ieee 2013
DESCRIPTION
IEEE 2013TRANSCRIPT
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
JAVA APPLICATION PROJECTS
S.no Project Title
1 E-Fraud Prevention based on the Self-Authentication of e-Documents .
2 Multi New Product Survey Management .
3 Recommendation System Based On Web Usage Mining and Semantic Web A Survey
4 Municipal Administration System.
5 Distributed Data Integration on Electricity Board
6 Key Management for Content Integration
7 Nearest Shopping Location Identification Systems
8 Query Response System for File Management
9 Voting System for Web Library
10 Web Page re-Ranking System for Library
11 Online Advertising System
12 Web Usage Mining
13 Leave Management For MNC
14 Multi New Product Survey Management
15 Advance Airline Reservation System
16 E-Learning
17 Human Assurance Administration
18 Manifold Entrust Scheme
19 High level network Security Using Packet Filtering
20 Online Auction Bit
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
21 Global Counselling System
22 Implementation and Validating Environmental and Health
23 Military Equipment Rental Systems
24 Virtual classroom system
25 Confined Web Spider
26 Automation of IT Process and Management.
27 Company information Tracking System(CITS).
28 Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing.
29 Ensuring Data Storage Security in Cloud Computing.
30 E-Online job Recruitment.
31 ERP.
32 Freelancer Job.
34 Inter Bank Fund Transfer in Distributed Network.
35 Online Rental House Web Portal.
36 Sms Topup.
37 Wireless healthcare system.
38 E-Tutor Online Jobs.
39 Credit card System.
40 Employee Management System.
41 Online University.
42 Web Eye.
43 Online Examination System.
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
44 BPO Call center.
45 Mailing System.
46 High level network Security Using Packet Filtering.
47 Location-Based Spatial Query Processing with Data Sharing in Wireless Broadcast Environments.
48 Mobility Management Approaches for Mobile IP Networks.
49 Modeling & Automated Containment of Worms.
50 Online Index Recommendations For High-Dimensional Databases Using Query Workloads.
51 Protection of Database Security via Collaborative Inference Detection.
52 Global Counseling System .
53 Project Work Tracking System .
54 Mobile Banking System (WAP).
55 Pre-paid Recharging System on Banking.
56 Wireless Helthcare Prescription System.
57 Secure SMS Transaction System on banking (j2me).
58 Online Real Estate Property Management.
59 Work Order System for Call Center.
60 E-Crime File Management System.
61 E-Online Recruitment System.
62 Company Information Tracking System(CITS).
63 Inter Bank Fund Transfer in Distributed Network.
64 Automation Of Project and Process Management.
65 Credit Card Management System.
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
66 Encrypted IT Auditing on Cloud Computing.
67 Corporate Security Reporting System(CSRS).
68 Shiping Management(chennai port trust).
69 Ship Store System.
70 Enterprise Stock and Accounting System.
71 Knowledge Based Decision Support System(KMS).
72 Online Jewelry Management.
73 Pharmacy Information System .
74 Multi New Product Survey Management.
75 Secure SMS Transaction System on Banking.
76 Transport Management System.
77 Secure File Uploading Server with Advance protecting system.
78 Defect Analysis System.
79 A Semantic Web Based Scientific News Aggregator.
80 Design & Development of Car Parking and Automation Billing Systems.
81 Nutraceuticals Management System.
82 Fertilizer Management System.
83 Tollgate Management System.
84 Disease Information Hiding on Publishing Healthcare Data.
85 File Security With Multi Database System.
86 Relational Logic Search Engine On Healthcare.
87 As-Needed- Basis Accountability for Cloud Data Sharing .
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
88 Data Base Fraud Detection Systems.
89 High and Low Level SQL Query Executor.
90 Multilevel Images Authentication Systems.
91 Secure File Monitoring System on Cloud .
92 Time To Time Stock Market Updater and Monitoring System.
93 Client Favorite Photo Search Engine on Web.
94 Distribution System for Discount Sales.
95 iKnoweb Extracting and Integrating Entity Information System.
96 Online Ensemble Learning Approach.
97 Online tagging for multimedia content.
98 Predicting Top Company Share Based on High Utility Data .
99 Quick Customer decision support on Web Sales Portal.
100 Sequential Anomaly Detection from User Behaviour.
101 VIP Information Gathering On WEB with Name Aliases.
102 E-Music World.
103 Citizen Card System.
104 CORPORATE REQUIREMENT SYSTEM.
105 Advance User Management on Social Website.
106 Cloud Cyber Attacks against Social Networks .
107 Cloud Policy-Based File Assure Deletion .
108 Consumer Sales Online Fake Product Detection and Deletion .
109 Data theft detection mobile cloud computing.
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
110 Encrypted Data Storage Vs Data Against Illegal Access.
111 A Game Theory for Online Security .
112 Information and Knowledge Extracting from a large amount of data.
113 Mobile TV Quality Management.
114 Movie Rating and Recommendation on Mobile.
115 Online Multi Type Documents Search Engine.
116 Personalize Your News on Web.
117 Product Market Manipulations on Asian stock market.
118 Quality Visualization on Web TV.
119 Annotation of short texts With Wikipedia pages.
120 Defending Against Web Application Vulnerabilities.
121 Enabling Site Interaction In Social Community.
122 FILE SEARCH ENGINE.
123 Movie Recommender Systems via User- Item Subgroups .
124 Online Banking With Fraud Detecting .
125 ONLINE MOBILE BILLING SYSTEM .
126 Online Search Ranking On Multiple Domain.
127 Secure Online Documents Management System In Cloud.
128 SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT.
129 Sql Tuner.
130 Web Hosting On Cloud.
131 Attribute Key Based Data Security System.
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
132 Cloud Cost Management for Customer Sensitive Data.
133 Cloud Data Theft Attacks.
134 Industry Standard Authorization For Sensitive Resources.
135 Mobile TV Quality Management.
136 Web Parser on Sequence Alignment Techniques.
137 Customer Information Hiding for Data Mismanagement in Banking.
138 Digital Documents Attestation Systems.
139 Fast Web Information Gathering with Alias Detection.
140 Unique Web Resources Utilization Monitoring System.
141 Web Server Security with Web Client Management System.
142 Web crawler
143 Cargo Logistics
144 Citizen Card System
145 Cyber Hotelier
146 F city
147 IRC Chat Client
148 ON-LINE SELECTION SYSTEM
149 pharama ordering system
150 Powell's Book Repository
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
JAVA IEEE 2013 LIST
Cloud Computing:-
S.no Project Title
1 Efficiently Representing Membership for Variable Large Data Sets
2 Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud Virtualization
4 PDDS - Improving cloud data storage security using data partitioning technique
5 Introduction to the Decision Analytics, Mobile and Service Science Track (DA/MS/SS)
6 The Insecurity of Cloud Utility Models
7 Using Model Checking to Evaluate Live Migrations
8 CloudMoV: Cloud-based Mobile Social TV
9 Dynamic Scheduling and Pricing in Wireless Cloud Computing
10 Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud
Computing
11 Mobile Security: A Look Ahead
12 A epidemic style super-node election method based on self-information theory
13 Space race
14 A Cloud-Based Approach to Interoperable EHRs
15 IT in the Chinese Healthcare Industry
16 Realization of medical information analysis platform taking physical fitness checkup mode as an
example
17 Gathering clouds
18 Guest Editors' Introduction: Special Issue on Cloud Computing
19 Cloud AC: a cloud-oriented multilayer access control system for logic virtual domain
20 Image-Based Modeling of Unwrappable Façades
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
21 Cloudrise: Exploring Cloud Computing Adoption and Governance with the TOE Framework
22 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video
Sharing in the Clouds
23 Design QoS-Aware Multi-Path Provisioning Strategies for Efficient Cloud-Assisted SVC Video
Streaming to Heterogeneous Clients
24 On the Investigation of Cloud-based Mobile Media Environments with Service-Populating and
QoS-aware Mechanisms
25 Hardware loads and power consumption in cloud computing environments
26 Data integrity and data dynamics with secure storage service in cloud
27 Improving Network I/O Virtualization for Cloud Computing
28 Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective
29 Application-aware optimization of networking protocols for data centers
30 Solar-Powered Cloud Computing Datacenters
31 Software defined networking opportunities for transport
32 A Framework for Consumer-Centric SLA Management of Cloud-Hosted Databases
33 Introduction to IT and Entrepreneurship Minitrack
34 Visualization framework for inter-domain access control policy integration
35 A Novel and Flexible Cloud Architecture for Data-Centric Applications
36 The future of cloud integration: Cloud Middleware?
37 Applications and Trends of High Performance Computing for Electric Power Systems: Focusing on
Smart Grid
38 Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing
39 Cloud Computing for Green Construction Management
40 Beyond the Cloud: Cyberphysical Systems
41 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
42 Nano device simulations on Cloud Stack
43 A Green Software Development Life Cycle for Cloud Computing
44 A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud
45 A study on method deploying efficient cloud service framework in the public sector
46 A cloud computing based telemedicine service
47 GASE -an input domain reduction and branch coverage system based on Genetic Algorithm and
Symbolic Execution
48 Powering a Data Center Network via Renewable Energy: A Green Testbed
49 Seamless and non-contact health monitoring system in cloud computing
50 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud
Computing Systems
51 A Designing and Research of Future Classroom Learning Support System Based on Cloud
Computing Technology
Network Securities:-
S.no Project Title
1 Secure continuous aggregation in wireless sensor networks
2 A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
3 Target Detection in Bistatic Radar Networks: Node Placement and Repeated Security Game
4 Defensive mechanism for VANET security in game theoretic approach using heuristic based ant
colony optimization
5 Control of Wireless Networks with Secrecy
6 Communication security for smart grid distribution networks
7 Beamforming design of decode-and-forward cooperation for improving wireless physical layer
security
8 Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
9 Resilient Asymptotic Consensus in Robust Networks
10 An Overview of Anomaly Detection
11 Secure Electronic Health Record Exchange: Achieving the Meaningful Use Objectives
12 Security of Autonomous Systems Employing Embedded Computing and Sensors
13 An improved LFS engine for physical layer security augmentation in cognitive networks
14 Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic
Model
15 Mitigation of application DDoS attacks using ASNRI scheme for IP and MAC frames
16 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
17 Cluster based Location privacy in Wireless Sensor Networks against a universal adversary
18 RFID system implementation in Jebel Ali port
19 Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks
with QoS Guarantee
20 A Strategy-Proof Radio Spectrum Auction Mechanism in Noncooperative Wireless Networks
21 On topology attack of a smart grid
22 A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous
WSNs
23 Secure continuous aggregation in wireless sensor networks
24 A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
25 In quest of benchmarking security risks to cyber-physical systems
26 A study on routing performance of 802.11 based wireless mesh networks under serious
attacks
27 A Next-Generation Approach to Combating Botnets
28 Performance evaluation of Hybrid Spread Spectrum based Advanced smart Metering
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
Infrastructure network with Multi-User Detection techniques in jamming channel
29 Efficient Protocols For Secure Broadcast In Controller Area Networks
30 Identifying Infection Sources and Regions in Large Network
31 ID Proof on the Go: Development of a Mobile EEG-Based Biometric Authentication System
32 Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space
33 Dynamic key refreshment for smart grid mesh network security
34 A Survey of Group Key Distribution Schemes With Self-Healing Property
35 Security issues in vehicular networks
36 Lightweight Location Verification Algorithms for Wireless Sensor Networks
37 Avoiding a War on Unauthorized Computation
38 Vertical and horizontal circuit/packet integration techniques for the future optical internet
39 Accommodating the Variable Timing of Software AES Decryption on Mobile Receivers
40 An approach to identify anomaly with network data analysis
41 Editorial Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things
42 Stochastic Monitoring of Distribution Networks Including Correlated Input Variables
43 Secure access for MANET using authorization enforcement facility
44 A Survey on Security Aspects for LTE and LTE-A Networks
45 An RTOS-based architecture for industrial wireless sensor network stacks with multi-
processor support
46 Fast Deep Packet Inspection with a Dual Finite Automata
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
47 A biometric-based security for data authentication in Wireless Body Area Network (WBAN)
48 An Identification System Based on Portable EEG Acquisition Equipment
49 A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching,
Policy Filtering, and Content Filtering
50 In quest of benchmarking security risks to cyber-physical systems
51 A study on routing performance of 802.11 based wireless mesh networks under serious
attacks
Data Mining:-
S.no Project Title
1 Understanding and recommending play relationships in online social gaming
2 IMAGESEER: NASA IMAGEs for Science, Education, Experimentation and Research
3 Research on Forecast Method of Coal Mine Emergencies Base on Rough Sets-Neural
Network and Case-based Reasoning
4 Multitask Spectrum Sensing in Cognitive Radio Networks via Spatiotemporal Data Mining
5 Predicting Project Outcome Leveraging Socio-Technical Network Patterns
6 Forecast the Distribution of Urban Water Point by Using Improved DBSCAN Algorithm
7 Ontology Fusion in High-Level-Architecture-Based Collaborative Engineering Environments
8 Stock Market Prediction without Sentiment Analysis: Using a Web-Traffic Based Classifier
and User-Level Analysis
9 Semantic search for structured Web finder
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
10 An Explicit Nonlinear Mapping for Manifold Learning
11 Profile-Based LC-MS Data Alignment &#x2014 A Bayesian Approach
12 Mining Developer Contribution in Open Source Software Using Visualization Techniques
13 Secure Mining of Association Rules in Horizontally Distributed Databases
14 The Research of Hydropower Unit Trouble Diagnosis System Based on Multi-Agent
15 Trajectory Improves Data Delivery in Urban Vehicular Networks
16 An Intelligent System for Large-scale Disaster Behavior Analysis and Reasoning
17 Measurement of similarity using link based cluster approach for categorical data
18 Nonnegative Matrix Factorization: A Comprehensive Review
19 VisIVO Workflow-Oriented Science Gateway for Astrophysical Visualization
20 Aspect-level opinion mining of online customer reviews
21 An integrated approach to derive effective rules from association rule mining using genetic
algorithm
22 Mammogram image feature selection using unsupervised tolerance rough set relative
reduct algorithm
23 ARMS: An Advanced Operational Risk Management System for Commercial Banks
24 Capturing Social Data Evolution Using Graph Clustering
25 Detection of proficient and distinct motifs in sequence data sets using PSM
26 IMAGESEER: NASA IMAGEs for Science, Education, Experimentation and Research
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
27 Understanding and recommending play relationships in online social gaming
28 Manycore processor for video mining applications
29 The 3D Landscape Modeling and Application of Optimization Algorithms Based on the High-
resolution Satellite Image
30 Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping
31 Embedding Motion and Structure Features for Action Recognition
32 Minimization of Wind Farm Operational Cost Based on Data-Driven Models
33 Non-Intrusive Signature Extraction for Major Residential Loads
34 A Bayesian Network-Based Knowledge Engineering Framework for IT Service Management
35 Statistics in Semiconductor Test, Going Beyond Yield
36 Investigating the Increase in Mobile Phone Evidence in Criminal Activities
37 Detecting counterfeit products using supply chain event mining\
38 Short-term electric load forecasting using data mining technique
39 Bijective soft set based classification of medical data
40 Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes
41 Annotating Search Results from Web Databases
42 PMSE: A Personalized Mobile Search Engine
43 Relevant association rule mining from medical dataset using new irrelevant rule
elimination technique
44 Linear Mixture Analysis for Hyperspectral Imagery in the Presence of Less Prevalent
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.
Phone: 0866-6663599, 8142987999, 8142552999
Email: [email protected]
Materials
45 MultiComm: Finding Community Structure in Multi-Dimensional Networks
46 From -Means to Higher-Way Co-Clustering: Multilinear Decomposition With Sparse Latent
Factors
47 A game theory model for situation awareness and management
48 T-Drive: Enhancing Driving Directions with Taxi Drivers' Intelligence
49 Cancer detection using biclustering
50 Predicting School Failure and Dropout by Using Data Mining Techniques
51 Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers
52 Classification Tree for Risk Assessment in Patients Suffering From Congestive Heart Failure
via Long-Term Heart Rate Variability