Sie sind auf Seite 1von 10

MODAInnovations

Complete Academic Project Solutions


9538304161
www.modainnovations.com
modainnovations@gmail.com


JAVA/J2EE, DOTNET IEEE PROJECT LIST

S NO
Project Title Domain Technology Year
1 Privacy-Preserving Public Auditing for Secure
Cloud Storage
Cloud
Computing
Java/J2ee 2013
2
CloudMoV: Cloud-based Mobile Social TV
Cloud
Computing
Java/J2ee 2013
3 Winds of Change From Vendor Lock-In to the
Meta Cloud.
Cloud
Computing
Java/J2ee 2013
4
Secure Multi-Owner Data Sharing for Dynamic
Groups in the Cloud
Cloud
Computing
Java/J2ee 2013
5 A Load Balancing Model Based on Cloud
Partitioning for the Public Cloud.
Cloud
Computing
Java/J2ee 2013
6 A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud
Computing Systems
Cloud
Computing
Java/J2ee 2013
7 Dynamic Resource allocation using virtual
machines for cloud computing environment
Cloud
Computing
Java/J2ee 2013
8 Enabling Dynamic Data and Indirect Mutual
Trust for Cloud Computing Storage Systems
Cloud
Computing
Java/J2ee 2013
9 Error-Tolerant Resource Allocation and
Payment Minimization for Cloud System
Cloud
Computing
Java/J2ee 2013

10 Scalable and Secure Sharing of Personal Health
Records in Cloud Computing using Attribute-
based Encryption.
Cloud
Computing
Java/J2ee 2013
11 Harnessing the Cloud for Securely Outsourcing
Large
Cloud
Computing
Java/J2ee 2013
12 Prediction-Based Cloud Bandwidth and Cost
Reduction System
Cloud
Computing
Java/J2ee 2013
13 Privacy-Preserving Public Auditing for Secure
Cloud Storage
Cloud
Computing
Java/J2ee 2013
14 Cloud computing for mobile users can
offloading compution save energy.
Cloud
Computing
Java/J2ee 2013
15 A Fast Clustering-Based Feature Subset
Selection Algorithm for High-Dimensional
Data
Data Mining Java/J2ee 2013
16 Access Policy Consolidation for Event
Processing Systems
Data Mining Java/J2ee 2013
17 Facilitating Document Annotation Using
Content And Querying Value
Data Mining Java/J2ee 2013
18 m-Privacy for Collaborative Data Publishing Data Mining Java/J2ee 2013
19 Protecting Sensitive Labels in Social Network
Data Anonymization
Data Mining Java/J2ee 2013
20 Tweet Analysis for Real-Time Event Detection
and Earthquake
Data Mining Java/J2ee 2013
21 Robust Module-based Data Management Data Mining Java/J2ee 2013
22 A Stochastic Model to Investigate Data Center
Performance and QoS in IaaS Cloud
Computing Systems
Data Mining Java/J2ee 2013
23 Spatial Approximate String Search Data Mining Java/J2ee 2013
24 Crowdsourcing Predictors of Behavioral
Outcomes
Data Mining Java/J2ee 2013
25 Optimizing Cloud Resources for Delivering
IPTV Services through Virtualization.
Networking Java/J2ee 2013
26 Participatory Privacy Enabling Privacy in
Participatory Sensing.
Networking Java/J2ee 2013

27 Dynamic Control of Coding for Progressive
Packet Arrivals in DTNs
Networking Java/J2ee 2013
28 Delay-Based Network Utility Maximization Networking Java/J2ee 2013
29 A Highly Scalable Key Pre-Distribution
Scheme for Wireless Sensor Networks
Networking Java/J2ee 2013
30 WARNINGBIRD: A Near Real-time Detection
System for Suspicious URLs in Twitter Stream
Secure
Computing
Java/J2ee 2013
31 Super-Resolution-based Inpainting Secure
Computing
Java/J2ee 2013
32
Spatial Approximate String Search
Secure
Computing
Java/J2ee 2013
33 Securing Class Initialization in Java-like
Languages
Secure
Computing
Java/J2ee 2013
34 Privacy Preserving Data Sharing With
Anonymous ID Assignment
Secure
Computing
Java/J2ee 2013
35 NICE: Network Intrusion Detection and
Countermeasure Selection in Virtual Network
Systems
Secure
Computing
Java/J2ee 2013
36 Modeling the Pairwise Key Predistribution
Scheme in the Presence of Unreliable Links
Secure
Computing
Java/J2ee 2013
37 Identity-Based Secure Distributed Data Storage
Schemes
Secure
Computing
Java/J2ee 2013
38 EAACKA Secure Intrusion-Detection
System for MANETs
Secure
Computing
Java/J2ee 2013
39 CAM: Cloud-Assisted Privacy Preserving
Mobile Health Monitoring
Secure
Computing
Java/J2ee 2013
40 Secure Encounter-based Mobile Social
Networks Requirements Designs and Tradeoffs
Secure
Computing
Java/J2ee 2013
41 Two tales of privacy in online social networks Secure
Computing
Java/J2ee 2013
42 Mobile Relay Configuration in Data-intensive
Wireless Sensor Networks
Mobile
Computing
Java/J2ee 2013
43 Vampire attacks:Draining life from wireless ad-
hoc sensor networks.
Mobile
Computing
Java/J2ee 2013
44 Content Sharing over Smartphone-Based
Delay-Tolerant Networks
Mobile
Computing
Java/J2ee 2013

45 DCIM: Distributed Cache Invalidation Method
for Maintaining Cache Consistency in Wireless
Mobile Networks
Mobile
Computing
Java/J2ee 2013
46 Discovery and Verification of Neighbor
Positions in Mobile Ad Hoc Networks
Mobile
Computing
Java/J2ee 2013
47 IP-Geolocation Mapping for Moderately
Connected Internet Regions
Parallel &
Distributor Sys
Java/J2ee 2013
48 A Secure Protocol for Spontaneous Wireless
Ad Hoc Networks Creation
Parallel &
Distributor Sys
Java/J2ee 2013
49 Enabling Dynamic Data and Indirect Mutual
Trust for Cloud Computing Storage Systems
Parallel &
Distributor Sys
Java/J2ee 2013
50 Optimal Client-Server Assignment for Internet
Distributed Systems
Parallel &
Distributor Sys
Java/J2ee 2013
51 Harnessing the Cloud for Securely Outsourcing
Large
Parallel &
Distributor Sys
Java/J2ee 2013
52 Mining Contracts for Business Events and
Temporal Constraints in Service Engagements
Parallel &
Distributor Sys
Java/J2ee 2013
53 Non-Cooperative Location Privacy Parallel &
Distributor Sys
Java/J2ee 2013
54 Collaboration in Multicloud Computing
Environments Framework and Security Issues
Cloud
Computing
Java/J2ee 2013
55 AMES-Cloud A Framework of Adaptive
Mobile Video Streaming and Efficient Social
Video Sharing in the Clouds
Cloud
Computing
Java/J2ee 2013
36
Privacy Preserving Delegated Access
Control in Public Clouds
Cloud
Computing
DotNet 2013
57 Privacy-Preserving Public Auditing for
Secure Cloud Storage
Cloud
Computing
DotNet 2013
58 Attribute-based Access to Scalable Media
in Cloud-assisted Content Sharing
Networks
Cloud
Computing
DotNet 2013
59 Towards Secure Multi-Keyword Top-k
Retrieval over Encrypted Cloud Data
Cloud
Computing
DotNet 2013
60 Toward Fine-Grained, Unsupervised,
Scalable Performance Diagnosis for
Production Cloud Computing Systems
Cloud
Computing
DotNet 2013

61
QoS Ranking Prediction for Cloud Services
Cloud
Computing
DotNet 2013
62 Optimal Multiserver Configuration for
Profit Maximization in Cloud Computing
Cloud
Computing
DotNet 2013
63 A New Algorithm for Inferring User Search
Goals with Feedback Sessions
Data
Mining
DotNet 2013
64
A Survey of XML Patterns
Data
Mining
DotNet 2013
65 SPOC: A Secure and Privacy-preserving
Opportunistic Computing Framework for
Mobile-Healthcare Emergency
Data
Mining
DotNet 2013
66 Query-Adaptive Image Search With Hash
CodesMining
Image
processing
DotNet 2013
67 Reversible Data Hiding with Optimal value
Transfer
Image
processing
DotNet 2013
68 Secure Mining of Association Rules in
Horizontally Distributed Databases
Image
processing
DotNet 2013
69 Scalable Learning of Collective Behavior Data Mining DOT Net 2012
70 Horizontal Aggregations in SQL to Prepare
Data Sets for Data Mining Analysis
Data Mining DOT Net 2012
71 Outsourced Similarity Search on Metric Data
Assets
Data Mining Java/J2ee 2012
72 Publishing Search LogsA Comparative Study
of Privacy Guarantees
Data Mining Java/j2ee 2012
73 Independent Directed Acyclic Graphs for
Resilient Multipath Routing
Networking Java 2012
74 MeasuRouting: A Framework for Routing
Assisted Traffic Monitoring
Networking Java 2012
75 Opportunistic Flow-level Latency Estimation
using NetFlow
Networking Java 2012
76 Router Support for Fine-Grained Latency
Measurements
Networking Java 2012
77 Design, Implementation, and Performance of A
Load Balancer for SIP Server Clusters
Networking Java 2012

78 Privacy- and Integrity-Preserving Range
Queries in Sensor Networks
Networking Java 2012
79 An Adaptive Opportunistic Routing Scheme for
Wireless Ad-hoc Networks
Networking Java 2012
80 Zone Trust: Fast Zone-Based Node
Compromise Detection and Revocation in
wireless Sensor Networks Using Sequential
Hypothesis Testing
Dependable
Secure Comp
Java 2012
81 Design and Implementation of TARF: A Trust-
Aware Routing Framework for WSNs
Dependable
Secure Comp
Java 2012
82 P Cloud: A Distributed System for Practical
PIR
Dependable
Secure Comp
Java/J2ee
83 Packet-Hiding Methods for Preventing
Selective Jamming Attacks
Dependable
Secure Comp
Java 2012
84 Detecting and Resolving Firewall Policy
Anomalies
Dependable
Secure Comp
Java 2012
83 Risk-Aware Mitigation for MANET Routing
Attacks
Dependable
Secure Comp
Java 2012
86 Multiple exposure fusion for high dynamic
range image acquisition
Image Processing DOT NET 2012
87 Energy-Efficient Cooperative Video
Distribution with Statistical QoS Provisions
over Wireless Networks
Mobile
Computing
Java 2012
88 Protecting Location Privacy in Sensor
Networks Against a Global Eavesdropper
Mobile
Computing
Java 2012
89 Revisiting Dynamic Query Protocols in
Unstructured Peer-to-Peer Networks
Parallel
Distributed Sys
Java 2012
90 Exploiting Jamming-Caused Neighbor Changes
for Jammer Localization
Parallel
Distributed Sys
Java 2012
91 Bounding the Impact of Unbounded Attacks in
Stabilization
Parallel
Distributed Sys
DOT NET 2012
92 Cut Detection in Wireless Sensor Networks Parallel
Distributed Sys
Java 2012

93 Catching Packet Droppers and Modifiers in
Wireless Sensor Networks
Parallel
Distributed Sys
Java 2012
94 Detection and Localization of Multiple
Spoofing Attackers in Wireless Networks
Parallel
Distributed Sys
Java 2012
93 Capacity of Data Collection in Arbitrary
Wireless Sensor Networks
Parallel
Distributed Sys
Java 2012
96 BECAN: A Bandwidth-Efficient Cooperative
Authentication Scheme for Filtering Injected
False Data
in Wireless Sensor Networks
Parallel
Distributed Sys
Java 2012
97 Cooperative Provable Data Possession for
Integrity Verification in Multi-Cloud Storage
Parallel
Distributed Sys
Java/J2ee 2012
98 Balancing the Tradeoffs between Query Delay
and Data Availability in MANETs
Parallel
Distributed Sys
Java 2012
99 Capacity of Data Collection in Arbitrary
Wireless Sensor Networks
Parallel
Distributed
Systems
Java 2012
100 Towards Secure and Dependable Storage
Services in Cloud Computing
Cloud and
Services Comp
Java/J2ee 2012
101 Automatic Protocol Blocker for Privacy
Preserving Public Auditing in Cloud
Computing
Cloud and
Services Comp
Java 2012
102 Efficient audit service outsourcing for data
integrity in clouds
Cloud and
Services Comp
Java 2012
103 Ensuring Distributed Accountability for Data
Sharing in the Cloud
Cloud and
Services Comp
Java 2012
104 Secure Overlay Cloud Storage with Access
Control and Assured Deletion
Cloud and
Services Comp
Java 2012
103 Scalable and Secure Sharing of Personal Health
Records in Cloud Computing using Attribute-
based
Encryption

Cloud and
Services Comp
Java/J2ee 2012
106 Cloud Computing Security From Single to
Multi-Clouds
Cloud and
Services Comp
Java 2012

107 Managing Data Access in Cloud Computing Cloud and
Services Comp
Java 2012
108 AMPLE: An Adaptive Traffic Engineering
System Based on Virtual Routing
Topologies
Communications
Magazine,
Java 2012
109 Efficient Extended Boolean Retrieval Knowledge and
Data Engg
Java 2012
110 Online Modeling of Proactive Moderation
System for Auction Fraud Detection
Java 2012
Reliable Re-encryption in Unreliable Clouds Java 2012
111 Cloud Computing Security: From Single to
Multi-Clouds
Java 2012
112 Automatic Discovery of Association Orders
between Name and Aliases from the
Web using Anchor Texts-based Co-occurrences
Java 2012
113 Packet-Hiding Methods for Preventing
Selective Jamming Attacks
Dependable and
Secure Comp
Java 2012
114 Learn to Personalized Image Search from the
Photo Sharing Websites
Multimedia, Java 2012
113 Risk-Aware Mitigation for MANET Routing
Attacks
Dependable and
Secure Comp
Java 2012
116 Slicing: A New Approach to Privacy
Preserving Data Publishing
Knowledge and
Data Engg
Java 2012
117 A New Cell-Counting-Based Attack Against
Tor
Networking, Java 2012
118 Compressed-Sensing-Enabled Video Streaming
for Wireless Multimedia Sensor
Networks
Mobile
Computing,
Java 2012
119 Cooperative download in vehicular
environments
Java 2012
120 Design and Implementation of TARF: A Trust-
Aware Routing Framework for WSNs
Java 2012
121 Efficient audit service outsourcing for data
integrity in clouds
Java 2012
122 Exploring The Design Space Of Social
Network-Based Sybil Defenses
Communication
Systems and Net
Java 2012

123 Heuristics Based Query Processing for Large
RDF Graphs Using Cloud Computing
Knowledge and
Data Engg
Java 2012
124 Identifying Content for Planned Events Across
Social Media Sites
Java 2012
125 Load-Balancing Multipath Switching System
with Flow Slice
Java 2012
126 Mining Web Graphs for Recommendations Knowledge and
Data Engf
DOT NET 2012
127 Network Assisted Mobile Computing with
Optimal Uplink Query Processing
Mobile
Computing,
DOT NET 2012
128 Optimal Power Allocation in Multi-Relay
MIMO Cooperative Networks: Theory and
Algorithms
Mobile
Computing,
DOT NET 2012
129 Protecting Location Privacy in Sensor
Networks Against a Global Eavesdropper
Mobile
Computing
DOT NET 2012
130 Scalable and Secure Sharing of Personal Health
Records in Cloud Computing using
Attribute-based Encryption
Parallel and
Distributed Sys
DOT NET 2012
131 Bridging Social and Data Networks

,
Signal
Processing
DOT NET 2012
132 SPOC: A Secure and Privacy-preserving
Opportunistic Computing Framework for
Mobile-Healthcare Emergency
Parallel and
Distributed Sys
DOT NET 2012
133 Topology control in mobile ad hoc networks
with cooperative communications
Wireless
Communications,
DOT NET 2012
134 View-invariant action recognition based on
Artificial
Neural Networks
and Learning
DOT NET 2012
135 A Secure Intrusion detection system against
DDOS attack in Wireless Mobile Ad-hoc
Network
DOT NET 2012
136 Robust Face-Name Graph Matching for Movie
Character Identify
Multimedia DOT NET 2012
137 Defenses against large scale online password
guessing attacks by using persuasive click
Points
DOT NET 2012
138 Securing Node Capture Attacks for
Hierarchical Data Aggregation in Wireless
Sensor
Networks
DOT NET 2012


139 Extracting Knowledge Using Market Basket
Analysis
DOT NET 2012
140 Automatic Reconfiguration for Large-Scale
Reliable Storage
Systems
Dependable and
Secure Comp
DOT NET 2012
141 Automatic Protocol Blocker for Privacy-
Preserving Public Auditing in Cloud
Computing
Dependable and
Secure Comp
Java 2012
142 Cloud Computing Security From Single to
multi clouds
Dependable and
Secure Comp
Java 2012
143 Energy Efficient Routing Mechanism in
Wireless Sensor Network
Networking Java 2012
144 Outsourced Similarity Search on Metric Data
Assets
Networking Java 2012
145 Packet-Hiding Methods for Preventing
Selective jamming attacks
Networking Java 2012
146 The Three-Tier Security Scheme in Wireless
Sensor network with mobile sinks
Networking Java 2012
147 Ranking Model Adaptation for Domain-
Specific Search
Networking Java 2012
148 EFFICIENT AUDIT SERVICE
OUTSOURCING FOR DATA INTEGRITY
IN CLOUDS
Dependable and
Secure Comp
Java 2012
149 Secure Overlay Cloud Storage with Access
Control and Assured Deletion
Dependable and
Secure Comp
Java 2012
150 An Efficient Adaptive Deadlock-Free Routing
Algorithm for Torus Networks
Networking Java 2012

Das könnte Ihnen auch gefallen