IEEE JAVA PROJECTS TITLES YEAR--2013
PROJECT TITLE DOMAIN
1. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Development
Cloud Computing
2. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Cloud Computing
Social Video Sharing in the Clouds
3. Collaboration in Multi Cloud Computing Environments Framework & Security
Issues
Cloud Computing
4. Mining Contracts for Business Events and Temporal Constraints in Service
Engagements
Cloud Computing
5. Privacy Preserving Delegated Access Control in Public Cloud Cloud Computing
6. Privacy Preserving Public Auditing for Secure Cloud Storage Cloud Computing
7. Winds of Change from Vendor Lock-In to the Meta Cloud Cloud Computing
8. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme Cloud Computing
9. Load Rebalancing for Distributed File Systems in Clouds Cloud Computing
10. Intelligent Lung Cancer Prediction System Data Mining
11. Fast nearest neighbor search with key words Data Mining
12. A Fast Clustering-Based Feature Subset Selection Algorithm for High
Dimensional Data
Data Mining
13. A System to Filter Unwanted Messages from OSN User Walls Data Mining
14. Cloud MoV Cloud-based Mobile Social TV Data Mining
15. Comparable Entity Mining from Comparative Questions Data Mining
16. Crowd Sourcing Predictors of Behavioral Outcomes Data Mining
17. Facilitating effective user navigation through website structure improvement Data Mining
18. Focus Learning to Crawl Web Forums Data Mining
19. Incentive Compatible Privacy-Preserving Data Analysis Data Mining
20. PMSE : A Personalized Mobile Search Engine Data Mining
21. Robust Module Based Data Management Data Mining
22. Sensitive Label Privacy Protection on Social Network Data Data Mining
23. Spatial Approximate String Search Data Mining
24. Multiparty Access Control for Online Social Networks: Model and Mechanisms Data Mining
25. Annotating Search Results from Databases Data Mining
26. A Method for Mining Infrequent Causal Associations and Its Application in
Finding Adverse Drug Reaction Signal Pairs
Data Mining
27. m-Privacy for Collaborative Data Publishing Data Mining
28. Improving Various Reversible Data Hiding Schemes Image Processing
29. A Scalable Server Architecture for Mobile Presence Services in Social Network Mobile Computing
Applications
30. Distributed Cooperative Caching in Social Wireless Networks Mobile Computing
31. Mobile relay configuration in data-intensive wireless sensor networks Mobile Computing
32. Privacy Preserving Distributed Profile Matching in Proximity-based Mobile
Social Networks
Mobile Computing
33. Towards a statistical framework for source anonymity in sensor networks Mobile Computing
34. Vampire attacks: Draining life from wireless ad-hoc sensor networks Mobile Computing
35. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected
Mobile Networks
Mobile Computing
36. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless
Networks
Mobile Computing
37. Discovery and verification of neighbor positions in mobile adhoc networks Mobile Computing
38. Access Policy Consolidation for Event Processing Systems Networking
39. Fully Anonymous Profile Matching in Mobile Social Networks Networking
40. Optimizing Cloud Resources for Delivering IPTV Services through
Virtualization
Networking
41. Price Differentiation for Communication Networks Networking
42. Pack: Prediction based cloud bandwidth and cost reduction system Networking
43. Fast-Transmission-to-Remote-Cooperative-Groups-A-New-Key-Management-
Paradigm
Networking
44. Dynamic resource allocation using virtual machines for cloud computing
environment
Parallel and
Distribution
45. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Parallel and
using Attribute-based Encryption distribution
46. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring Secure Computing
47. Extracting Spread-Spectrum Hidden Data from Digital Media Secure Computing
48. Two Tales of Privacy in Online Social Networks Secure Computing
49. Utility-Privacy Tradeoff in Databases An Information-theoretic Approach Secure Computing
50. A Secure Protocol For Spontaneous Wireless Ad-Hoc Network Creation Wireless Sensor
Networks
51. A Highly Scalable Key Pre Distribution Scheme For Wireless Sensor Networks Wireless Sensor
Networks
52. Attribute-Based Encryption With Verifiable Outsourced Decryption Secure Computing
53. Protecting Sensitive Labels in Social Network Data Anonymization Data Mining
54. Privacy against Aggregate Knowledge Attacks Data Mining
55. IP-Geolocation Mapping for Moderately Connected Internet Regions Parallel and
distribution
56. Secure Mining Of Association Rules In Horizontally Distributed Databases Data Mining
57. SORT A Self-Organizing Trust Model for Peer-to-Peer Systems Secure Computing
58. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code Words Multi Media
59. Super-Resolution-based Inpainting Image Processing
60. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Networking
61. Intrusion Detection Technique by using K means, Fuzzy Neural Network and
SVM classifiers
Networking
Ieee 2013 java projects list
Ieee 2013 java projects list
Ieee 2013 java projects list

Ieee 2013 java projects list

  • 1.
    IEEE JAVA PROJECTSTITLES YEAR--2013 PROJECT TITLE DOMAIN 1. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Development Cloud Computing 2. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Cloud Computing
  • 2.
    Social Video Sharingin the Clouds 3. Collaboration in Multi Cloud Computing Environments Framework & Security Issues Cloud Computing 4. Mining Contracts for Business Events and Temporal Constraints in Service Engagements Cloud Computing
  • 3.
    5. Privacy PreservingDelegated Access Control in Public Cloud Cloud Computing 6. Privacy Preserving Public Auditing for Secure Cloud Storage Cloud Computing 7. Winds of Change from Vendor Lock-In to the Meta Cloud Cloud Computing 8. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme Cloud Computing 9. Load Rebalancing for Distributed File Systems in Clouds Cloud Computing
  • 4.
    10. Intelligent LungCancer Prediction System Data Mining 11. Fast nearest neighbor search with key words Data Mining 12. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data Data Mining 13. A System to Filter Unwanted Messages from OSN User Walls Data Mining 14. Cloud MoV Cloud-based Mobile Social TV Data Mining
  • 5.
    15. Comparable EntityMining from Comparative Questions Data Mining 16. Crowd Sourcing Predictors of Behavioral Outcomes Data Mining 17. Facilitating effective user navigation through website structure improvement Data Mining 18. Focus Learning to Crawl Web Forums Data Mining 19. Incentive Compatible Privacy-Preserving Data Analysis Data Mining 20. PMSE : A Personalized Mobile Search Engine Data Mining
  • 6.
    21. Robust ModuleBased Data Management Data Mining 22. Sensitive Label Privacy Protection on Social Network Data Data Mining 23. Spatial Approximate String Search Data Mining 24. Multiparty Access Control for Online Social Networks: Model and Mechanisms Data Mining
  • 7.
    25. Annotating SearchResults from Databases Data Mining 26. A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs Data Mining 27. m-Privacy for Collaborative Data Publishing Data Mining 28. Improving Various Reversible Data Hiding Schemes Image Processing 29. A Scalable Server Architecture for Mobile Presence Services in Social Network Mobile Computing
  • 8.
    Applications 30. Distributed CooperativeCaching in Social Wireless Networks Mobile Computing 31. Mobile relay configuration in data-intensive wireless sensor networks Mobile Computing 32. Privacy Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks Mobile Computing 33. Towards a statistical framework for source anonymity in sensor networks Mobile Computing
  • 9.
    34. Vampire attacks:Draining life from wireless ad-hoc sensor networks Mobile Computing 35. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks Mobile Computing 36. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks Mobile Computing 37. Discovery and verification of neighbor positions in mobile adhoc networks Mobile Computing
  • 10.
    38. Access PolicyConsolidation for Event Processing Systems Networking 39. Fully Anonymous Profile Matching in Mobile Social Networks Networking 40. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization Networking 41. Price Differentiation for Communication Networks Networking
  • 11.
    42. Pack: Predictionbased cloud bandwidth and cost reduction system Networking 43. Fast-Transmission-to-Remote-Cooperative-Groups-A-New-Key-Management- Paradigm Networking 44. Dynamic resource allocation using virtual machines for cloud computing environment Parallel and Distribution 45. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Parallel and
  • 12.
    using Attribute-based Encryptiondistribution 46. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring Secure Computing 47. Extracting Spread-Spectrum Hidden Data from Digital Media Secure Computing 48. Two Tales of Privacy in Online Social Networks Secure Computing 49. Utility-Privacy Tradeoff in Databases An Information-theoretic Approach Secure Computing
  • 13.
    50. A SecureProtocol For Spontaneous Wireless Ad-Hoc Network Creation Wireless Sensor Networks 51. A Highly Scalable Key Pre Distribution Scheme For Wireless Sensor Networks Wireless Sensor Networks 52. Attribute-Based Encryption With Verifiable Outsourced Decryption Secure Computing 53. Protecting Sensitive Labels in Social Network Data Anonymization Data Mining
  • 14.
    54. Privacy againstAggregate Knowledge Attacks Data Mining 55. IP-Geolocation Mapping for Moderately Connected Internet Regions Parallel and distribution 56. Secure Mining Of Association Rules In Horizontally Distributed Databases Data Mining 57. SORT A Self-Organizing Trust Model for Peer-to-Peer Systems Secure Computing 58. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code Words Multi Media
  • 15.
    59. Super-Resolution-based InpaintingImage Processing 60. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Networking 61. Intrusion Detection Technique by using K means, Fuzzy Neural Network and SVM classifiers Networking