirelessSensor Networks
11
Improvement of Real-Time Multi-CoreSchedulability with Forced
Non-Preemption
2014
12
Improving the Performance of IndependentTask Assignment
Heuristics MinMin,MaxMin and Sufferage
2014
13
Localized Movement-Assisted SensorDeployment Algorithm for
HoleDetection and Healing
2014
14
Reservation-Based Packet Bufferswith Deterministic Packet
Departures
2014
15 Signature Searching in a Networked Collection of Files 2014
16
An Online Integrated Resource Allocator for Guaranteed
Performance in Data Centers
2014
17
Efficient Data Collection for Large-Scale Mobile Monitoring
Applications
2014
18
Efficient Response Time Approximations for Multiclass Fork and
Join Queues in Open and Closed Queuing Networks
2014
19
Harmonic-Aware Multi-Core Scheduling for Fixed-Priority Real-
Time Systems
2014
20
Hyperbolic Utilization Bounds for Rate Monotonic Scheduling on
Homogeneous Multiprocessors
2014
21
Max-Min Lifetime Optimization for Cooperative Communications
in Multi-Channel Wireless Networks
2014
22
Multi-Core Embedded Wireless Sensor Networks Architecture and
Applications
2014
23
On Social Delay-Tolerant Networking Aggregation, Tie Detection,
and Routing
2014
19. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
19 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
24
Secure Deduplication with Efficient and Reliable Convergent Key
Management
2014
25 Towards Differential Query Services in Cost-Efficient Clouds 2014
26
Cross-Layer Approach for Minimizing Routing Disruption in IP
Networks
2014
27 Multicast Capacity in MANET with Infrastructure Support 2014
28
Order-Optimal Information Dissemination in MANETs via
Network Coding
2014
29 Bumping: A Bump-Aided Inertial Navigation Method for Indoor
Vehicles Using Smart phones
2014
30 Constructing Load-Balanced Data Aggregation Trees in
Probabilistic Wireless Sensor Networks
2014
31
Contiguous Link Scheduling for Data Aggregation in Wireless
Sensor Networks
2014
32 Distributed Placement of Autonomic Internet Services 2014
33 Distributed Throughput Maximization in Wireless Networks Using
the Stability Region
2014
34 Dynamic Aggregate: An Elastic Framework for QoS-Aware
Distributed Processing of RFID Data on Enterprise Hierarchy
2014
35 Expressive, Efficient, and Revocable Data Access Control for
Multi-Authority Cloud Storage
2014
36
From Shortest-Path to All-Path: The Routing Continuum Theory
and Its Applications
2014
37
Function Computation over Heterogeneous Wireless Sensor
Networks
2014
38 Further Observations on Smart-Card-Based Password-
Authenticated Key Agreement in Distributed Systems
2014
39
Meeting Deadlines of Scientific Workflows in Public Clouds with
Tasks Replication
2014
20. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
20 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
40
Memory-Aware Task Scheduling with Communication Overhead
Minimization for Streaming Applications on Bus-Based
Multiprocessor System-on-Chips
2014
41 Omni directional Coverage for Device-Free Passive Human
Detection
2014
42 On the Speedup of Recovery in Large-Scale Erasure-Coded Storage
Systems
2014
43
Order-Optimal Information Dissemination in MANETs via
Network Coding
2014
44 Peer-Assisted VoD Systems: An Efficient Modeling Framework 2014
45
QoS Aware Geographic Opportunistic Routing in Wireless Sensor
Networks
2014
46
Robust Trajectory Estimation for Crowd sourcing-Based Mobile
Applications
2014
47 Taxonomy of Attacks for Agent-Based Smart Grids 2014
48
Towards Providing Scalable and Robust Privacy in Vehicular
Networks
2014
49 Views in a Graph: To Which Depth Must Equality Be Checked
2014
50
Web Service Recommendation via Exploiting Location and QoS
Information
2014
51
Enabling Trustworthy Service Evaluation in Service-Oriented
Mobile Social Networks
2014
52
Exploiting Service Similarity for Privacy in Location-Based Search
Queries
2014
53 A Security and Privacy Aware Location-Based Rewarding System 2014
54
On False Data-Injection Attacks against Power System State
Estimation: Modeling and Countermeasures
2014
21. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
21 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
55 RRE: A Game-Theoretic Intrusion Response and Recovery Engine 2014
56
Securing Broker-Less Publish/Subscribe Systems Using Identity-
Based Encryption
2014
57 SOS: A Distributed Mobile Q&A System Based on Social Networks 2014
58
The Client Assignment Problem for Continuous Distributed
Interactive Applications: Analysis, Algorithms, and Evaluation
2014
59
The Design and Evaluation of An Information Sharing System for
Human Networks
2014
60
Traffic Pattern-Based Content Leakage Detection for Trusted
Content Delivery Networks
2014
61 Secure Outsourced Attribute-based Signatures 2014
62
ZEBRA: Data-Centric Contention Management in
Hardware Transactional Memory
2014
63 TRACON: Interference-Aware Scheduling for Data Intensive
Applications in Virtualized Environments
2014
64 Trajectory Improves Data Delivery in Urban Vehicular Networks
2014
65
Streaming Applications on Bus-Based Multiprocessor System-on-
Chips
2014
SOFTWARE ENGINEERING 2014
1 Automatic Summarization of Bug Reports 2014
2
Development of Game-Like Simulations for Procedural Knowledge
in Healthcare Education
2014
3
Effects of Developer Experience on Learningand Applying Unit
Test-Driven Development
2014
4 Formulating Cost-Effective Monitoring Strategies for Service- 2014
22. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
22 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
Based Systems
5
Governing Software Process Improvementsin Globally Distributed
Product Development
2014
6
Supporting Reflective Practice in Software Engineering Education
through a Studio-Based Approach
2014
7
Modeling Human-in-the-Loop Security Analysis and Decision-
Making Processes
2014
8 Variability in Software Systems-A Systematic Literature Review 2014
9 Automated Fixing of Programs with Contracts 2014
10 Conservation of Information: Software’s Hidden Clockwork?
2014
11 Modular Software Model Checking for Distributed Systems 2014
12 REPENT: Analyzing the Nature of Identifier Renamings 2014
13
How Effectively Does Metamorphic Testing Alleviate the Oracle
Problem?
2014
14 Reducing Masking Effects in Combinatorial Interaction Testing: A
Feedback Driven Adaptive Approach
2014
15 Improved Evolutionary Algorithm Design for the Project
Scheduling Problem Based on Runtime Analysis
2014
16
Detecting Memory Leaks Statically with Full-Sparse Value-Flow
Analysis
2014
17 Gossip Kit: A Unified Component Framework for Gossip 2014
18
Learning Assumptions for Compositional Verification of Timed
Systems
2014
19
Modeling Human-in-the-Loop Security Analysis and Decision-
Making Processes
2014
23. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
23 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
20 Multi-Objective Quality-Driven Service Selection—A Fully
Polynomial Time Approximation Scheme
2014
21 Quality-Aware Service Selection for Service-Based Systems Based
on Iterative Multi Attribute Combinatorial Auction
2014
22 An Observe-Model-Exercise* Paradigm to Test Event-Driven
Systems with Undetermined Input Spaces
2014
23
Variability Mining: Consistent Semi-automatic Detection of
Product-Line Features
2014
SERVICE COMPUTING(WEB SERVICES) 2014
1
A Novel Time-Obfuscated Algorithm for Trajectory Privacy
Protection
2014
2
An Empirical Study of Error Patterns in Industrial Business Process
Models
2014
3 Commitments to Regulate Social Web Services Operation 2014
4 Comprehensive Explanation of SLA Violations at Runtime 2014
5 Decentralized Enactment of BPEL Processes 2014
6 Introducing Replace ability into Web Service Composition 2014
7 Privacy-Enhanced Web Service Composition 2014
8 Reliability-Based Design Optimization for Cloud Migration 2014
9 Satisfiability Analysis of Workflows with Control-Flow Patterns
and Authorization Constraints
2014
10
Scalable and Accurate Prediction of Availability of Atomic Web
Services
2014
11 Service Identification in Interorganizational Process Design 2014
12 Towards Efficient Virtual Appliance Delivery with Minimal
Manageable Virtual Appliances
2014
13 Variations in Performance and Scalability: An Experimental Study
in IaaS CloudS Using Multi-Tier Workloads
2014
24. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
24 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
14 Simulating Service-Oriented Systems: A Survey and the Services-
Aware Simulation Framework
2014
15
A Fully Distributed Scheme for Discovery of Semantic
Relationships
2014
16 Cost and Accuracy Aware Scientific Workflow Composition for
Service-Oriented Environments
2014
17 Using Multi-Tier Workloads 2014
18
A Graph Derivation Based Approach for Measuring and
Comparing Structural Semantics of Ontologies
2014
19 Constraint-Aware Approach to Web Service Composition 2014
20
Design of a RESTful Web Information System for Drug Prescription
and Administration
2014
21
Designing an Architecture for Monitoring Patients at Home
Ontologies and Web Services for Clinical and Technical
Management Integration
2014
22
SMARTSPACE Multiagent Based Distributed Platform for Semantic
Service Discovery
2014
23
Web Service Recommendation via Exploiting Location and QoS
Information
2014
IMAGE PROCESSING 2014
1
Designing an Efficient Image Encryption-Then-Compression
System via Prediction Error Clustering and Random Permutation -
Information Forensics and Security
2014
2 Fingerprint Compression Based on Sparse Representation 2014
3
Hierarchical Prediction and Context Adaptive Coding for Lossless
Color Image Compression
2014
25. 2014-2015 [LATEST 2014 JAVA IEEE Titles ]
25 #303 & 304, AVR Complex, Balaji Colony, Tirupati – 517 502. Ph : 9030333433 |
0877-2261612
EMAIL :takeoffstudentprojects@gmail.com | www.takeoffprojects.com
4
Captcha as Graphical Passwords A New Security Primitive Based
on Hard AI Problems
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014
2014