Você está na página 1de 5

2014 - 2015 JAVA IEEE FINAL YEAR PROJECTS @ SOFTMERGE SOLUTIONS PVT.

LTD

S.NO

IEEE 2014 JAVA PROJECT TITLES

DOMAIN

YEAR

Cloud Computing

2014-15

Cloud Computing

2014-15

Decentralized Access Control with Anonymous


Authentication of Data Stored in Clouds

Modeling of Distributed File Systems for Practical Performance Analysis

Balancing Performance, Accuracy, and Precision


for Secure Cloud Transactions

Cloud Computing

2014-15

A Scalable Two-Phase Top-Down Specialization Approach


for Data Anonymization Using Map Reduce on Cloud

Cloud Computing

2014-15

A Hybrid Cloud Approach for Secure Authorized Deduplication

Cloud Computing

2014-15

A Stochastic Model to Investigate Data Center Performance


and QoS in IaaS Cloud Computing Systems

Cloud Computing

2014-15

Building Confidential and Efficient Query Services in the Cloud


with RASP Data Perturbation

Cloud Computing

2014-15

Distributed, Concurrent, and Independent Access to


Encrypted Cloud Databases

Cloud Computing

2014-15

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Cloud Computing

2014-15

10

Privacy-Preserving Public Auditing for Shared Data in the Cloud

Cloud Computing

2014-15

11

Scalable Distributed Service Integrity Attestation for


Software-as-a-Service Clouds

Cloud Computing

2014-15

12

Towards Differential Query Services in Cost-Efficient Clouds

Cloud Computing

2014-15

13

Scalable Analytics for IaaS Cloud Availability

Cloud Computing

2014-15

14

Transformation-Based Monetary Cost Optimizations for Workflows


in the Cloud

Cloud Computing

2014-15

15

Data Similarity-Aware Computation Infrastructure for the Cloud

16

Cloud Computing

2014-15

Probabilistic Consolidation of Virtual Machines in Self-Organizing Cloud Data


Centers

Cloud Computing

2014-15

17

An Efficient and Trustworthy Resource Sharing Platform for Collaborative


Cloud Computing

Cloud Computing

2014-15

18

Expressive, Efficient,and revocable data access control for multi-authority cloud storage

Cloud Computing

2014-15

19

An Incentive Framework for Cellular Traffic Offloading

Mobile Computing

2014-15

20

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

Mobile Computing

2014-15

21

Efficient Authentication for Mobile and Pervasive Computing

Mobile Computing

2014-15

22

Friendbook A Semantic-based Friend Recommendation System for Social


Networks

Mobile Computing

2014-15

23

Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous


Devices

Mobile Computing

2014-15

24

A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks

Mobile Computing

2014-15

25

Preserving Location Privacy in Geosocial Applications

Mobile Computing

2014-15

26

Cooperative Spectrum Sharing: A Contract-Based Approach

Mobile Computing

2014-15

27

A Fade Level-Based Spatial Model for Radio Tomographic Imaging

Mobile Computing

2014-15

28

(E^{2}D) Wi-Fi: A Mechanism to Achieve Energy Efficient Discovery in Wi-Fi

Mobile Computing

2014-15

29

Fault Tolerant Localization and Tracking of Multiple Sources in WSNs


Using Binary Data

Mobile Computing

2014-15

30

Facilitating Document Annotation Using Content and Querying Value

Data Mining

2014-15

31

An Empirical Performance Evaluation of Relational Keyword Search Techniques

Data Mining

2014-15

32

Keyword Query Routing

33

Active Learning of Constraints for Semi-Supervised Clustering

34

Supporting Privacy Protection in Personalized Web Search

35

Privacy-Preserving Enhanced Collaborative Tagging

36

Discovering Emerging Topics in Social Streams via Link-Anomaly Detection

37

Product Aspect Ranking and Its Applications

38

A Cocktail Approach for Travel Package Recommendation

39

Data Mining with Big Data

40

Security Evaluation of Pattern Classifiers under Attack

41

Towards Online Shortest Path Computation

42

A Probabilistic Approach to String Transformation

43

A fast clustering based feature subset selection algorithm for high dimensional data

44

Automatic Test Packet Generation

45

Cost-Effective Resource Allocation of Overlay Routing Relay Nodes

46

Boundary Cutting for Packet Classification

47

SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT


MILITARY NETWORKS

48

Green Networking With Packet Processing Engines: Modeling and Optimization

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Data Mining

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

49

On Sample-Path Optimal Dynamic Scheduling for Sum-Queue


Minimization in Forests

50

PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

51

Enabling Trustworthy Service Evaluation in Service-Oriented Mobile


Social Networks

52

A Tag Encoding Scheme against Pollution Attack to Linear Network Coding

53

Exploiting Service Similarity for Privacy in Location-Based Search Queries

54

Network Coding Aware Cooperative MAC Protocol for Wireless Ad Hoc Networks

55

A System for Denial-of-Service Attack Detection Based on Multivariate


Correlation Analysis

56

A Cross-Layer Backpressure Architecture for Wireless Multihop Networks

57

Streaming Solutions for Fine-Grained Network Traffic Measurements


and Analysis

58

An Error Minimizing Framework for Localizing Jammers in Wireless Networks

59

Secure and Efficient Data Transmission for Cluster-based Wireless


Sensor Networks

60

Fair Scheduling in Cellular Systems in the Presence of Noncooperative Mobiles

61

Network Resource Allocation for Users With Multiple Connections:


Fairness and Stability

62

LBDB: Localized boundary detection and parametrization for 3-D sensor networks

63

An-Adaptive-Video-Streaming-Control-SystemAn-Adaptive-Video-StreamingControl-System

64

65

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Networking

2014-15

Captcha as Graphical PasswordsA New Security Primitive Based on Hard AI


Problems

Dependable and
Secure Computing

2014-15

Efficient and Privacy-Aware Data Aggregation in Mobile Sensing

Dependable and
Secure Computing

2014-15

66

PROFIL-R Toward Preserving Privacy and Functionality in Geosocial Networks

Dependable and
Secure Computing

2014-15

67

Top-k Query Result Completeness Verification in Tiered Sensor Networks

Dependable and
Secure Computing

2014-15

68

Secure Two-Party Differentially Private Data Release for Vertically


Partitioned Data

Dependable and
Secure Computing

2014-15

69

Generating Summary Risk Scores for Mobile Applications

Dependable and
Secure Computing

2014-15

70

Security Games for Node Localization through Verifiable Multilateration

Dependable and
Secure Computing

2014-15

71

Large Discriminative Structured Set Prediction Modeling With Max-Margin


Markov Network for Lossless Image Coding

Image Processing

2014-15

72

Multi-Illuminant Estimation With Conditional Random Fields

Image Processing

2014-15

73

Saliency-Aware Video Compression

Image Processing

2014-15

74

Translation Invariant Directional Framelet Transform Combined With Gabor


Filters for Image Denoising

Image Processing

2014-15

75

Vector-Valued Image Processing by Parallel Level Sets

Image Processing

2014-15

Image Processing

2014-15

Image Processing

2014-15

Designing an efficient image encryption-then compression system via prediction


76
error clustering and random permutations
77

Attribute-Based access to scalable media in cloud-assisted content sharing networks

CONTACT

: N.BHARGAV

Mobile: 9493049639
Email:softmergeprojects@gmail.com
SOFTMERGE SOLUTIONS PVT LTD

Você também pode gostar