SlideShare a Scribd company logo
1 of 9
Download to read offline
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
Sl.No Project Title Year
Cloud Computing
1 Identity-based Encryption with Outsourced Revocation in Cloud Computing 2015
2 Cloud Armor Supporting Reputation-based Trust Management for Cloud
Services
2015
3 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
2015
4 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation 2015
5 Service Operator-aware Trust Scheme for Resource Matchmaking across
Multiple Clouds
2015
6 Cost-Minimizing Dynamic Migration of Content Distribution Services into
Hybrid Clouds
2015
7 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous
Attribute Based Encryption
2015
8 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
Computing
2015
9 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted
Cloud Data
2015
10 Audit Free Cloud Storage via Deniable Attribute based Encryption 2015
11 CHARM: A Cost-efficient Multi cloud Data Hosting Scheme with High
Availability
2015
12 Demystifying the Clouds: Harnessing Resource Utilization Models for Cost
Effective Infrastructure Alternatives
2015
13 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable
Delegation in Cloud Computing
2015
14 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015
15 Combining Efficiency, Fidelity, and Flexibility in Resource Information
Services
2015
16 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015
17 Enabling Cloud Storage Auditing with Key Exposure Resistance 2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
18 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 2015
19 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via
Cloud Storage
2015
20 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-
Constrained Devices
2015
21 Privacy Preserving Public Auditing for Regenerating Code Based Cloud Storage 2015
22 Panda: Public Auditing for Shared Data with Efficient User Revocation in the
Cloud
2015
23 Provable Multi copy Dynamic Data Possession in Cloud Computing Systems 2015
24 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User
Revocation
2015
25 Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud
Infrastructure
2015
26 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud
Computing
2015
27 Reducing Fragmentation for In-line De duplication Backup Storage via
Exploiting Backup History and Cache Knowledge
2015
28 Secure Auditing and De duplicating Data in Cloud 2015
29 Secure Distributed De duplication Systems with Improved Reliability 2015
30 Public Integrity Auditing for Dynamic Data Sharing with Multi User
Modification
2015
31 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe
Systems
2015
32 Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS)
Clouds
2015
33 Cloud-Based Multimedia Content Protection System 2015
34 A secure data self-destructing scheme in cloud computing 2015
35 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage 2015
36 A Hybrid Cloud Approach for Secure Authorized Deduplication 2015
37 Stealthy Denial of Service Strategy in Cloud Computing 2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
38 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the
Cloud
2015
39 An Authenticated Trust and Reputation Calculation and Management System for
Cloud and Sensor Networks Integration
2015
40 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-
dictionaries over Encrypted Cloud Data
2015
41 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in
Cloud Computing
2015
42 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers 2015
43 CPU Provisioning Algorithms for Service Differentiation in Cloud-Based
Environments
2015
44 PSMPA: Patient Self-Controllable and Multi-Level Privacy Preserving
Cooperative Authentication in Distributed m- Healthcare Cloud Computing
System
2015
45 MobiContext: A Context-aware Cloud-Based Venue Recommendation
Framework
2015
46 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social
Networks
47 Guest Editorial: Recommendation Techniques for Services Computing and
Cloud Computing
Network Security & Secure Computing
1 Key recovery Attacks on KIDS, a Keyed Anomaly Detection System 2015
2 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
3 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast
Keyword Search
2015
4 Secure Distributed De duplication Systems with Improved Reliability 2015
5 A Computational Dynamic Trust Model for User Authorization 2015
6 Continuous and Transparent User Identity Verification for Secure Internet
Services
2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
7 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher
texts
2015
8 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting
Masquerade Attacks
2015
9 Improved Privacy-Preserving P2P Multimedia Distribution Based on
Recombined Fingerprints
2015
10 Secure Spatial Top-k Query Processing via Un trusted Location- Based Service
Providers
2015
11 Key Updating for Leakage Resiliency with Application to AES Modes of
Operation
2015
12 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path
Backscatter
2015
13 Software Puzzle: A Countermeasure to Resource-Inflated Denial of- Service
Attacks
2015
14 Behavior Rule Specification-Based Intrusion Detection for Safety Critical
Medical Cyber Physical Systems
2015
15 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast
Keyword Search
2015
16 Data Lineage in Malicious Environments 2015
17 Group Key Agreement with Local Connectivity 2015
Data Mining
1 Towards Effective Bug Triage with Software Data Reduction Techniques 2015
2 Active Learning for Ranking through Expected Loss Optimization 2015
3 Discovery of Ranking Fraud for Mobile Apps 2015
4 k-Nearest Neighbor Classification over Semantically Secure Encrypted
Relational Data
2015
5 Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions 2015
6 PAGE: A Partition Aware Engine for Parallel Graph Computation 2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
7 Query Aware Determinization of Uncertain Objects 2015
8 RRW - A Robust and Reversible Watermarking Technique for Relational Data 2015
9 Rule-Based Method for Entity Resolution 2015
10 Secure Distributed De duplication Systems with Improved Reliability 2015
11 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web
Interfaces
2015
12 Best Keyword Cover Search 2015
13 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based
on the Word Alignment Model
2015
14 Context-Based Diversification for Keyword Queries over XML Data 2015
15 Malware Propagation in Large-Scale Networks 2015
16 On Summarization and Timeline Generation for Evolutionary Tweet Streams 2015
17 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015
18 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection 2015
19 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query
Processing at Location-Based Services
2015
20 Scalable Constrained Spectral Clustering 2015
21 Tweet Segmentation and Its Application to Named Entity Recognition 2015
22 Tracking Temporal Community Strength in Dynamic Networks 2015
23 Anonymizing Collections of Tree-Structured Data 2015
24 Making Digital Artifacts on the Web Verifiable and Reliable 2015
25 Privacy Policy Inference of User Uploaded Images on Content Sharing Sites 2015
26 Structured Learning from Heterogeneous Behavior for Social Identity Linkage 2015
27 Sub graph Matching with Set Similarity in a Large Graph Database 2015
28 Tweet Segmentation and Its Application to Named Entity Recognition 2015
Mobile Computing
1 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid
Wireless Networks
2015
2 Optimum Power Allocation in Sensor Networks for Active Radar Applications 2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
3 Dynamic Routing for Data Integrity and Delay Differentiated Services in
Wireless Sensor Networks
2015
4 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in
Wireless Ad Hoc Networks
2015
5 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
6 Mobile Data Gathering with Load Balanced Clustering and Dual Data
Uploading in Wireless Sensor Networks
2015
7 Towards Information Diffusion in Mobile Social Networks 2015
Wireless Sensor Networks
1 Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor
Networks
2015
2 Data Collection in Multi Application Sharing Wireless Sensor Networks 2015
3 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet
Drop Attacks in Wireless Sensor Networks
2015
4 Secure Data Aggregation Technique for Wireless Sensor Networks in the
Presence of Collusion Attacks
2015
5 Effective Key Management in Dynamic Wireless Sensor Networks 2015
6 Congestion Aware Load Balancing for Multi radio Wireless Mesh Network 2015
Android
1 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2015
2 Friend book A Semantic-based Friend Recommendation System for Social
Networks
2015
3 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming
Applications
2015
4 A Location- and Diversity-aware News Feed System for Mobile Users 2015
5 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware 2015
6 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015
7 Privacy-Preserving Relative Location Based Services for Mobile Users 2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
8 Smartphone-Based Wound Assessment System for Patients with Diabetes 2015
9 User Privacy and Data Trustworthiness in Mobile Crowd Sensing 2015
10 User-Defined Privacy Grid System for Continuous Location-Based Services 2015
11 VULHUNTER: Toward Discovering Vulnerabilities in Android Applications 2015
Adhoc Networks & VANET & MANET
1 Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social
Networks
2015
2 Defending Against Collaborative Attacks by Malicious Nodes in MANETs A
Cooperative Bait Detection Approach
2015
3 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though
Replication for Efficient File Sharing
2015
4 Optimal Configuration of Network Coding in Ad Hoc Networks 2015
Networking and Service, Secure Computing
1 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web
Interfaces
2015
2 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast
Keyword Search
2015
3 Revealing the Trace of High-Quality JPEG Compression Through Quantization
Noise Analysis
2015
4 Detecting Malicious Face book Applications 2015
5 A Distortion-Resistant Routing Framework for Video Traffic in Wireless
Multihop Networks
2015
6 A Proximity-Aware Interest-Clustered P2P File Sharing System 2015
7 Universal Network Coding-Based Opportunistic Routing for Unicast 2015
8 Collision Tolerant and Collision Free Packet Scheduling for Underwater
Acoustic Localization
2015
9 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
Image Processing and Multimedia
1 Learning to Rank Image Tags with Limited Training Examples 2015
2 An Attribute assisted Re ranking Model for Web Image Search 2015
3 Detection and Rectification of Distorted Fingerprints 2015
4 Steganography Using Reversible Texture Synthesis 2015
5 Automatic Face Naming by Learning Discriminative Affinity Matrices From
Weakly Labeled Images
2015
6 EMR: A Scalable Graph-based Ranking Model for Content-based Image
Retrieval
2015
7 Learning Fingerprint Reconstruction: From Minutiae to Image 2015
8 Multiview Alignment Hashing for Efficient Image Search 2015
J2ME Mobile Based Projects
1 Adaptation of a virtual campus for mobile learning devices 2015
2 Bluetooth Mobile Based College Campus 2015
3 ECops via Handheld Mobile Devices 2015
4 Privacy-Conscious Location-Based Queries in Mobile Environments 2015
5 Ranking Model Adaptation for Domain-Specific Search 2015
6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework
For Mobile-Healthcare Emergency
2015
7 The Word in a nut shell : CONCISE RANGE QUERIES 2015
Parallel and Distributed System
1 A Computational Dynamic Trust Model for User Authorization 2015
2 Asymmetric Social Proximity Based Private Matching Protocols for Online
Social Networks
2015
3 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
#13/19, 1st
Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com
2015-2016
4 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015
5 Cost-Minimizing Dynamic Migration of Content Distribution Services into
Hybrid Clouds
2015
6 Data Collection in Multi-Application Sharing Wireless Sensor Networks 2015
7 Reducing Fragmentation for In-line De duplication Backup Storage via
Exploiting Backup History
2015
8 Service Operator-aware Trust Scheme for Resource Matchmaking across
Multiple Clouds
2015
9 Secure Distributed De duplication Systems with Improved Reliability 2015
10 Asymmetric Social Proximity Based Private Matching Protocols for Online
Social Networks
2015
SERVICE COMPUTING
1 Location-Aware and Personalized Collaborative Filtering for Web Service
Recommendation
2 A Fuzzy Preference Tree-Based Recommender System for Personalized
Business-to-Business E-Services
3 Guest Editorial: Recommendation Techniques for Services Computing and
Cloud Computing

More Related Content

Viewers also liked

latest IEEE 2015 wireless security
latest IEEE 2015 wireless securitylatest IEEE 2015 wireless security
latest IEEE 2015 wireless securityHari Krishnan
 
latest Ieee projects ns2
latest Ieee projects ns2latest Ieee projects ns2
latest Ieee projects ns2Hari Krishnan
 
2015 android project
2015 android project2015 android project
2015 android projectHari Krishnan
 
2015 application projects
2015 application projects2015 application projects
2015 application projectsHari Krishnan
 
International differences in work-related values
International differences in work-related valuesInternational differences in work-related values
International differences in work-related valuesSzu-Chia Huang
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application ProjectsHari Krishnan
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projectsHari Krishnan
 
Cloudy with a chance of computing
Cloudy with a chance of computingCloudy with a chance of computing
Cloudy with a chance of computingnmondollot
 
Latest IEEE 2015 2016 Project Titles
Latest IEEE 2015 2016 Project Titles Latest IEEE 2015 2016 Project Titles
Latest IEEE 2015 2016 Project Titles Hari Krishnan
 
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”Sunipha Ruamsap
 
Human Resource Management in Starbucks
Human Resource Management in StarbucksHuman Resource Management in Starbucks
Human Resource Management in StarbucksSzu-Chia Huang
 

Viewers also liked (16)

About us
About usAbout us
About us
 
latest IEEE 2015 wireless security
latest IEEE 2015 wireless securitylatest IEEE 2015 wireless security
latest IEEE 2015 wireless security
 
Ieee projects ns2
Ieee projects ns2Ieee projects ns2
Ieee projects ns2
 
latest Ieee projects ns2
latest Ieee projects ns2latest Ieee projects ns2
latest Ieee projects ns2
 
2015 android project
2015 android project2015 android project
2015 android project
 
IEEE Projects 2012
IEEE Projects 2012IEEE Projects 2012
IEEE Projects 2012
 
2015 application projects
2015 application projects2015 application projects
2015 application projects
 
International differences in work-related values
International differences in work-related valuesInternational differences in work-related values
International differences in work-related values
 
2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects2013-2014 IEEE Projects & Application Projects
2013-2014 IEEE Projects & Application Projects
 
Latest php projects
Latest  php projectsLatest  php projects
Latest php projects
 
2015 cloud sim projects
2015 cloud sim projects2015 cloud sim projects
2015 cloud sim projects
 
Cloudy with a chance of computing
Cloudy with a chance of computingCloudy with a chance of computing
Cloudy with a chance of computing
 
Latest IEEE 2015 2016 Project Titles
Latest IEEE 2015 2016 Project Titles Latest IEEE 2015 2016 Project Titles
Latest IEEE 2015 2016 Project Titles
 
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”
ใบงานที่ 6 เรื่อง โครงงานประเภท “การทดลองทฤษฎี”
 
The Carrot Principle
The Carrot PrincipleThe Carrot Principle
The Carrot Principle
 
Human Resource Management in Starbucks
Human Resource Management in StarbucksHuman Resource Management in Starbucks
Human Resource Management in Starbucks
 

Similar to Ieee projects list java 2015

2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS InfotechTmks Infotech
 
2015 and 2016 ieee projects for Adhoc Networks
2015 and 2016 ieee projects for Adhoc Networks2015 and 2016 ieee projects for Adhoc Networks
2015 and 2016 ieee projects for Adhoc NetworksTmks Infotech
 
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,BangaloreTmks Infotech
 
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,BangaloreTmks Infotech
 
2015 and 2016 ieee projects For Android @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects For Android @ TMKS Infotech,Bangalore2015 and 2016 ieee projects For Android @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects For Android @ TMKS Infotech,BangaloreTmks Infotech
 
2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed Computing2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed ComputingTmks Infotech
 
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS InfotechTmks Infotech
 
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,BngaloreTmks Infotech
 
2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network Security2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network SecurityTmks Infotech
 
2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects listTmks Infotech
 
Cloud computing 2015 ieee papers Data mining ieee project titles
Cloud computing  2015 ieee papers  Data mining ieee project titlesCloud computing  2015 ieee papers  Data mining ieee project titles
Cloud computing 2015 ieee papers Data mining ieee project titlesDoClick Solutions
 
2015 and 2016 IEEE Projects for MTech
2015 and 2016 IEEE Projects for MTech2015 and 2016 IEEE Projects for MTech
2015 and 2016 IEEE Projects for MTechTMKSInfotech
 
2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCA
2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCA2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCA
2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCATMKSInfotech
 
IEEE Projects, ieee 2015, ieee 2015 cse
IEEE Projects, ieee 2015, ieee 2015 cse IEEE Projects, ieee 2015, ieee 2015 cse
IEEE Projects, ieee 2015, ieee 2015 cse maheshmtech123
 
IEEE 2015 ME/M.TECH projects for CSE
IEEE 2015 ME/M.TECH projects for CSE  IEEE 2015 ME/M.TECH projects for CSE
IEEE 2015 ME/M.TECH projects for CSE maheshmtech123
 
2015 and 2016 ieee final list
2015 and 2016 ieee  final list 2015 and 2016 ieee  final list
2015 and 2016 ieee final list TMKSInfotech
 
2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotech2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotechmaheshmtech123
 
2015 and 2016 ieee final list
2015 and 2016 ieee  final list 2015 and 2016 ieee  final list
2015 and 2016 ieee final list TMKSInfotech
 
2015 and 2016 IEEE Project List for M.Tech
2015 and 2016 IEEE Project List for M.Tech2015 and 2016 IEEE Project List for M.Tech
2015 and 2016 IEEE Project List for M.Techmaheshmtech123
 
2015 and 2016 ieee final list
2015 and 2016 ieee  final list 2015 and 2016 ieee  final list
2015 and 2016 ieee final list maheshmtech123
 

Similar to Ieee projects list java 2015 (20)

2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
 
2015 and 2016 ieee projects for Adhoc Networks
2015 and 2016 ieee projects for Adhoc Networks2015 and 2016 ieee projects for Adhoc Networks
2015 and 2016 ieee projects for Adhoc Networks
 
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,Bangalore
 
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
 
2015 and 2016 ieee projects For Android @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects For Android @ TMKS Infotech,Bangalore2015 and 2016 ieee projects For Android @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects For Android @ TMKS Infotech,Bangalore
 
2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed Computing2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed Computing
 
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
 
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
 
2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network Security2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network Security
 
2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects list
 
Cloud computing 2015 ieee papers Data mining ieee project titles
Cloud computing  2015 ieee papers  Data mining ieee project titlesCloud computing  2015 ieee papers  Data mining ieee project titles
Cloud computing 2015 ieee papers Data mining ieee project titles
 
2015 and 2016 IEEE Projects for MTech
2015 and 2016 IEEE Projects for MTech2015 and 2016 IEEE Projects for MTech
2015 and 2016 IEEE Projects for MTech
 
2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCA
2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCA2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCA
2015 and 2016 IEEE Final Year Project List for BE,ME,MTech,BCA,MCA
 
IEEE Projects, ieee 2015, ieee 2015 cse
IEEE Projects, ieee 2015, ieee 2015 cse IEEE Projects, ieee 2015, ieee 2015 cse
IEEE Projects, ieee 2015, ieee 2015 cse
 
IEEE 2015 ME/M.TECH projects for CSE
IEEE 2015 ME/M.TECH projects for CSE  IEEE 2015 ME/M.TECH projects for CSE
IEEE 2015 ME/M.TECH projects for CSE
 
2015 and 2016 ieee final list
2015 and 2016 ieee  final list 2015 and 2016 ieee  final list
2015 and 2016 ieee final list
 
2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotech2015 and 2016 ieee Projects List @ TMKS Infotech
2015 and 2016 ieee Projects List @ TMKS Infotech
 
2015 and 2016 ieee final list
2015 and 2016 ieee  final list 2015 and 2016 ieee  final list
2015 and 2016 ieee final list
 
2015 and 2016 IEEE Project List for M.Tech
2015 and 2016 IEEE Project List for M.Tech2015 and 2016 IEEE Project List for M.Tech
2015 and 2016 IEEE Project List for M.Tech
 
2015 and 2016 ieee final list
2015 and 2016 ieee  final list 2015 and 2016 ieee  final list
2015 and 2016 ieee final list
 

More from Hari Krishnan

latest IEEE NetworkingProjects titles
latest IEEE NetworkingProjects  titleslatest IEEE NetworkingProjects  titles
latest IEEE NetworkingProjects titlesHari Krishnan
 
Latest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networksLatest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networksHari Krishnan
 
Latest Ieee 2015 multimedia projects
Latest Ieee 2015 multimedia projectsLatest Ieee 2015 multimedia projects
Latest Ieee 2015 multimedia projectsHari Krishnan
 
2015 big data project
2015 big data project2015 big data project
2015 big data projectHari Krishnan
 
Shakas Technologies in vellore
Shakas Technologies in velloreShakas Technologies in vellore
Shakas Technologies in velloreHari Krishnan
 
IEEE Projects Low Cost
IEEE Projects Low Cost IEEE Projects Low Cost
IEEE Projects Low Cost Hari Krishnan
 

More from Hari Krishnan (7)

latest IEEE NetworkingProjects titles
latest IEEE NetworkingProjects  titleslatest IEEE NetworkingProjects  titles
latest IEEE NetworkingProjects titles
 
Latest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networksLatest IEEE 2015 vehicular ad hoc networks
Latest IEEE 2015 vehicular ad hoc networks
 
Latest Ieee 2015 multimedia projects
Latest Ieee 2015 multimedia projectsLatest Ieee 2015 multimedia projects
Latest Ieee 2015 multimedia projects
 
2015 dot net list
2015 dot net list2015 dot net list
2015 dot net list
 
2015 big data project
2015 big data project2015 big data project
2015 big data project
 
Shakas Technologies in vellore
Shakas Technologies in velloreShakas Technologies in vellore
Shakas Technologies in vellore
 
IEEE Projects Low Cost
IEEE Projects Low Cost IEEE Projects Low Cost
IEEE Projects Low Cost
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Ieee projects list java 2015

  • 1. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 Sl.No Project Title Year Cloud Computing 1 Identity-based Encryption with Outsourced Revocation in Cloud Computing 2015 2 Cloud Armor Supporting Reputation-based Trust Management for Cloud Services 2015 3 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2015 4 Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation 2015 5 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 2015 6 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds 2015 7 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute Based Encryption 2015 8 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing 2015 9 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data 2015 10 Audit Free Cloud Storage via Deniable Attribute based Encryption 2015 11 CHARM: A Cost-efficient Multi cloud Data Hosting Scheme with High Availability 2015 12 Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives 2015 13 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing 2015 14 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015 15 Combining Efficiency, Fidelity, and Flexibility in Resource Information Services 2015 16 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 17 Enabling Cloud Storage Auditing with Key Exposure Resistance 2015
  • 2. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 18 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem 2015 19 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage 2015 20 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource- Constrained Devices 2015 21 Privacy Preserving Public Auditing for Regenerating Code Based Cloud Storage 2015 22 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud 2015 23 Provable Multi copy Dynamic Data Possession in Cloud Computing Systems 2015 24 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation 2015 25 Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure 2015 26 Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing 2015 27 Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History and Cache Knowledge 2015 28 Secure Auditing and De duplicating Data in Cloud 2015 29 Secure Distributed De duplication Systems with Improved Reliability 2015 30 Public Integrity Auditing for Dynamic Data Sharing with Multi User Modification 2015 31 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems 2015 32 Cloud-Trust a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds 2015 33 Cloud-Based Multimedia Content Protection System 2015 34 A secure data self-destructing scheme in cloud computing 2015 35 Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage 2015 36 A Hybrid Cloud Approach for Secure Authorized Deduplication 2015 37 Stealthy Denial of Service Strategy in Cloud Computing 2015
  • 3. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 38 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud 2015 39 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration 2015 40 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub- dictionaries over Encrypted Cloud Data 2015 41 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing 2015 42 SelCSP: A Framework to Facilitate Selection of Cloud Service Providers 2015 43 CPU Provisioning Algorithms for Service Differentiation in Cloud-Based Environments 2015 44 PSMPA: Patient Self-Controllable and Multi-Level Privacy Preserving Cooperative Authentication in Distributed m- Healthcare Cloud Computing System 2015 45 MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework 2015 46 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks 47 Guest Editorial: Recommendation Techniques for Services Computing and Cloud Computing Network Security & Secure Computing 1 Key recovery Attacks on KIDS, a Keyed Anomaly Detection System 2015 2 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015 3 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search 2015 4 Secure Distributed De duplication Systems with Improved Reliability 2015 5 A Computational Dynamic Trust Model for User Authorization 2015 6 Continuous and Transparent User Identity Verification for Secure Internet Services 2015
  • 4. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 7 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts 2015 8 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks 2015 9 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints 2015 10 Secure Spatial Top-k Query Processing via Un trusted Location- Based Service Providers 2015 11 Key Updating for Leakage Resiliency with Application to AES Modes of Operation 2015 12 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter 2015 13 Software Puzzle: A Countermeasure to Resource-Inflated Denial of- Service Attacks 2015 14 Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems 2015 15 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search 2015 16 Data Lineage in Malicious Environments 2015 17 Group Key Agreement with Local Connectivity 2015 Data Mining 1 Towards Effective Bug Triage with Software Data Reduction Techniques 2015 2 Active Learning for Ranking through Expected Loss Optimization 2015 3 Discovery of Ranking Fraud for Mobile Apps 2015 4 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data 2015 5 Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions 2015 6 PAGE: A Partition Aware Engine for Parallel Graph Computation 2015
  • 5. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 7 Query Aware Determinization of Uncertain Objects 2015 8 RRW - A Robust and Reversible Watermarking Technique for Relational Data 2015 9 Rule-Based Method for Entity Resolution 2015 10 Secure Distributed De duplication Systems with Improved Reliability 2015 11 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2015 12 Best Keyword Cover Search 2015 13 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model 2015 14 Context-Based Diversification for Keyword Queries over XML Data 2015 15 Malware Propagation in Large-Scale Networks 2015 16 On Summarization and Timeline Generation for Evolutionary Tweet Streams 2015 17 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites 2015 18 Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection 2015 19 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services 2015 20 Scalable Constrained Spectral Clustering 2015 21 Tweet Segmentation and Its Application to Named Entity Recognition 2015 22 Tracking Temporal Community Strength in Dynamic Networks 2015 23 Anonymizing Collections of Tree-Structured Data 2015 24 Making Digital Artifacts on the Web Verifiable and Reliable 2015 25 Privacy Policy Inference of User Uploaded Images on Content Sharing Sites 2015 26 Structured Learning from Heterogeneous Behavior for Social Identity Linkage 2015 27 Sub graph Matching with Set Similarity in a Large Graph Database 2015 28 Tweet Segmentation and Its Application to Named Entity Recognition 2015 Mobile Computing 1 A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks 2015 2 Optimum Power Allocation in Sensor Networks for Active Radar Applications 2015
  • 6. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 3 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks 2015 4 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks 2015 5 User-Defined Privacy Grid System for Continuous Location-Based Services 2015 6 Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks 2015 7 Towards Information Diffusion in Mobile Social Networks 2015 Wireless Sensor Networks 1 Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks 2015 2 Data Collection in Multi Application Sharing Wireless Sensor Networks 2015 3 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks 2015 4 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks 2015 5 Effective Key Management in Dynamic Wireless Sensor Networks 2015 6 Congestion Aware Load Balancing for Multi radio Wireless Mesh Network 2015 Android 1 Cooperative Positioning and Tracking in Disruption Tolerant Networks 2015 2 Friend book A Semantic-based Friend Recommendation System for Social Networks 2015 3 Innovative Schemes for Resource Allocation in the Cloud for Media Streaming Applications 2015 4 A Location- and Diversity-aware News Feed System for Mobile Users 2015 5 ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware 2015 6 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud 2015 7 Privacy-Preserving Relative Location Based Services for Mobile Users 2015
  • 7. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 8 Smartphone-Based Wound Assessment System for Patients with Diabetes 2015 9 User Privacy and Data Trustworthiness in Mobile Crowd Sensing 2015 10 User-Defined Privacy Grid System for Continuous Location-Based Services 2015 11 VULHUNTER: Toward Discovering Vulnerabilities in Android Applications 2015 Adhoc Networks & VANET & MANET 1 Efficient Data Query in Intermittently Connected Mobile Ad Hoc Social Networks 2015 2 Defending Against Collaborative Attacks by Malicious Nodes in MANETs A Cooperative Bait Detection Approach 2015 3 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing 2015 4 Optimal Configuration of Network Coding in Ad Hoc Networks 2015 Networking and Service, Secure Computing 1 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces 2015 2 Generating Searchable Public-Key Cipher texts with Hidden Structures for Fast Keyword Search 2015 3 Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis 2015 4 Detecting Malicious Face book Applications 2015 5 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks 2015 6 A Proximity-Aware Interest-Clustered P2P File Sharing System 2015 7 Universal Network Coding-Based Opportunistic Routing for Unicast 2015 8 Collision Tolerant and Collision Free Packet Scheduling for Underwater Acoustic Localization 2015 9 My Privacy My Decision: Control of Photo Sharing on Online Social Networks 2015
  • 8. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 Image Processing and Multimedia 1 Learning to Rank Image Tags with Limited Training Examples 2015 2 An Attribute assisted Re ranking Model for Web Image Search 2015 3 Detection and Rectification of Distorted Fingerprints 2015 4 Steganography Using Reversible Texture Synthesis 2015 5 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Images 2015 6 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval 2015 7 Learning Fingerprint Reconstruction: From Minutiae to Image 2015 8 Multiview Alignment Hashing for Efficient Image Search 2015 J2ME Mobile Based Projects 1 Adaptation of a virtual campus for mobile learning devices 2015 2 Bluetooth Mobile Based College Campus 2015 3 ECops via Handheld Mobile Devices 2015 4 Privacy-Conscious Location-Based Queries in Mobile Environments 2015 5 Ranking Model Adaptation for Domain-Specific Search 2015 6 SPOC A Secure and Privacy-preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency 2015 7 The Word in a nut shell : CONCISE RANGE QUERIES 2015 Parallel and Distributed System 1 A Computational Dynamic Trust Model for User Authorization 2015 2 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks 2015 3 Authenticated Key Exchange Protocols for Parallel Network File Systems 2015
  • 9. #13/19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, Vellore-632006. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Website: www.shakastech.com, Email-id: shakastech@gmail.com,Info@shakastech.com 2015-2016 4 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security 2015 5 Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds 2015 6 Data Collection in Multi-Application Sharing Wireless Sensor Networks 2015 7 Reducing Fragmentation for In-line De duplication Backup Storage via Exploiting Backup History 2015 8 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds 2015 9 Secure Distributed De duplication Systems with Improved Reliability 2015 10 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks 2015 SERVICE COMPUTING 1 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation 2 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services 3 Guest Editorial: Recommendation Techniques for Services Computing and Cloud Computing