VLSI NEW BATCH GOING ON @6:30PM | EMBEDDED SYSTEM NEW BATCH GOING ON @8:30AM | UNIX SHELL NEW BATCH GOING ON @10:00AM | PYTHON NEW BATCH GOING ON @10:30AM and @5:00PM

JAVA Projects Titles

Networking

1. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
2. Cloning, Resource Exchange, and Relation Adaptation: An Integrative Self-Organization
3. Mechanism in a Distributed Agent Network
4. Breaking the Barrier to Transferring Link Information across Networks
5. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
6. Network Aware Scheduling for Virtual Machine Workloads with Interference Models

Datamining

1. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
2. Scalable Keyword Search on Large RDF Data
3. Adaptive Replica Synchronization for Distributed File Systems
4. Probabilistic Aspect Mining Model for Drug Reviews
5. Efficient Range-Based Storage Management for Scalable Data stores
6. Task Trail: An Effective Segmentation of User Search Behavior
7. Supporting Privacy Protection in Personalized Web Search
8. An Empirical Performance Evaluation of Relational Keyword Search Techniques
9. Discovering the Top-k Unexplained Sequences in Time-Stamped Observation Data
10. A Retrieval Strategy for Case-Based Reasoning Using Similarity and Association Knowledge
11. Accuracy-Constrained Privacy-Preserving Access Control Mechanism For Relational Data
12. Towards Online Shortest Paths Computation
13. Vabks: Verifiable Attribute-Based Keyword Search Over Outsourced Encrypted Data

Network Security

1. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
2. Private Searching on Streaming Data Based on Keyword Frequency
3. Building a Scalable System for Stealthy P2P-BotnetDetection
4. The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluations
5. PPTP: Privacy-Preserving Traffic Padding in Web-Based Applications
6. On False Data-Injection Attacks Against Power System State Estimation: Modeling And Countermeasures

Cloud Computing

1. Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud
2. Balancing Performance, Accuracy, and Precision for Secure Cloud Transactions
3. A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud
4. Proactive Workload Management in Hybrid Cloud Computing
5. KASR: A Keyword-Aware Service Recommendation Method on Map Reduce for Big Data Applications
6. A Hybrid Cloud Approach for Secure Authorized Reduplication
7. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
8. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
9. Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
10. Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing
11 .”A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via SocialNetworks”
12. Expressive Efficient And Revocable Data Access Control For Multi Authority Cloud Storage
13. Key-Aggregate Cryptosystem For Scalable Data Sharing In Cloud Storage

Software Engineering 

1. Online Feature Selection and Its Applications
2. Continuous and Transparent User Identity Verification for Secure Internet Services
3. Self Adaptive Software Architecture

Image Processing

1. Image Quality Assessment for Fake Biometric Detection: Application to IRIS, Fingerprint, and Face Recognition

Mobile Computing

1. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
2. Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
3. Efficient Authentication For Mobile And Pervasive Computing
4. Security Evaluation Of Pattern Classifiers Under Attack
5. Optimal Distributed Malware Defense In Mobile Networks With Heterogeneous Devices

Grid Computing   

1.  Containing Byzantine Failures with Control Zones

Multimedia   

1. Uniform Embedding for Efficient JPEG Steganography

Andriod

1. Security Threats to Mobile Multimedia Applications: Camera-Based Attacks on Mobile Phones
2. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

Visit Us On TwitterVisit Us On FacebookVisit Us On Google Plus