2014 ieee java and dotnet titles list final
TRANSCRIPT
CEGON TECHNOLOGIES
B.Tech Projects
CSE/IT (JAVA/.NET)
S.NoProject
CodeProject Title Domain Year
A Novel Model for Competition and Cooperation(keerthi)
Cloud computing
2014
1A Hybrid Cloud Approach for Secure
Authorized DeduplicationCloud
Computing2014
2A Scalable Two-Phase Top-Down
Specialization Approach forData Anonymization Using MapReduce on
Cloud
Cloud Computing
2014
3A Stochastic Model to Investigate Data
Center Performance and QoS in IaaS Cloud Computing Systems
Cloud Computing
2014
4Building Confidential and Efficient Query
Services in the Cloud with RASP Data Perturbation
Cloud Computing 2014
5Decentralized Access Control with Anonymous Authentication of Data
Stored in Clouds
Cloud Computing 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
6Distributed, Concurrent, and Independent
Access to Encrypted Cloud DatabasesCloud
Computing 2014
7Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
Cloud Computing 2014
8Key-Aggregate Cryptosystem for
Scalable Data Sharing in Cloud StorageCloud
Computing2014
9Oruta: Privacy-Preserving Public Auditing
for Shared Data in the CloudCloud
Computing2014
10 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
Cloud Computing
2014
11Privacy-Preserving Multi-Keyword Ranked
Search over Encrypted Cloud DataCloud
Computing2014
12Scalable Distributed Service Integrity
Attestation for Software-as-Service CloudsCloud
Computing2014
13Towards Differential Query Services in
Cost-Efficient CloudsCloud
Computing2014
14On the Knowledge Soundness of a
Cooperative Provable Data Possession Scheme in Multicloud Storage - Parallel
Distributed Systems
Cloud Computing
2014
15Privacy Preserving Back-Propagation
Neural Network Learning Made Practical with Cloud Computing
Cloud Computing
2014
16CLOUDQUAL A Quality Model for Cloud
ServicesCloud
Computing2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
17Enabling Smart Cloud Services Through
Remote Sensing An Internet of Everything Enabler
Cloud Computing
2014
18Quality of Service Provision in Cloud-based Storage System for Multimedia
Delivery
Cloud Computing
2014
19 A Cocktail Approach for Travel Package Recommendation
DATA MINING 2014
20Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational
Data
DATA MINING 2014
21BestPeer++: A Peer-to-Peer Based Large-
Scale Data Processing PlatformDATA MINING 2014
22 Data Mining with Big Data DATA MINING 2014
23Dealing With Concept Drifts in Process
MiningDATA
MINING 2014
24Discovering Emerging Topics in Social
Streams via Link-AnomalyDATA
MINING2014
25Efficient Prediction of Difficult Keyword
Queries over DatabasesDATA
MINING2014
26Facilitating Document Annotation Using
Content and Querying ValueDATA
MINING2014
27Fast Nearest Neighbor Search with
KeywordsDATA
MINING2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
28 Keyword Query RoutingDATA
MINING 2014
29Privacy-Preserving and Content-Protecting
Location Based QueriesDATA
MINING 2014
30Security Evaluation of Pattern Classifiers
under AttackDATA
MINING 2014
31Supporting Privacy Protection in
Personalized Web SearchDATA
MINING 2014
32 Towards Online Shortest Path ComputationDATA
MINING 2014
33Approximate Shortest Distance Computing:
A Query-Dependent Local Landmark Scheme
DATA MINING 2014
34LARS: An Efficient and Scalable Location-
Aware Recommender SystemDATA
MINING 2014
35Dynamic Query Forms for Database
QueriesDATA
MINING 2014
36Privacy Preserving Delegated Access
Control in Public CloudsDATA
MINING 2014
37m-Privacy for Collaborative Data
PublishingDATA
MINING 2014
38Scalable Keyword Search on Large RDF
DataDATA
MINING 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
39Decision Trees for Mining Data Streams Based on the Gaussian Approximation
DATA MINING 2014
40Captcha as Graphical Passwords—A
New Security Primitive Based on Hard AI Problems
SECURE COMPUTING 2014
41Efficient and Privacy-Aware Data
Aggregation in Mobile SensingSECURE
COMPUTING 2014
42PROFILR: Toward Preserving Privacy and
Functionality in Geosocial NetworksSECURE
COMPUTING 2014
43 Top-k Query Result Completeness Verification in Tiered Sensor Networks
SECURE COMPUTING
2014
44 Bandwidth Distributed Denial of Service: Attacks and Defenses
SECURE COMPUTING
2014
45 Automatic Test Packet Generation NETWORKING 2014
46 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
NETWORKING 2014
47 Boundary Cutting for Packet Classification NETWORKING 2014
48 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
NETWORKING 2014
49 Hiding in the Mobile Crowd: Location Privacy through Collaboration
NETWORKING 2014
50A General Self-Organized Tree-Based Energy-Balance Routing Protocol for
Wireless Sensor Network
NETWORKING 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
51 Behavioral Malware Detection in Delay Tolerant Networks
NETWORKING 2014
52Secure Data Aggregation in Wireless
Sensor Networks Filtering out the Attacker’s Impact
NETWORKING 2014
53Joint Routing and Medium Access Control
in Fixed Random Access Wireless Multihop Networks
NETWORKING
2014
54Joint Routing and Resource Allocation for
Delay Minimization in Cognitive Radio Based Mesh Networks
NETWORKING 2014
55 Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks
NETWORKING 2014
56Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under
Falsified Data Injection Attack
NETWORKING 2014
57 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
58Exploiting Service Similarity for Privacy in Location-Based Search
Queries
PARALLEL &DISTRIBUTED
SYSTEMS2014
59LocaWard: A Security and Privacy Aware Location-Based Rewarding
System
PARALLEL &DISTRIBUTED
SYSTEMS2014
60On False Data-Injection Attacks against
Power System State Estimation: Modeling and Countermeasures
PARALLEL &DISTRIBUTED
SYSTEMS2014
61RRE: A Game-Theoretic Intrusion
Response and Recovery Engine
PARALLEL &DISTRIBUTED
SYSTEMS2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
62Securing Broker-Less
Publish/Subscribe Systems Using Identity- Based Encryption
PARALLEL &DISTRIBUTED
SYSTEMS2014
63SOS: A Distributed Mobile Q&A System
Based on Social Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
64
The Client Assignment Problem for Continuous Distributed Interactive
Applications: Analysis, Algorithms, and Evaluation
PARALLEL &DISTRIBUTED
SYSTEMS
2014
65The Design and Evaluation of An Information Sharing System for
Human Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
66Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery
Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
67Secure Outsourced Attribute-based
Signatures
PARALLEL &DISTRIBUTED
SYSTEMS2014
68A System for Denial-of-Service Attack
Detection Based on Multivariate Correlation Analysis
PARALLEL &DISTRIBUTED
SYSTEMS
2014
69Multi-Core Embedded Wireless Sensor
Networks Architecture and ApplicationsPARALLEL &DISTRIBUTED
SYSTEMS
2014
70Cross-Layer Approach for Minimizing
Routing Disruption in IP Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
71Multicast Capacity in MANET with
Infrastructure SupportPARALLEL &DISTRIBUTED
SYSTEMS2014
72Efficient Data Collection for Large-
Scale Mobile Monitoring Applications
PARALLEL &DISTRIBUTED
SYSTEMS2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
73Hop-by-Hop Message
Authenticationand Source Privacy in WirelessSensor Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
74Optimized multicast routing algorithm
based on tree structure in MANETsPARALLEL &DISTRIBUTED
SYSTEMS2014
75An Incentive Framework for Cellular
Traffic OffloadingMOBILE
COMPUTING2014
76 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
MOBILE COMPUTING
2014
77 Efficient Authentication for Mobile and Pervasive Computing
MOBILE COMPUTING
2014
78Friendbook: A Semantic-based Friend Recommendation System for Social
Networks
MOBILE COMPUTING
2014
79Optimal Distributed Malware Defense in
Mobile Networks with Heterogeneous Devices
MOBILE COMPUTING
2014
80Energy-Efficient Reliable Routing
Considering Residual Energy in Wireless Ad Hoc Networks
MOBILE COMPUTING
2014
81Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless
Networks
MOBILE COMPUTING
2014
82Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad
Hoc Networks
MOBILE COMPUTING
2014
83 Fairness Analysis of Routing in Opportunistic Mobile Networks
MOBILE COMPUTING
2014
84 Video Dissemination over Hybrid Cellular and Ad Hoc Networks
MOBILE COMPUTING
2014
85 Privacy-Enhanced Web Service Composition
SERVICE COMPUTING(Web Service)
2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
86 Web Service Recommendation via Exploiting Location and QoS Information
SERVICE COMPUTING(Web Service)
2014
87
Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation
- Information Forensics and Security
IMAGE PROCESSING
2014
88 Fingerprint Compression Based on Sparse Representation
IMAGE PROCESSING
2014
89Hierarchical Prediction and Context
Adaptive Coding for Lossless Color Image Compression
IMAGE PROCESSING
2014
90Congestion Aware Routing in Nonlinear
Elastic Optical NetworksNETWORKING
Security2014
91 Security Analysis of Handover Key Management in 4G LTESAE Networks
NETWORKING2014
92 Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey
NETWORKING2014
1A Geometric Deployment and Routing Scheme for Directional Wireless Mesh
Networks
NETWORKING 2014
2 Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication
NETWORKING 2014
3 Sleep Scheduling for Geographic Routing in Duty-Cycled Mobile Sensor Network
NETWORKING 2014
4 Security Analysis of Handover Key Management in 4G LTESAE Networks
NETWORKING 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
5 Congestion Aware Routing in Nonlinear Elastic Optical Networks
NETWORKINGSECURITY
2014
6Joint Routing and Medium Access Control
in Fixed Random Access Wireless Multihop Networks
NETWORKINGSECURITY
2014
7 Cross-Layer Aided Energy-Efficient Opportunistic Routing in Ad Hoc Networks
NETWORKING 2014
8Joint Interference Coordination and Load Balancing for OFDMA Multihop Cellular
Networks
NETWORKING 2014
9Joint Routing and Resource Allocation for
Delay Minimization in Cognitive Radio Based Mesh Networks
NETWORKING 2014
10 Joint Topology-Transparent Scheduling and QoS Routing in Ad Hoc Networks
NETWORKING 2014
11Network Resource Allocation for Users With Multiple Connections Fairness and
Stability
NETWORKING 2014
12 On the Delay Advantage of Coding in Packet Erasure Networks
NETWORKING 2014
13Content Caching and Scheduling in Wireless Networks With Elastic and
Inelastic Traffic
NETWORKING 2014
14 Distributed Mobile Sink Routing for Wireless Sensor Networks A Survey
NETWORKING 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
15 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
NETWORKING 2014
16ALBA-R Load-Balancing Geographic Routing Around Connectivity Holes in
Wireless Sensor Networks
DATA MINING 2014
17R3E Reliable Reactive Routing
Enhancement for Wireless Sensor NetworksDATA
MINING 2014
18Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks
DATA MINING
PARALLEL &
2014
19Cross-Layer Approach for Minimizing
Routing Disruption in IP Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
20Multicast Capacity in MANET with
Infrastructure Support
PARALLEL &DISTRIBUTED
SYSTEMS2014
21Multi-Core Embedded Wireless Sensor
Networks Architecture and Applications
PARALLEL &DISTRIBUTED
SYSTEMS
2014
22Efficient Data Collection for Large-
Scale Mobile Monitoring Applications
PARALLEL &DISTRIBUTED
SYSTEMS2014
23Hop-by-Hop Message
Authenticationand Source Privacy in WirelessSensor Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
24Optimized multicast routing algorithm
based on tree structure in MANETsPARALLEL &DISTRIBUTED
SYSTEMS2014
25A Probabilistic Misbehavior Detection
Scheme toward Efficient Trust
Establishment in Delay-Tolerant Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
26 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation
Analysis
PARALLEL &DISTRIBUTED
SYSTEMS2014
27An Error-Minimizing Framework for
Localizing Jammers in Wireless NetworksPARALLEL &DISTRIBUTED
SYSTEMS2014
28Certificateless Remote Anonymous
Authentication Schemes for Wireless Body
Area Networks
PARALLEL &DISTRIBUTED
SYSTEMS2014
29Efficient Data Query in Intermittently-
Connected Mobile Ad Hoc Social NetworksPARALLEL &DISTRIBUTED
SYSTEMS2014
30Transmission-Efficient Clustering Method
for Wireless Sensor Networks Using
Compressive Sensing
PARALLEL &DISTRIBUTED
SYSTEMS2014
31Web Image Re-Ranking Using Query-
Specific Semantic Signatures
PATTERN ANALYSIS &
MACHINE INTELLIGENC
2014
32A QoS-Oriented Distributed Routing
Protocol for Hybrid Wireless NetworksMOBILE
COMPUTING 2014
33PSR A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc
Networks
MOBILE COMPUTING
2014
34Video Dissemination over Hybrid Cellular
and Ad Hoc NetworksMOBILE
COMPUTING2014
35 Autonomous Mobile Mesh NetworksMOBILE
COMPUTING 2014
36DA-Sync: A Doppler-Assisted Time-Synchronization Scheme for Mobile
Underwater Sensor Networks
MOBILE COMPUTING 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES
37Leveraging Social Networks for P2P
Content-Based File Sharing in Disconnected MANETs
MOBILE COMPUTING 2014
38 Preserving Location Privacy in Geosocial Applications
MOBILE COMPUTING 2014
39 D1439 Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
CLOUD COMPUTING 2014
40 D1440 Building Confidential and Efficient Query Services in the Cloud with RASP Data
Perturbation
CLOUD COMPUTING 2014
41 D1441 Consistency as a Service: Auditing Cloud Consistency
CLOUD COMPUTING 2014
42 D1442 Decentralized Access Control with Anonymous Authentication of Data Stored in
Clouds
CLOUD COMPUTING 2014
43 D1443 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
CLOUD COMPUTING 2014
44 D1444 Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage:
Theory and Implementation
CLOUD COMPUTING 2014
45D1445 Identity-Based Distributed Provable Data
Possession in Multi- Cloud StorageCLOUD
COMPUTING 2014
46 D1446 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CLOUD COMPUTING 2014
47 D1447 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud
CLOUD COMPUTING 2014
48 D1448 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
CLOUD COMPUTING 2014
49 D1449 Scalable Distributed Service Integrity Attestation for Software-asa- Service
Clouds
CLOUD COMPUTING 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES
CEGON TECHNOLOGIES 51 D1451 A Cocktail Approach for Travel Package
RecommendationDATA MINING
2014
52 D1452 An Empirical Performance Evaluation of Relational Keyword Search Techniques
DATA MINING2014
53 D1453 LARS*: An Efficient and Scalable Location-Aware Recommender System
DATA MINING2014
54 D1454 Product Aspect Ranking and Its Applications DATA MINING2014
55 D1455 Secure Mining of Association Rules in Horizontally Distributed Databases
DATA MINING2014
56 D1456 Supporting Privacy Protection in Personalized Web Search
DATA MINING2014
57 D1457 A Cocktail Approach for Travel Package Recommendation
DATA MINING2014
58 D1458 TrustedDB: A Trusted Hardware-Based Database with Privacy and Data
Confidentiality
DATA MINING2014
59 D1459 Typicality-Based Collaborative Filtering Recommendation
DATA MINING2014
60 D1460 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI
Problems
SECURE COMPUTING 2014
61 D1461 Click Prediction for Web Image Reranking Using Multimodal Sparse Coding
IMAGE PROCESSING 2014
62 D1462 Designing an Efficient Image Encryption-Then-Compression System via Prediction
Error Clustering and Random Perm
IMAGE PROCESSING 2014
Rupaimidee Upstairs,TrunkRoad,Kavali.Contact us:7396555247
E-Mail:[email protected] page: https://www.facebook.com/CEGONTECHNOLOGIES