Você está na página 1de 7

MODAInnovations

Complete Academic Project Solutions


9538304161
www.modainnovations.com
modainnovations@gmail.com

JAVA/J2EE IEEE PROJECT LIST
S NO
Project Title Domain Technology Year
1 Privacy-Preserving Public Auditing for Secure
Cloud Storage
Cloud
Computing
Java/J2ee 2013
2
CloudMoV: Cloud-based Mobile Social TV
Cloud
Computing
Java/J2ee 2013
3 Winds of Change From Vendor Lock-In to the
Meta Cloud.
Cloud
Computing
Java/J2ee 2013
4
Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud
Cloud
Computing
Java/J2ee 2013
5 A Load Balancing Model Based on Cloud
Partitioning for the Public Cloud.
Cloud
Computing
Java/J2ee 2013
6 A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud Computing
Systems
Cloud
Computing
Java/J2ee 2013
7 Dynamic Resource allocation using virtual
machines for cloud computing environment
Cloud
Computing
Java/J2ee 2013
8 Enabling Dynamic Data and Indirect Mutual
Trust for Cloud Computing Storage Systems
Cloud
Computing
Java/J2ee 2013
9 Error-Tolerant Resource Allocation and Payment
Minimization for Cloud System
Cloud
Computing
Java/J2ee 2013
10 Scalable and Secure Sharing of Personal Health
Records in Cloud Computing using Attribute-
Cloud
Computing
Java/J2ee 2013

based Encryption.
11 Harnessing the Cloud for Securely Outsourcing
Large
Cloud
Computing
Java/J2ee 2013
12 Prediction-Based Cloud Bandwidth and Cost
Reduction System
Cloud
Computing
Java/J2ee 2013
13 Privacy-Preserving Public Auditing for Secure
Cloud Storage
Cloud
Computing
Java/J2ee 2013
14 Cloud computing for mobile users can offloading
compution save energy.
Cloud
Computing
Java/J2ee 2013
15 A Fast Clustering-Based Feature Subset
Selection Algorithm for High-Dimensional Data
Data Mining Java/J2ee 2013
16 Access Policy Consolidation for Event
Processing Systems
Data Mining Java/J2ee 2013
17 Facilitating Document Annotation Using Content
And Querying Value
Data Mining Java/J2ee 2013
18 m-Privacy for Collaborative Data Publishing Data Mining Java/J2ee 2013
19 Protecting Sensitive Labels in Social Network
Data Anonymization
Data Mining Java/J2ee 2013
20 Tweet Analysis for Real-Time Event Detection
and Earthquake
Data Mining Java/J2ee 2013
21 Robust Module-based Data Management Data Mining Java/J2ee 2013
22 A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud Computing
Systems
Data Mining Java/J2ee 2013
23 Spatial Approximate String Search Data Mining Java/J2ee 2013
24 Crowdsourcing Predictors of Behavioral
Outcomes
Data Mining Java/J2ee 2013
25 Optimizing Cloud Resources for Delivering
IPTV Services through Virtualization.
Networking Java/J2ee 2013
26 Participatory Privacy Enabling Privacy in
Participatory Sensing.
Networking Java/J2ee 2013

27 Dynamic Control of Coding for Progressive


Packet Arrivals in DTNs
Networking Java/J2ee 2013
28 Delay-Based Network Utility Maximization Networking Java/J2ee 2013
29 A Highly Scalable Key Pre-Distribution Scheme
for Wireless Sensor Networks
Networking Java/J2ee 2013
30 WARNINGBIRD: A Near Real-time Detection
System for Suspicious URLs in Twitter Stream
Secure
Computing
Java/J2ee 2013
31 Super-Resolution-based Inpainting Secure
Computing
Java/J2ee 2013
32
Spatial Approximate String Search
Secure
Computing
Java/J2ee 2013
33 Securing Class Initialization in Java-like
Languages
Secure
Computing
Java/J2ee 2013
34 Privacy Preserving Data Sharing With
Anonymous ID Assignment
Secure
Computing
Java/J2ee 2013
35 NICE: Network Intrusion Detection and
Countermeasure Selection in Virtual Network
Systems
Secure
Computing
Java/J2ee 2013
36 Modeling the Pairwise Key Predistribution
Scheme in the Presence of Unreliable Links
Secure
Computing
Java/J2ee 2013
37 Identity-Based Secure Distributed Data Storage
Schemes
Secure
Computing
Java/J2ee 2013
38 EAACKA Secure Intrusion-Detection System
for MANETs
Secure
Computing
Java/J2ee 2013
39 CAM: Cloud-Assisted Privacy Preserving
Mobile Health Monitoring
Secure
Computing
Java/J2ee 2013
40 Secure Encounter-based Mobile Social Networks
Requirements Designs and Tradeoffs
Secure
Computing
Java/J2ee 2013
41 Two tales of privacy in online social networks Secure
Computing
Java/J2ee 2013
42 Mobile Relay Configuration in Data-intensive
Wireless Sensor Networks
Mobile
Computing
Java/J2ee 2013
43 Vampire attacks:Draining life from wireless ad-
hoc sensor networks.
Mobile
Computing
Java/J2ee 2013

44 Content Sharing over Smartphone-Based Delay-


Tolerant Networks
Mobile
Computing
Java/J2ee 2013
45 DCIM: Distributed Cache Invalidation Method
for Maintaining Cache Consistency in Wireless
Mobile Networks
Mobile
Computing
Java/J2ee 2013
46 Discovery and Verification of Neighbor Positions
in Mobile Ad Hoc Networks
Mobile
Computing
Java/J2ee 2013
47 IP-Geolocation Mapping for Moderately
Connected Internet Regions
Parallel &
Distributor Sys
Java/J2ee 2013
48 A Secure Protocol for Spontaneous Wireless Ad
Hoc Networks Creation
Parallel &
Distributor Sys
Java/J2ee 2013
49 Enabling Dynamic Data and Indirect Mutual
Trust for Cloud Computing Storage Systems
Parallel &
Distributor Sys
Java/J2ee 2013
50 Optimal Client-Server Assignment for Internet
Distributed Systems
Parallel &
Distributor Sys
Java/J2ee 2013
51 Harnessing the Cloud for Securely Outsourcing
Large
Parallel &
Distributor Sys
Java/J2ee 2013
52 Mining Contracts for Business Events and
Temporal Constraints in Service Engagements
Parallel &
Distributor Sys
Java/J2ee 2013
53 Non-Cooperative Location Privacy Parallel &
Distributor Sys
Java/J2ee 2013
54 Collaboration in Multicloud Computing
Environments Framework and Security Issues
Cloud
Computing
Java/J2ee 2013
55 AMES-Cloud A Framework of Adaptive Mobile
Video Streaming and Efficient Social Video
Sharing in the Clouds
Cloud
Computing
Java/J2ee 2013
56 An Adaptive Opportunistic Routing Scheme for
Wireless Ad-hoc Networks
Networking Java/J2ee 2012
57 FireCol A Collaborative Protection Network for
the Detection of Flooding DDoS Attacks
Networking Java/J2ee 2012
58 Game-Theoretic Pricing for Video Streaming in
Mobile Networks
Networking Java/J2ee 2012
59 Optimizing Cloud Resources for Delivering
IPTV Services through Virtualization
Networking Java/J2ee 2012
60 Packet Loss Control Using Tokens Networking Java/J2ee 2012

61 Security Architecture for Cloud Networking Networking Java/J2ee 2012


62 Policy-by-Example for Online Social Networks Networking Java/J2ee 2012
63 Privacy- and Integrity-Preserving Range Queries
in Sensor Networks
Networking Java/J2ee 2012
64 TAM A Tiered Authentication of Multicast
Protocol for Ad-Hoc Networks
Adhoc Networks Java/J2ee 2012
65 Throughput and Energy Efficiency in Wireless
Ad Hoc Networks with Gaussian Channels
Adhoc Networks Java/J2ee 2012
66 Cloud Computing Security From Single to Multi-
Clouds
Cloud
Computing
Java/J2ee 2012
67 Cloud Data Production for Masses Cloud
Computing
Java/J2ee 2012
68 Costing of Cloud Computing Services A Total
Cost of Ownership Approach
Cloud
Computing
Java/J2ee 2012
69 Ensuring Distributed Accountability for Data
Sharing in the Cloud
Cloud
Computing
Java/J2ee 2012
70 Privacy- and Integrity-Preserving Range Queries
in Sensor Networks
Cloud
Computing
Java/J2ee 2012
71 Reliable Re-encryption in Unreliable Clouds Cloud
Computing
Java/J2ee 2012
72 Fog Computing Mitigating Insider Data Theft
Attacks in the Cloud
Cloud
Computing
Java/J2ee 2012
73 Gossip-based Resource Management for Cloud
Environments
Cloud
Computing
Java/J2ee 2012
74 Advance Mining of Temporal High Utility
Itemse
Data Mining Java/J2ee 2012
75 An Exploration of Improving Collaborative
Recommender Systems via User-Item Subgroups
Data Mining Java/J2ee 2012
76 Automatic Discovery of Association Orders
between Name and Aliases from the Web using
Anchor Texts-based Co-occurrences
Data Mining Java/J2ee 2012
77 Confucius A Tool Supporting Collaborative
Scientific Workflow Composition
Data Mining Java/J2ee 2012

78 Efficient Computation of Range Aggregates


against Uncertain Location Based Queries
Data Mining Java/J2ee 2012
79 Efficient Extended Boolean Retrieval Data Mining Java/J2ee 2012
80 Framework for Personal Mobile Commerce
Pattern Mining and Prediction
Data Mining Java/J2ee 2012
81 Multiparty Access Control for Online Social
Networks Model and Mechanisms
Data Mining Java/J2ee 2012
82 On the Spectral Characterization and Scalable
Mining of Network Communities
Data Mining Java/J2ee 2012
83 Organizing User Search Histories Data Mining Java/J2ee 2012
84 Ranking Model Adaptation for Domain-Specific
Search
Data Mining Java/J2ee 2012
85 Slicing A New Approach to Privacy Preserving
Data Publishing
Data Mining Java/J2ee 2012
86 Statistical Entity Extraction from Web Data Mining Java/J2ee 2012
87 Fast Data Collection in Tree-Based Wireless
Sensor Networks
Mobile
Computing
Java/J2ee 2012
88 Learn to Personalized Image Search from the
Photo Sharing Websites
Multimedia Java/J2ee 2012
89 Trust modeling in social tagging of multimedia
content
Multimedia Java/J2ee 2012
90 Privacy- and Integrity-Preserving Range Queries
in Sensor Networks
Parallel & Dist
System
Java/J2ee 2012
91 DoubleGuard Detecting Intrusions In Multi-tier
Web Applications
Secure
Computing
Java/J2ee 2012
92 Ensuring Distributed Accountability for Data
Sharing in the Cloud
Secure
Computing
Java/J2ee 2012
93 Online Modeling of Proactive Moderation
System for Auction Fraud Detection
Secure
Computing
Java/J2ee 2012
94 Packet-Hiding Methods for Preventing Selective Secure
Computing
Java/J2ee 2012
95 Risk-Aware Mitigation Secure
Computing
Java/J2ee 2012


96 An Adaptive Opportunistic Routing Scheme for
Wireless Ad-hoc Networks
Wireless
Communication
Java/J2ee 2012
97 Cut Detection in Wireless Sensor Networks Wireless
Communication
Java/J2ee 2012
98 PerLa a Language and Middleware Architecture Java/J2ee 2012
99 Advance mining of temporal hign utility Itemset Java/J2ee 2012
100 Automatic Discovery of Association Orders
between Name and Aliases from the Web using
Anchor Texts-based Co-occurrences
Java/J2ee 2012
101 Cloud Computing Security From Single to Multi-
Clouds
Java/J2ee 2012
102 Trickle DNS Bootstrapping DNS Security using
Social Trust
Java/J2ee 2012

Você também pode gostar