Sunteți pe pagina 1din 4

IEEE 2014 PROJECTS

S.N
o

Code

Title

Category

LSJ1401

A Hybrid Cloud Approach for Secure Authorized


Reduplications

Cloud Computing

JAVA

LSJ1402

Behavioral Malware Detection in Delay Tolerant


Networks

Parallel &
Distributed
Systems

JAVA

LSJ1403

Cloud Computing

JAVA

LSJ1404

Cloud Computing

JAVA

LSJ1405

Cloud Computing

JAVA

LSJ1406

Cloud Computing

JAVA

LSJ1407

Cloud Computing

JAVA

LSJ1408

Cloud Computing

JAVA

LSJ1409

Cloud Computing

JAVA

10

LSJ1410

Cloud Computing

JAVA

11

LSJ1411

Cloud Computing

JAVA

12

LSJ1412

Cloud Computing

JAVA

13

LSJ1413

Cloud Computing

JAVA

14

LSJ1414

Data Mining

JAVA

15

LSJ1415

Data Mining

JAVA

16

LSJ1416

Data Mining

JAVA

17

LSJ1417

Data Mining

JAVA

18

LSJ1418

Data Mining

JAVA

19

LSJ1419

Data Mining

JAVA

20

LSJ1420

Data Mining

JAVA

21

LSJ1421

Data Mining

JAVA

22
23

LSJ1422
LSJ1423

Data Mining
Data Mining

JAVA
JAVA

24

LSJ1424

Data Mining

JAVA

25

LSJ1425

Data Mining

JAVA

26

LSJ1426

Data Mining

JAVA

27

LSJ1427

Data Mining

JAVA

A Stochastic Model to Investigate Data Center


Performance and QoS in IaaS Cloud Computing Systems
Building Confidential and Efficient Query Services in the
Cloud with RASP Data Perturbation
Decentralized Access Control with Anonymous
Authentication of Data Stored in Clouds
Distributed, Concurrent, and Independent Access to
Encrypted Cloud Databases
Expressive, Efficient, and Revocable Data Access
Control for Multi Authority Cloud Storage
Key-Aggregate Cryptosystem for Scalable Data Sharing
in Cloud Storage
Oruta: Privacy-Preserving Public Auditing for Shared
Data in the Cloud
PACK Prediction-Based Cloud Bandwidth and Cost
Reduction System
Privacy Preserving Multi Keyword Ranked Search over
Encrypted Cloud Data
Scalable Distributed Service Integrity Attestation for
Software-as-a-Service Clouds
Towards Differential Query Services in Cost-Efficient
Clouds
A Cocktail Approach for Travel Package
Recommendation
Accuracy-Constrained Privacy Preserving Access
Control Mechanism for Relational Data
Best Peer++ A Peer-to-Peer Based Large-Scale Data
Processing Platform
Computing Multi-Dimensional Trust by Mining ECommerce Feedback Comments
Dealing With Concept Drifts in Process Mining
Discovering Emerging Topics in Social Streams via LinkAnomaly Detection
Efficient Prediction of Difficult Keyword Queries over
Databases
Facilitating Document Annotation Using Content and
Querying Value
Fast Nearest Neighbor Search with Keywords
Keyword Query Routing
Privacy-Preserving and Content-Protecting Location
Based Queries
Security Evaluation of Pattern Classifiers under Attack
Supporting Privacy Protection in Personalized Web
Search
Towards Online Shortest Path Computation

CONTACT: ARUNKUMAR (040-40274843, 9533694296)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

Tech

IEEE 2014 PROJECTS


Captcha as Graphical PasswordsA New Security
Primitive Based on Hard AI Problems
Efficient and Privacy Aware Data Aggregation in Mobile
Sensing
PROFILR Toward Preserving Privacy and Functionality in
Geo social Networks
Top-k Query Result Completeness Verification in Tiered
Sensor Networks
Automatic Test Packet Generation
Cost Effective Resource Allocation of Overlay Routing
Relay Nodes
Boundary Cutting for Packet Classification
Secure Data Retrieval For Decentralized DisruptionTolerant Military Networks

28

LSJ1428

29

LSJ1429

30

LSJ1430

31

LSJ1431

32

LSJ1432

33

LSJ1433

34

LSJ1434

35

LSJ1435

36

LSJ1436

37

LSJ1437

38

LSJ1438

39

LSJ1439

Multi-Path Routing and Forwarding in Non-Cooperative


Wireless Networks

40

LSJ1440

RRE: A Game-Theoretic Intrusion Response and


Recovery Engine

41

LSJ1441

Securing Broker-Less Publish Subscribe Systems Using


Identity-Based Encryption

42

LSJ1442

SOS A Distributed Mobile Q&A System Based on Social


Networks

43

LSJ1443

The Client Assignment Problem for Continuous


Distributed Interactive Applications Analysis,
Algorithms, and Eva

44

LSJ1444

The Design and Evaluation of An Information Sharing


System for Human Networks

45

LSJ1445

Traffic Pattern-Based Content Leakage Detection for


Trusted Content Delivery Networks

46

LSJ1446

Secure Outsourced Attribute-based Signatures

47

LSJ1447

48

LSJ1448

49

LSJ1449

50

LSJ1450

51

LSJ1451

52

LSJ1452

An Incentive Framework for Cellular Traffic Offloading


Cooperative Caching for Efficient Data Access in
Disruption Tolerant Networks
Efficient Authentication for Mobile and Pervasive
Computing
Friend book A Semantic-based Friend Recommendation
System for Social Networks
Optimal Distributed Malware Defense in Mobile
Networks with Heterogeneous Devices
Privacy-Enhanced Web Service Composition

Enabling Trustworthy Service Evaluation in ServiceOriented Mobile Social Networks


Consistency as a Service: Auditing Cloud Consistency
Learning and Recognition of On-Premise Signs from
Weakly Labeled Street View Images

Secure
Computing
Secure
Computing
Secure
Computing
Secure
Computing
Networking

JAVA
JAVA
JAVA
JAVA

Networking

JAVA

Networking

JAVA

Networking

JAVA

Parallel &
Distributed
Systems
Networking
Image Processing
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Parallel &
Distributed
Systems
Mobile Computing

JAVA
JAVA
JAVA
JAVA

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA

JAVA
JAVA

Mobile Computing

JAVA

Mobile Computing

JAVA

Mobile Computing

JAVA

Mobile Computing

JAVA

Service

JAVA

CONTACT: ARUNKUMAR (040-40274843, 9533694296)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

JAVA

IEEE 2014 PROJECTS

53

LSJ1453

Web Service Recommendation via Exploiting Location


and QoS Information

54

LSJ1454

A System for Denial-of-Service Attack Detection Based


on Multivariate Correlation Analysis

55

LSJ1455

56

LSJ1456

57

LSJ1457

58

LSJ1458

59

LSJ1459

60

LSJ1460

61

LSJ1461

62

LSJ1462

63
64

LSJ1463
LSJ1464

65

LSJ1465

66
67

LSJ1466
LSJ1467

68

LSJ1468

69

LSJ1469

70
71

LSJ1470
LSJ1471

72

LSJ1472

73

LSJ1473

74

LSJ1474

75

LSJ1475

76

LSJ1476

77

LSJ1477

78

LSJ1478

Secure Mining of Association Rules in Horizontally


Distributed Databases
Privacy Preserving Delegated Access Control in Public
Clouds
m-Privacy for Collaborative Data Publishing
Personalized Web Search Using Browsing History and
Domain
Knowledge
SocialTube: P2P-Assisted Video Sharing in Online Social
Networks
On the Use of Side Information for Mining Text Data
Secure kNN Query Processing in Untrusted Cloud
Environments
TrustedDB: A Trusted Hardware-Based Database with
Privacy and Data Confidentiality
XSPath: Navigation on XML Schemas Made Easy
Dynamic Query Forms for Database Queries
Video Dissemination over Hybrid Cellular and Ad Hoc
Networks
Mapping XML to a Wide Sparse Table
A Cloud Enviroment for Backup and Data Storage
Low-Priced and Energy-Efficient Detection of Replicas
for
Wireless Sensor Networks
Mining Weakly Labeled Web Facial Images for SearchBased Face Annotation
A Scientometric Analysis of Cloud Computing Literature
Best Keyword Cover Search
A Lightweight Encryption Scheme for Network-Coded
Mobile Ad Hoc Networks
Incremental Affinity Propagation Clustering Based on
Message Passing
A General Self-Organized Tree-Based Energy-Balance
Routing
Protocol for Wireless Sensor Network
Personalized Geo-Specific Tag Recommendation for
Photos on
Social Websites
A Social Compute Cloud: Allocating and Sharing
Infrastructure Resources via Social Networks
Image Search Reranking With Query-Dependent ClickBased
Relevance Feedback
Click Prediction for Web Image Reranking

Computing (Web
Service)
Service
Computing (Web
Service)
Parallel &
Distributed
Systems

JAVA

Data Mining

JAVA

Cloud Computing

JAVA

Data Mining

JAVA

Intelligent
Computing

JAVA

Parallel &
Distributed
Systems
Data Mining

JAVA
JAVA

Data Mining

JAVA

Data Mining

JAVA

Data Mining
Data Mining

JAVA
JAVA

Mobile Computing

JAVA

Data Mining
Cloud Computing

JAVA
JAVA

Secure
Computing

JAVA

Data Mining

JAVA

Cloud Computing
Data Mining
Parallel &
Distributed
Systems

JAVA
JAVA

Data Mining

JAVA

Networking

JAVA

Multimedia

JAVA

Service
Computing

JAVA

Image processing

JAVA

Image Processing

JAVA

CONTACT: ARUNKUMAR (040-40274843, 9533694296)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

JAVA

JAVA

IEEE 2014 PROJECTS

79

LSJ1479

80

LSJ1480

81

LSJ1481

82

LSJ1482

83

LSJ1483

84

LSJ1484

85

LSJ1485

86

LSJ1486

87

LSJ1487

Using Multimodal Sparse Coding


LARS*: An Efficient and Scalable Location-Aware
Recommender
System
A Two-stage Deonoymization Attack Against
Anonymized Social Networks
Privacy Preserving Enhance Collaborative Tagging
Shared Authority Based Privacy-preserving
Authentication Protocol in Cloud Computing
E-MACs: Towards More Secure and More Efficient
Constructions of Secure Channels
A Tag Encoding Scheme against Pollution Attack to
Linear Network Coding
Privacy-Preserving Optimal Meeting Location
Determination on Mobile Devices
Preserving location privacy in geo social application
Identity Based Distributed Provable Data Possession in
Multi Cloud Storage

Data Mining
Parallel &
Distributed
Systems
Data Mining
Parallel &
Distributed
Systems
Secure
Computing
Parallel &
Distributed
Systems

JAVA
JAVA
JAVA
JAVA
JAVA

Mobile Computing

JAVA

Mobile Computing

JAVA

Cloud Computing

JAVA

CONTACT: ARUNKUMAR (040-40274843, 9533694296)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

JAVA

S-ar putea să vă placă și