2014 ieee java and dotnet titles list final

14
CEGON TECHNOLOGIES B.Tech Projects CSE/IT (JAVA/.NET) S.No Project Code Project Title Domain Year A Novel Model for Competition and Cooperation(keerthi) Cloud computing 2014 1 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2014 2 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud Cloud Computing 2014 3 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing 2014 4 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Cloud Computing 2014 5 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing 2014 Rupaimidee Upstairs,TrunkRoad,Kavali. Contact us:7396555247 E-Mail:[email protected] Fb page: https://www.facebook.com/CEGONTECHNOLOGIES

Upload: cegon-technologies

Post on 15-Jul-2015

118 views

Category:

Engineering


3 download

TRANSCRIPT

Page 1: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

B.Tech Projects

CSE/IT (JAVA/.NET)

S.NoProject

CodeProject Title Domain Year

A Novel Model for Competition and Cooperation(keerthi)

Cloud computing

2014

1A Hybrid Cloud Approach for Secure

Authorized DeduplicationCloud

Computing2014

2A Scalable Two-Phase Top-Down

Specialization Approach forData Anonymization Using MapReduce on

Cloud

Cloud Computing

2014

3A Stochastic Model to Investigate Data

Center Performance and QoS in IaaS Cloud Computing Systems

Cloud Computing

2014

4Building Confidential and Efficient Query

Services in the Cloud with RASP Data Perturbation

Cloud Computing 2014

5Decentralized Access Control with Anonymous Authentication of Data

Stored in Clouds

Cloud Computing 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 2: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

6Distributed, Concurrent, and Independent

Access to Encrypted Cloud DatabasesCloud

Computing 2014

7Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud

Storage

Cloud Computing 2014

8Key-Aggregate Cryptosystem for

Scalable Data Sharing in Cloud StorageCloud

Computing2014

9Oruta: Privacy-Preserving Public Auditing

for Shared Data in the CloudCloud

Computing2014

10 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System

Cloud Computing

2014

11Privacy-Preserving Multi-Keyword Ranked

Search over Encrypted Cloud DataCloud

Computing2014

12Scalable Distributed Service Integrity

Attestation for Software-as-Service CloudsCloud

Computing2014

13Towards Differential Query Services in

Cost-Efficient CloudsCloud

Computing2014

14On the Knowledge Soundness of a

Cooperative Provable Data Possession Scheme in Multicloud Storage - Parallel

Distributed Systems

Cloud Computing

2014

15Privacy Preserving Back-Propagation

Neural Network Learning Made Practical with Cloud Computing

Cloud Computing

2014

16CLOUDQUAL A Quality Model for Cloud

ServicesCloud

Computing2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 3: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

17Enabling Smart Cloud Services Through

Remote Sensing An Internet of Everything Enabler

Cloud Computing

2014

18Quality of Service Provision in Cloud-based Storage System for Multimedia

Delivery

Cloud Computing

2014

19 A Cocktail Approach for Travel Package Recommendation

DATA MINING 2014

20Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational

Data

DATA MINING 2014

21BestPeer++: A Peer-to-Peer Based Large-

Scale Data Processing PlatformDATA MINING 2014

22 Data Mining with Big Data DATA MINING 2014

23Dealing With Concept Drifts in Process

MiningDATA

MINING 2014

24Discovering Emerging Topics in Social

Streams via Link-AnomalyDATA

MINING2014

25Efficient Prediction of Difficult Keyword

Queries over DatabasesDATA

MINING2014

26Facilitating Document Annotation Using

Content and Querying ValueDATA

MINING2014

27Fast Nearest Neighbor Search with

KeywordsDATA

MINING2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 4: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

28 Keyword Query RoutingDATA

MINING 2014

29Privacy-Preserving and Content-Protecting

Location Based QueriesDATA

MINING 2014

30Security Evaluation of Pattern Classifiers

under AttackDATA

MINING 2014

31Supporting Privacy Protection in

Personalized Web SearchDATA

MINING 2014

32 Towards Online Shortest Path ComputationDATA

MINING 2014

33Approximate Shortest Distance Computing:

A Query-Dependent Local Landmark Scheme

DATA MINING 2014

34LARS: An Efficient and Scalable Location-

Aware Recommender SystemDATA

MINING 2014

35Dynamic Query Forms for Database

QueriesDATA

MINING 2014

36Privacy Preserving Delegated Access

Control in Public CloudsDATA

MINING 2014

37m-Privacy for Collaborative Data

PublishingDATA

MINING 2014

38Scalable Keyword Search on Large RDF

DataDATA

MINING 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 5: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

39Decision Trees for Mining Data Streams Based on the Gaussian Approximation

DATA MINING 2014

40Captcha as Graphical Passwords—A

New Security Primitive Based on Hard AI Problems

SECURE COMPUTING 2014

41Efficient and Privacy-Aware Data

Aggregation in Mobile SensingSECURE

COMPUTING 2014

42PROFILR: Toward Preserving Privacy and

Functionality in Geosocial NetworksSECURE

COMPUTING 2014

43 Top-k Query Result Completeness Verification in Tiered Sensor Networks

SECURE COMPUTING

2014

44 Bandwidth Distributed Denial of Service: Attacks and Defenses

SECURE COMPUTING

2014

45 Automatic Test Packet Generation NETWORKING 2014

46 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes

NETWORKING 2014

47 Boundary Cutting for Packet Classification NETWORKING 2014

48 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

NETWORKING 2014

49 Hiding in the Mobile Crowd: Location Privacy through Collaboration

NETWORKING 2014

50A General Self-Organized Tree-Based Energy-Balance Routing Protocol for

Wireless Sensor Network

NETWORKING 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 6: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

51 Behavioral Malware Detection in Delay Tolerant Networks

NETWORKING 2014

52Secure Data Aggregation in Wireless

Sensor Networks Filtering out the Attacker’s Impact

NETWORKING 2014

53Joint Routing and Medium Access Control

in Fixed Random Access Wireless Multihop Networks

NETWORKING

2014

54Joint Routing and Resource Allocation for

Delay Minimization in Cognitive Radio Based Mesh Networks

NETWORKING 2014

55 Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks

NETWORKING 2014

56Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under

Falsified Data Injection Attack

NETWORKING 2014

57 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

58Exploiting Service Similarity for Privacy in Location-Based Search

Queries

PARALLEL &DISTRIBUTED

SYSTEMS2014

59LocaWard: A Security and Privacy Aware Location-Based Rewarding

System

PARALLEL &DISTRIBUTED

SYSTEMS2014

60On False Data-Injection Attacks against

Power System State Estimation: Modeling and Countermeasures

PARALLEL &DISTRIBUTED

SYSTEMS2014

61RRE: A Game-Theoretic Intrusion

Response and Recovery Engine

PARALLEL &DISTRIBUTED

SYSTEMS2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 7: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

62Securing Broker-Less

Publish/Subscribe Systems Using Identity- Based Encryption

PARALLEL &DISTRIBUTED

SYSTEMS2014

63SOS: A Distributed Mobile Q&A System

Based on Social Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

64

The Client Assignment Problem for Continuous Distributed Interactive

Applications: Analysis, Algorithms, and Evaluation

PARALLEL &DISTRIBUTED

SYSTEMS

2014

65The Design and Evaluation of An Information Sharing System for

Human Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

66Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery

Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

67Secure Outsourced Attribute-based

Signatures

PARALLEL &DISTRIBUTED

SYSTEMS2014

68A System for Denial-of-Service Attack

Detection Based on Multivariate Correlation Analysis

PARALLEL &DISTRIBUTED

SYSTEMS

2014

69Multi-Core Embedded Wireless Sensor

Networks Architecture and ApplicationsPARALLEL &DISTRIBUTED

SYSTEMS

2014

70Cross-Layer Approach for Minimizing

Routing Disruption in IP Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

71Multicast Capacity in MANET with

Infrastructure SupportPARALLEL &DISTRIBUTED

SYSTEMS2014

72Efficient Data Collection for Large-

Scale Mobile Monitoring Applications

PARALLEL &DISTRIBUTED

SYSTEMS2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 8: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

73Hop-by-Hop Message

Authenticationand Source Privacy in WirelessSensor Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

74Optimized multicast routing algorithm

based on tree structure in MANETsPARALLEL &DISTRIBUTED

SYSTEMS2014

75An Incentive Framework for Cellular

Traffic OffloadingMOBILE

COMPUTING2014

76 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

MOBILE COMPUTING

2014

77 Efficient Authentication for Mobile and Pervasive Computing

MOBILE COMPUTING

2014

78Friendbook: A Semantic-based Friend Recommendation System for Social

Networks

MOBILE COMPUTING

2014

79Optimal Distributed Malware Defense in

Mobile Networks with Heterogeneous Devices

MOBILE COMPUTING

2014

80Energy-Efficient Reliable Routing

Considering Residual Energy in Wireless Ad Hoc Networks

MOBILE COMPUTING

2014

81Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless

Networks

MOBILE COMPUTING

2014

82Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad

Hoc Networks

MOBILE COMPUTING

2014

83 Fairness Analysis of Routing in Opportunistic Mobile Networks

MOBILE COMPUTING

2014

84 Video Dissemination over Hybrid Cellular and Ad Hoc Networks

MOBILE COMPUTING

2014

85 Privacy-Enhanced Web Service Composition

SERVICE COMPUTING(Web Service)

2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 9: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

86 Web Service Recommendation via Exploiting Location and QoS Information

SERVICE COMPUTING(Web Service)

2014

87

Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation

- Information Forensics and Security

IMAGE PROCESSING

2014

88 Fingerprint Compression Based on Sparse Representation

IMAGE PROCESSING

2014

89Hierarchical Prediction and Context

Adaptive Coding for Lossless Color Image Compression

IMAGE PROCESSING

2014

90Congestion Aware Routing in Nonlinear

Elastic Optical NetworksNETWORKING

Security2014

91 Security Analysis of Handover Key Management in 4G LTESAE Networks

NETWORKING2014

92 Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey

NETWORKING2014

1A Geometric Deployment and Routing Scheme for Directional Wireless Mesh

Networks

NETWORKING 2014

2 Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication

NETWORKING 2014

3 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Network

NETWORKING 2014

4 Security Analysis of Handover Key Management in 4G LTESAE Networks

NETWORKING 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 10: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

5 Congestion Aware Routing in Nonlinear Elastic Optical Networks

NETWORKINGSECURITY

2014

6Joint Routing and Medium Access Control

in Fixed Random Access Wireless Multihop Networks

NETWORKINGSECURITY

2014

7 Cross-Layer Aided Energy-Efficient Opportunistic Routing in Ad Hoc Networks

NETWORKING 2014

8Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular

Networks

NETWORKING 2014

9Joint Routing and Resource Allocation for

Delay Minimization in Cognitive Radio Based Mesh Networks

NETWORKING 2014

10 Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks

NETWORKING 2014

11Network Resource Allocation for Users With Multiple Connections Fairness and

Stability

NETWORKING 2014

12 On the Delay Advantage of Coding in Packet Erasure Networks

NETWORKING 2014

13Content Caching and Scheduling in Wireless Networks With Elastic and

Inelastic Traffic

NETWORKING 2014

14 Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey

NETWORKING 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 11: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

15 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

NETWORKING 2014

16ALBA-R Load-Balancing Geographic Routing Around Connectivity Holes in

Wireless Sensor Networks

DATA MINING 2014

17R3E Reliable Reactive Routing

Enhancement for Wireless Sensor NetworksDATA

MINING 2014

18Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks

DATA MINING

PARALLEL &

2014

19Cross-Layer Approach for Minimizing

Routing Disruption in IP Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

20Multicast Capacity in MANET with

Infrastructure Support

PARALLEL &DISTRIBUTED

SYSTEMS2014

21Multi-Core Embedded Wireless Sensor

Networks Architecture and Applications

PARALLEL &DISTRIBUTED

SYSTEMS

2014

22Efficient Data Collection for Large-

Scale Mobile Monitoring Applications

PARALLEL &DISTRIBUTED

SYSTEMS2014

23Hop-by-Hop Message

Authenticationand Source Privacy in WirelessSensor Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

24Optimized multicast routing algorithm

based on tree structure in MANETsPARALLEL &DISTRIBUTED

SYSTEMS2014

25A Probabilistic Misbehavior Detection

Scheme toward Efficient Trust

Establishment in Delay-Tolerant Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 12: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

26 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation

Analysis

PARALLEL &DISTRIBUTED

SYSTEMS2014

27An Error-Minimizing Framework for

Localizing Jammers in Wireless NetworksPARALLEL &DISTRIBUTED

SYSTEMS2014

28Certificateless Remote Anonymous

Authentication Schemes for Wireless Body

Area Networks

PARALLEL &DISTRIBUTED

SYSTEMS2014

29Efficient Data Query in Intermittently-

Connected Mobile Ad Hoc Social NetworksPARALLEL &DISTRIBUTED

SYSTEMS2014

30Transmission-Efficient Clustering Method

for Wireless Sensor Networks Using

Compressive Sensing

PARALLEL &DISTRIBUTED

SYSTEMS2014

31Web Image Re-Ranking Using Query-

Specific Semantic Signatures

PATTERN ANALYSIS &

MACHINE INTELLIGENC

2014

32A QoS-Oriented Distributed Routing

Protocol for Hybrid Wireless NetworksMOBILE

COMPUTING 2014

33PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc

Networks

MOBILE COMPUTING

2014

34Video Dissemination over Hybrid Cellular

and Ad Hoc NetworksMOBILE

COMPUTING2014

35 Autonomous Mobile Mesh NetworksMOBILE

COMPUTING 2014

36DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile

Underwater Sensor Networks

MOBILE COMPUTING 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 13: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES

37Leveraging Social Networks for P2P

Content-Based File Sharing in Disconnected MANETs

MOBILE COMPUTING 2014

38 Preserving Location Privacy in Geosocial Applications

MOBILE COMPUTING 2014

39 D1439 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions

CLOUD COMPUTING 2014

40 D1440 Building Confidential and Efficient Query Services in the Cloud with RASP Data

Perturbation

CLOUD COMPUTING 2014

41 D1441 Consistency as a Service: Auditing Cloud Consistency

CLOUD COMPUTING 2014

42 D1442 Decentralized Access Control with Anonymous Authentication of Data Stored in

Clouds

CLOUD COMPUTING 2014

43 D1443 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases

CLOUD COMPUTING 2014

44 D1444 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage:

Theory and Implementation

CLOUD COMPUTING 2014

45D1445 Identity-Based Distributed Provable Data

Possession in Multi- Cloud StorageCLOUD

COMPUTING 2014

46 D1446 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

CLOUD COMPUTING 2014

47 D1447 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

CLOUD COMPUTING 2014

48 D1448 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

CLOUD COMPUTING 2014

49 D1449 Scalable Distributed Service Integrity Attestation for Software-asa- Service

Clouds

CLOUD COMPUTING 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES

Page 14: 2014 ieee  java and dotnet titles list final

CEGON TECHNOLOGIES 51 D1451 A Cocktail Approach for Travel Package

RecommendationDATA MINING

2014

52 D1452 An Empirical Performance Evaluation of Relational Keyword Search Techniques

DATA MINING2014

53 D1453 LARS*: An Efficient and Scalable Location-Aware Recommender System

DATA MINING2014

54 D1454 Product Aspect Ranking and Its Applications DATA MINING2014

55 D1455 Secure Mining of Association Rules in Horizontally Distributed Databases

DATA MINING2014

56 D1456 Supporting Privacy Protection in Personalized Web Search

DATA MINING2014

57 D1457 A Cocktail Approach for Travel Package Recommendation

DATA MINING2014

58 D1458 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data

Confidentiality

DATA MINING2014

59 D1459 Typicality-Based Collaborative Filtering Recommendation

DATA MINING2014

60 D1460 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI

Problems

SECURE COMPUTING 2014

61 D1461 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding

IMAGE PROCESSING 2014

62 D1462 Designing an Efficient Image Encryption-Then-Compression System via Prediction

Error Clustering and Random Perm

IMAGE PROCESSING 2014

Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247

E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES