Final year M.E IEEE PROJECTS TITLES 2014-2015 Final year IEEE PROJECTS TITLES 2014-2015 Final year M.TECH IEEE PROJECTS TITLES 2014-2015 Final year B.E IEEE
Introduction to ArtificiaI Intelligence in Higher Education
Ieee 2014 java projects list
1. IEEE JAVA PROJECTS TITLES YEAR--2014
PROJECT TITLE DOMAIN
1. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability Secure Computing
2. Fast Nearest Neighbor Search with Keywords Data Mining
3. Personalized web search using Browsing history and domain Knowledge Data Mining
2. 4. Secure Outsourced Attribute-Based Signatures Parallel and
Distributed Systems
5. Secure-Mining-of-Association-Rules-in-Horizontally-Distributed-Databases Data Mining
6. Supporting Privacy Protection in Personalized Web Search Data Mining
7. XSPath Navigation on XML Schemas Made Easy Data Mining
8. A Hybrid Cloud Approach for Secure Authorized Deduplication Parallel and
3. Distributed Systems
9. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks
Parallel and
Distributed Systems
10. A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks MOBILE
COMPUTING
4. 11. A Scalable Two-Phase Top-Down Specialization Approach for Data
Anonymization Using MapReduce on Cloud
Parallel and
Distributed Systems
12. A System for Denial-of-Service Attack Detection Based on Multivariate
Correlation Analysis
Parallel and
Distributed Systems
13. A Tag Encoding Scheme against Pollution Attack to Linear Network Coding Parallel and
Distributed Systems
14. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Data Mining
5. Relational Data
15. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions Parallel and
Distributed Systems
16. Bandwidth Distributed Denial of Service: Attacks and Defenses Flooding Attacks
17. Behavioral Malware Detection in Delay Tolerant Networks Parallel and
Distributed Systems
6. 18. Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing
19. Cooperative Spectrum Sharing: A Contract-Based Approach Mobile Computing
20. Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds
Parallel and
Distributed Systems
21. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social
Networks
Parallel and
Distributed Systems
7. 22. Facilitating Document Annotation Using Content and Querying Value Data Mining
23. Interpreting the Public Sentiment Variations on Twitter Data Mining
24. Keyword Query Routing Data Mining
25. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of
Unknown Vulnerabilities
Secure Computing
26. Modeling of Distributed File Systems for Practical Performance Analysis Parallel and
8. Distributed Systems
27. Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc
Networks
Parallel and
Distributed Systems
28. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Networking
29. Preserving Location Privacy in Geo-Social Applications Mobile Computing
30. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing
9. 31. Product Aspect Ranking and Its Applications Data Mining
32. Two Provably Secure Password Hashing Algorithms Networking
33. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking
34. Set Predicates in SQL: Enabling Set-Level Comparisons for Dynamically
Formed Groups
Data Mining
35. Hiding in the Mobile Crowd Location Privacy through Collaboration Networking
10. 36. Scalable Distributed Service Integrity Attestation for Software-as-a-Service
Clouds
Parallel and
Distributed Systems
37. Automatic Test Packet Generation Networking
38. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Parallel and
Distributed Systems
39. A Cocktail Approach for Travel Package Recommendation Data Mining
11. 40. Efficient Prediction of Difficult Keyword Queries over Databases Data Mining
41. Multicast Capacity in MANET with Infrastructure Support Parallel and
Distributed Systems
42. PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks
43. Efficient Authentication for Mobile and Pervasive Computing Mobile Computing
44. Friendbook: A Semantic-based Friend Recommendation System for Social Mobile Computing
12. Networks
45. Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous
Devices
Android
46. Towards Differential Query Services in Cost-Efficient Clouds Parallel and
Distributed Systems
13. 47. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority
Cloud Storage
Parallel and
Distributed Systems
48. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking
49. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud
Computing
Cloud Computing
50. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Parallel and
14. Distributed Systems
51. Secure Data Aggregation in Wireless Sensor Networks Filtering out the
Attacker’s Impact
Information Forensics
and Security
52. The Design and Evaluation of An Information Sharing System for Human
Networks
Parallel and
Distributed Systems
15. 53. Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery
Networks
Parallel and
Distributed Systems
54. Distributed, concurrent, and independent access to encrypted cloud databases Parallel and
Distributed Systems
55. Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI
Problems
Security
56. Building Confidential and Efficient Query Services in the Cloud with RASP Data Mining
16. Data Perturbation
57. Boundary Cutting for Packet Classification Networking
58. Leveraging Social Networks for P2P Content based File Sharing in Disconnected
MANETs
Networking
59. Data Mining with Big Data Data Mining
60. secure information sharing using ABE