Java IEEE 2014 TITLES - Final Year IEEE Projects in chennai

advertisement
S3 INFOTECH
+919884848198
JAVA IEEE 2014 TITLES Fully Completed List
S.No
Project Title
YEAR
S3C_1 Secure_Message_Passing_In_Cloud
IEEE 2014
S3C_2 Fault_Localization_For_Dynamic_Web_Applications
IEEE 2014
Mining_Social_Media_Data_For_Understanding_Students'_Learning
S3C_3 _Experiences
IEEE 2014
S3C_4 Decentralized_Access_Control_Of_Data_Stored_In_Cloud
IEEE 2014
S3C_5 Real_Estate_Management_System
IEEE 2014
S3C_6 Circular_Ranking_For_Visual_Search
IEEE 2014
S3C_7 Attribute Based Encryption with Privacy Protection in Clouds
IEEE 2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud
S3C_8 Storage
IEEE 2014
Disturbed, concurrent and independent access to encrypted cloud
S3C_9 database
IEEE 2014
Accuracy Constrained Privacy Preserving Access Control
S3C_10 Mechanism for Relational Data
IEEE 2014
S3C_11 Supporting privacy protection in personalized web search
IEEE 2014
S3C_12 Human effects of enhanced privacy management models
IEEE 2014
Analysis, modeling and simulation of workload patterns in a large
S3C_13 scale utility cloud
IEEE 2014
# 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198.
www.s3computers.com
E-Mail: info@s3computers.com
S3 INFOTECH
+919884848198
S3C_14 Identifying code of individual features in client side web application
IEEE 2014
Efficient Algorithms for Mining High Utility Itemsets from
S3C_15 Transactional Databases
IEEE 2014
CipherXRay: Exposing Cryptographic Operations and Transient
S3C_16 Secrets from Monitored Binary Execution
IEEE 2014
S3_JCC02
A Mechanism Design Approach to Resource
Procurement in Cloud Computing
Cloud
Procurement
S3_JCC03
A Hybrid Cloud Approach for Secure Authorized
Deduplication
Hybrid Cloud
S3_JCC04
A Provenance-based Adaptive Scheduling Heuristic for
Parallel Scientific Workflows in Clouds
Scientific
Work flows
S3_JCC05
Efficient Rekeying Framework for Secure Multicast
with Diverse-Subscription-Period Mobile Users
Key
Management
S3_JCC06
A green energy-efficient scheduling algorithm using the
DVFS technique for cloud datacenters
Cloud
Scheduling
S3_JCC07 Information Flow Control for Secure Cloud Computing
Cloud
Computing
S3_JCC08
Shared Authority Based Privacy-preserving
Authentication Protocol in Cloud Computing
Cloud
Security
S3_JCC09
Oruta: Privacy-Preserving Public Auditing
for Shared Data in the Cloud
Cloud
Security
S3_JBD10
Cost Minimization for Big Data Processing in
Geo-Distributed Data Centers
Big Data
S3_JBD11
Evolutionary Scheduling of Dynamic Multitasking
Workloads for Big-Data Analytics in Elastic Cloud
S3_JBD12 Data Mining with Big Data
Task
Scheduling
Big Data
Mining
# 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198.
www.s3computers.com
E-Mail: info@s3computers.com
IEEE 2014
Cloud, Auditing, Security
Struts2,Web Frame Work , RDF
A Computational Dynamic Trust Model for User
Authorization
TECHNOLOG
Y
IEEE 2014
Big Data, Mining
Hadoop File System
S3_JCC01
APPLICATI
ON
Secure
Computing
PROJECT TITLE
S3_JDM1
4
S3_JDM1
5
S3_JDM1
6
S3_JDM1
7
A Semantically Enriched Context-Aware OER
Recommendation Strategy and Its Application to a
Computer Science OER Repository
Recommendat
ion System
On Skyline Groups
Skyline Query
Online Feature Selection and Its Applications
Toward Scalable Indexing for Top-k Queries
Online
Learning
Query
Retrieval
Personalized Web Search Using Browsing History And
Domain Knowledge
Web Mining
S3_JDM1
8
Interpreting the Public Sentiment Variations on Twitter
Sentiment /
Opinion
Mining
S3_JDM1
9
Automatic Generation of the Domain Module from
Electronic Textbooks: Method and Validation
S3_JNS20
Analysis and Improvement of a PIN-Entry Method
Resilient to Shoulder-Surfing and Recording Attacks
S3_JNS21 Collusion-Resistance in Optimistic Fair Exchange
S3_JNS22
Dynamic Control of Coding for Progressive Packet
Arrivals in DTNs
Pattern
Mining
Information
Security
Collusion
Recover
Intrusion
Detection
S3_JNS23 On the Security of Trustee-Based Social Authentications
Network
Security
S3_JNS24
Receiver-Based Flow Control for Networks
in Overload
Networking
S3_JNS25
An Efficient Generic Framework for Three-Factor
Authentication With Provably Secure Instantiation
Information
Security
S3_JNS26 Measurement of Globally Visible DNS Injection
S3_JNS27
Identity-Based Secure Distributed
Data Storage Schemes
Networking
Distributed
Network
Securing Broker less Publish/Subscribe Systems Using
Identity Based Encryption
Distributed Sensing for High-Quality Structural Health
S3_JNS29
Monitoring using WSNs
S3_JNS28
Pub/Sub
System
WSN
# 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198.
www.s3computers.com
IEEE 2014
Opinion Mining, Query Analysis
Struts2, J2EE
S3_JDM1
3
+919884848198
E-Mail: info@s3computers.com
IEEE 2014
Network Security, DOS Attack , IDS, CAPTCHA
Struts2, J2EE, Web Frameworks
S3 INFOTECH
Security Analysis and Related Usability of Motionbased CAPTCHAs: Decoding Code words in Motion
Captcha
Security
S3_JSS31
Modeling Human-in-the-Loop Security Analysis and
Decision-Making Processes
Software
Engineering
S3_JSS32
A Framework for Goal-Oriented Discovery of
Resources in the RESTful Architecture
Web Services
S3_JSS33
QoS Ranking Prediction for Cloud Services
QOS Ranking
S3_JMC3
4
S3_JMC3
5
S3_JMC3
6
S3_JMC3
7
S3_JMC3
8
S3_JMC3
9
Secloud: A cloud-based comprehensive and lightweight
security solution for smartphones
Quality-Control Algorithm for Adaptive
Streaming Services over Wireless Channels
EasySMS: A Protocol for End-to-End Secure
Transmission of SMS
Exploring Permission-Induced Risk in Android
Applications for Malicious Application Detection
Message in a Sealed Bottle: Privacy Preserving
Friending in Mobile Social Networks
A Privacy-Preserving Attribute-Based Authentication
System for Mobile Health Networks
S3_JIM40
Reversible Image Data Hiding with Contrast
Enhancement
Stenography
S3_JIM41
Spatial Resolution Enhancement of Earth
Observation Products Using an Acceleration
Technique for Iterative Methods
Image
Enhancement
S3_JIM42
Text Detection and Recognition on Traffic Panels
From Street-Level Imagery Using Visual Appearance
Visual Mining
S3_JIM43
Inferring User Image-Search Goals Under the
Implicit Guidance of Users
Image Mining
S3_JIM44
Adaptive region matching for region-based image
retrieval by constructing region importance index
Image Ret
rival
S3_JIM45
A Generalized Flow-Based Method for Analysis of
Implicit Relationships on Wikipedia
Wikipedia
Mining
S3_JIM46
Multi-Focus Image Fusion Based on Spatial Frequency
in Discrete Cosine Transform Domain
Mobile
Security
Mobile
Streaming
SMS
Risk
Detection
Profile
Matching
Home
Healthcare
Fusion
# 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198.
www.s3computers.com
E-Mail: info@s3computers.com
IEEE 2014
Android, Ontology
Security, Streaming
S3_JNS30
IEEE 2014
Qos Prediction
Web Services
+919884848198
IEEE 2014
Image Retrieval, Data Hiding, Medical , Fusion
J2EE, Image Analysis
S3 INFOTECH
S3 INFOTECH
+919884848198
# 10/1, Jones Road, Saidapet, Chennai – 15. Ph: 044-3201 7467, 9884848198.
www.s3computers.com
E-Mail: info@s3computers.com
Download