16
Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10. Phone: 0866-6663599, 8142987999, 8142552999 Email: [email protected] [email protected] JAVA APPLICATION PROJECTS S.no Project Title 1 E-Fraud Prevention based on the Self-Authentication of e-Documents . 2 Multi New Product Survey Management . 3 Recommendation System Based On Web Usage Mining and Semantic Web A Survey 4 Municipal Administration System. 5 Distributed Data Integration on Electricity Board 6 Key Management for Content Integration 7 Nearest Shopping Location Identification Systems 8 Query Response System for File Management 9 Voting System for Web Library 10 Web Page re-Ranking System for Library 11 Online Advertising System 12 Web Usage Mining 13 Leave Management For MNC 14 Multi New Product Survey Management 15 Advance Airline Reservation System 16 E-Learning 17 Human Assurance Administration 18 Manifold Entrust Scheme 19 High level network Security Using Packet Filtering 20 Online Auction Bit

IEEE 2013

Embed Size (px)

DESCRIPTION

IEEE 2013

Citation preview

Page 1: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

JAVA APPLICATION PROJECTS

S.no Project Title

1 E-Fraud Prevention based on the Self-Authentication of e-Documents .

2 Multi New Product Survey Management .

3 Recommendation System Based On Web Usage Mining and Semantic Web A Survey

4 Municipal Administration System.

5 Distributed Data Integration on Electricity Board

6 Key Management for Content Integration

7 Nearest Shopping Location Identification Systems

8 Query Response System for File Management

9 Voting System for Web Library

10 Web Page re-Ranking System for Library

11 Online Advertising System

12 Web Usage Mining

13 Leave Management For MNC

14 Multi New Product Survey Management

15 Advance Airline Reservation System

16 E-Learning

17 Human Assurance Administration

18 Manifold Entrust Scheme

19 High level network Security Using Packet Filtering

20 Online Auction Bit

Page 2: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

21 Global Counselling System

22 Implementation and Validating Environmental and Health

23 Military Equipment Rental Systems

24 Virtual classroom system

25 Confined Web Spider

26 Automation of IT Process and Management.

27 Company information Tracking System(CITS).

28 Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing.

29 Ensuring Data Storage Security in Cloud Computing.

30 E-Online job Recruitment.

31 ERP.

32 Freelancer Job.

34 Inter Bank Fund Transfer in Distributed Network.

35 Online Rental House Web Portal.

36 Sms Topup.

37 Wireless healthcare system.

38 E-Tutor Online Jobs.

39 Credit card System.

40 Employee Management System.

41 Online University.

42 Web Eye.

43 Online Examination System.

Page 3: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

44 BPO Call center.

45 Mailing System.

46 High level network Security Using Packet Filtering.

47 Location-Based Spatial Query Processing with Data Sharing in Wireless Broadcast Environments.

48 Mobility Management Approaches for Mobile IP Networks.

49 Modeling & Automated Containment of Worms.

50 Online Index Recommendations For High-Dimensional Databases Using Query Workloads.

51 Protection of Database Security via Collaborative Inference Detection.

52 Global Counseling System .

53 Project Work Tracking System .

54 Mobile Banking System (WAP).

55 Pre-paid Recharging System on Banking.

56 Wireless Helthcare Prescription System.

57 Secure SMS Transaction System on banking (j2me).

58 Online Real Estate Property Management.

59 Work Order System for Call Center.

60 E-Crime File Management System.

61 E-Online Recruitment System.

62 Company Information Tracking System(CITS).

63 Inter Bank Fund Transfer in Distributed Network.

64 Automation Of Project and Process Management.

65 Credit Card Management System.

Page 4: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

66 Encrypted IT Auditing on Cloud Computing.

67 Corporate Security Reporting System(CSRS).

68 Shiping Management(chennai port trust).

69 Ship Store System.

70 Enterprise Stock and Accounting System.

71 Knowledge Based Decision Support System(KMS).

72 Online Jewelry Management.

73 Pharmacy Information System .

74 Multi New Product Survey Management.

75 Secure SMS Transaction System on Banking.

76 Transport Management System.

77 Secure File Uploading Server with Advance protecting system.

78 Defect Analysis System.

79 A Semantic Web Based Scientific News Aggregator.

80 Design & Development of Car Parking and Automation Billing Systems.

81 Nutraceuticals Management System.

82 Fertilizer Management System.

83 Tollgate Management System.

84 Disease Information Hiding on Publishing Healthcare Data.

85 File Security With Multi Database System.

86 Relational Logic Search Engine On Healthcare.

87 As-Needed- Basis Accountability for Cloud Data Sharing .

Page 5: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

88 Data Base Fraud Detection Systems.

89 High and Low Level SQL Query Executor.

90 Multilevel Images Authentication Systems.

91 Secure File Monitoring System on Cloud .

92 Time To Time Stock Market Updater and Monitoring System.

93 Client Favorite Photo Search Engine on Web.

94 Distribution System for Discount Sales.

95 iKnoweb Extracting and Integrating Entity Information System.

96 Online Ensemble Learning Approach.

97 Online tagging for multimedia content.

98 Predicting Top Company Share Based on High Utility Data .

99 Quick Customer decision support on Web Sales Portal.

100 Sequential Anomaly Detection from User Behaviour.

101 VIP Information Gathering On WEB with Name Aliases.

102 E-Music World.

103 Citizen Card System.

104 CORPORATE REQUIREMENT SYSTEM.

105 Advance User Management on Social Website.

106 Cloud Cyber Attacks against Social Networks .

107 Cloud Policy-Based File Assure Deletion .

108 Consumer Sales Online Fake Product Detection and Deletion .

109 Data theft detection mobile cloud computing.

Page 6: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

110 Encrypted Data Storage Vs Data Against Illegal Access.

111 A Game Theory for Online Security .

112 Information and Knowledge Extracting from a large amount of data.

113 Mobile TV Quality Management.

114 Movie Rating and Recommendation on Mobile.

115 Online Multi Type Documents Search Engine.

116 Personalize Your News on Web.

117 Product Market Manipulations on Asian stock market.

118 Quality Visualization on Web TV.

119 Annotation of short texts With Wikipedia pages.

120 Defending Against Web Application Vulnerabilities.

121 Enabling Site Interaction In Social Community.

122 FILE SEARCH ENGINE.

123 Movie Recommender Systems via User- Item Subgroups .

124 Online Banking With Fraud Detecting .

125 ONLINE MOBILE BILLING SYSTEM .

126 Online Search Ranking On Multiple Domain.

127 Secure Online Documents Management System In Cloud.

128 SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT.

129 Sql Tuner.

130 Web Hosting On Cloud.

131 Attribute Key Based Data Security System.

Page 7: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

132 Cloud Cost Management for Customer Sensitive Data.

133 Cloud Data Theft Attacks.

134 Industry Standard Authorization For Sensitive Resources.

135 Mobile TV Quality Management.

136 Web Parser on Sequence Alignment Techniques.

137 Customer Information Hiding for Data Mismanagement in Banking.

138 Digital Documents Attestation Systems.

139 Fast Web Information Gathering with Alias Detection.

140 Unique Web Resources Utilization Monitoring System.

141 Web Server Security with Web Client Management System.

142 Web crawler

143 Cargo Logistics

144 Citizen Card System

145 Cyber Hotelier

146 F city

147 IRC Chat Client

148 ON-LINE SELECTION SYSTEM

149 pharama ordering system

150 Powell's Book Repository

Page 8: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

JAVA IEEE 2013 LIST

Cloud Computing:-

S.no Project Title

1 Efficiently Representing Membership for Variable Large Data Sets

2 Toward a reliable, secure and fault tolerant smart grid state estimation in the cloud Virtualization

4 PDDS - Improving cloud data storage security using data partitioning technique

5 Introduction to the Decision Analytics, Mobile and Service Science Track (DA/MS/SS)

6 The Insecurity of Cloud Utility Models

7 Using Model Checking to Evaluate Live Migrations

8 CloudMoV: Cloud-based Mobile Social TV

9 Dynamic Scheduling and Pricing in Wireless Cloud Computing

10 Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud

Computing

11 Mobile Security: A Look Ahead

12 A epidemic style super-node election method based on self-information theory

13 Space race

14 A Cloud-Based Approach to Interoperable EHRs

15 IT in the Chinese Healthcare Industry

16 Realization of medical information analysis platform taking physical fitness checkup mode as an

example

17 Gathering clouds

18 Guest Editors' Introduction: Special Issue on Cloud Computing

19 Cloud AC: a cloud-oriented multilayer access control system for logic virtual domain

20 Image-Based Modeling of Unwrappable Façades

Page 9: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

21 Cloudrise: Exploring Cloud Computing Adoption and Governance with the TOE Framework

22 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video

Sharing in the Clouds

23 Design QoS-Aware Multi-Path Provisioning Strategies for Efficient Cloud-Assisted SVC Video

Streaming to Heterogeneous Clients

24 On the Investigation of Cloud-based Mobile Media Environments with Service-Populating and

QoS-aware Mechanisms

25 Hardware loads and power consumption in cloud computing environments

26 Data integrity and data dynamics with secure storage service in cloud

27 Improving Network I/O Virtualization for Cloud Computing

28 Evolving Smart Grid Information Management Cloudward: A Cloud Optimization Perspective

29 Application-aware optimization of networking protocols for data centers

30 Solar-Powered Cloud Computing Datacenters

31 Software defined networking opportunities for transport

32 A Framework for Consumer-Centric SLA Management of Cloud-Hosted Databases

33 Introduction to IT and Entrepreneurship Minitrack

34 Visualization framework for inter-domain access control policy integration

35 A Novel and Flexible Cloud Architecture for Data-Centric Applications

36 The future of cloud integration: Cloud Middleware?

37 Applications and Trends of High Performance Computing for Electric Power Systems: Focusing on

Smart Grid

38 Adaptive and attribute-based trust model for service level agreement guarantee in cloud computing

39 Cloud Computing for Green Construction Management

40 Beyond the Cloud: Cyberphysical Systems

41 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation

Page 10: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

42 Nano device simulations on Cloud Stack

43 A Green Software Development Life Cycle for Cloud Computing

44 A Highly Practical Approach toward Achieving Minimum Data Sets Storage Cost in the Cloud

45 A study on method deploying efficient cloud service framework in the public sector

46 A cloud computing based telemedicine service

47 GASE -an input domain reduction and branch coverage system based on Genetic Algorithm and

Symbolic Execution

48 Powering a Data Center Network via Renewable Energy: A Green Testbed

49 Seamless and non-contact health monitoring system in cloud computing

50 Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud

Computing Systems

51 A Designing and Research of Future Classroom Learning Support System Based on Cloud

Computing Technology

Network Securities:-

S.no Project Title

1 Secure continuous aggregation in wireless sensor networks

2 A fuzzy based credibility evaluation of recommended trust in pervasive computing environment

3 Target Detection in Bistatic Radar Networks: Node Placement and Repeated Security Game

4 Defensive mechanism for VANET security in game theoretic approach using heuristic based ant

colony optimization

5 Control of Wireless Networks with Secrecy

6 Communication security for smart grid distribution networks

7 Beamforming design of decode-and-forward cooperation for improving wireless physical layer

security

8 Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks

Page 11: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

9 Resilient Asymptotic Consensus in Robust Networks

10 An Overview of Anomaly Detection

11 Secure Electronic Health Record Exchange: Achieving the Meaningful Use Objectives

12 Security of Autonomous Systems Employing Embedded Computing and Sensors

13 An improved LFS engine for physical layer security augmentation in cognitive networks

14 Electrical Network Frequency (ENF) Maximum-Likelihood Estimation Via a Multitone Harmonic

Model

15 Mitigation of application DDoS attacks using ASNRI scheme for IP and MAC frames

16 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems

17 Cluster based Location privacy in Wireless Sensor Networks against a universal adversary

18 RFID system implementation in Jebel Ali port

19 Energy-Efficient Optimization for Physical Layer Security in Multi-Antenna Downlink Networks

with QoS Guarantee

20 A Strategy-Proof Radio Spectrum Auction Mechanism in Noncooperative Wireless Networks

21 On topology attack of a smart grid

22 A novel clustering paradigm for key pre-distribution: Toward a better security in homogenous

WSNs

23 Secure continuous aggregation in wireless sensor networks

24 A fuzzy based credibility evaluation of recommended trust in pervasive computing environment

25 In quest of benchmarking security risks to cyber-physical systems

26 A study on routing performance of 802.11 based wireless mesh networks under serious

attacks

27 A Next-Generation Approach to Combating Botnets

28 Performance evaluation of Hybrid Spread Spectrum based Advanced smart Metering

Page 12: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

Infrastructure network with Multi-User Detection techniques in jamming channel

29 Efficient Protocols For Secure Broadcast In Controller Area Networks

30 Identifying Infection Sources and Regions in Large Network

31 ID Proof on the Go: Development of a Mobile EEG-Based Biometric Authentication System

32 Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space

33 Dynamic key refreshment for smart grid mesh network security

34 A Survey of Group Key Distribution Schemes With Self-Healing Property

35 Security issues in vehicular networks

36 Lightweight Location Verification Algorithms for Wireless Sensor Networks

37 Avoiding a War on Unauthorized Computation

38 Vertical and horizontal circuit/packet integration techniques for the future optical internet

39 Accommodating the Variable Timing of Software AES Decryption on Mobile Receivers

40 An approach to identify anomaly with network data analysis

41 Editorial Low-Power, Intelligent, and Secure Solutions for Realization of Internet of Things

42 Stochastic Monitoring of Distribution Networks Including Correlated Input Variables

43 Secure access for MANET using authorization enforcement facility

44 A Survey on Security Aspects for LTE and LTE-A Networks

45 An RTOS-based architecture for industrial wireless sensor network stacks with multi-

processor support

46 Fast Deep Packet Inspection with a Dual Finite Automata

Page 13: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

47 A biometric-based security for data authentication in Wireless Body Area Network (WBAN)

48 An Identification System Based on Portable EEG Acquisition Equipment

49 A Distributed TCAM Coprocessor Architecture for Integrated Longest Prefix Matching,

Policy Filtering, and Content Filtering

50 In quest of benchmarking security risks to cyber-physical systems

51 A study on routing performance of 802.11 based wireless mesh networks under serious

attacks

Data Mining:-

S.no Project Title

1 Understanding and recommending play relationships in online social gaming

2 IMAGESEER: NASA IMAGEs for Science, Education, Experimentation and Research

3 Research on Forecast Method of Coal Mine Emergencies Base on Rough Sets-Neural

Network and Case-based Reasoning

4 Multitask Spectrum Sensing in Cognitive Radio Networks via Spatiotemporal Data Mining

5 Predicting Project Outcome Leveraging Socio-Technical Network Patterns

6 Forecast the Distribution of Urban Water Point by Using Improved DBSCAN Algorithm

7 Ontology Fusion in High-Level-Architecture-Based Collaborative Engineering Environments

8 Stock Market Prediction without Sentiment Analysis: Using a Web-Traffic Based Classifier

and User-Level Analysis

9 Semantic search for structured Web finder

Page 14: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

10 An Explicit Nonlinear Mapping for Manifold Learning

11 Profile-Based LC-MS Data Alignment &#x2014 A Bayesian Approach

12 Mining Developer Contribution in Open Source Software Using Visualization Techniques

13 Secure Mining of Association Rules in Horizontally Distributed Databases

14 The Research of Hydropower Unit Trouble Diagnosis System Based on Multi-Agent

15 Trajectory Improves Data Delivery in Urban Vehicular Networks

16 An Intelligent System for Large-scale Disaster Behavior Analysis and Reasoning

17 Measurement of similarity using link based cluster approach for categorical data

18 Nonnegative Matrix Factorization: A Comprehensive Review

19 VisIVO Workflow-Oriented Science Gateway for Astrophysical Visualization

20 Aspect-level opinion mining of online customer reviews

21 An integrated approach to derive effective rules from association rule mining using genetic

algorithm

22 Mammogram image feature selection using unsupervised tolerance rough set relative

reduct algorithm

23 ARMS: An Advanced Operational Risk Management System for Commercial Banks

24 Capturing Social Data Evolution Using Graph Clustering

25 Detection of proficient and distinct motifs in sequence data sets using PSM

26 IMAGESEER: NASA IMAGEs for Science, Education, Experimentation and Research

Page 15: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

27 Understanding and recommending play relationships in online social gaming

28 Manycore processor for video mining applications

29 The 3D Landscape Modeling and Application of Optimization Algorithms Based on the High-

resolution Satellite Image

30 Minimally Supervised Novel Relation Extraction Using a Latent Relational Mapping

31 Embedding Motion and Structure Features for Action Recognition

32 Minimization of Wind Farm Operational Cost Based on Data-Driven Models

33 Non-Intrusive Signature Extraction for Major Residential Loads

34 A Bayesian Network-Based Knowledge Engineering Framework for IT Service Management

35 Statistics in Semiconductor Test, Going Beyond Yield

36 Investigating the Increase in Mobile Phone Evidence in Criminal Activities

37 Detecting counterfeit products using supply chain event mining\

38 Short-term electric load forecasting using data mining technique

39 Bijective soft set based classification of medical data

40 Mining Semantic Context Information for Intelligent Video Surveillance of Traffic Scenes

41 Annotating Search Results from Web Databases

42 PMSE: A Personalized Mobile Search Engine

43 Relevant association rule mining from medical dataset using new irrelevant rule

elimination technique

44 Linear Mixture Analysis for Hyperspectral Imagery in the Presence of Less Prevalent

Page 16: IEEE 2013

Contact us: Opposite: Eenadu, Benz Circle, Vijayawada10.

Phone: 0866-6663599, 8142987999, 8142552999

Email: [email protected]

[email protected]

Materials

45 MultiComm: Finding Community Structure in Multi-Dimensional Networks

46 From -Means to Higher-Way Co-Clustering: Multilinear Decomposition With Sparse Latent

Factors

47 A game theory model for situation awareness and management

48 T-Drive: Enhancing Driving Directions with Taxi Drivers' Intelligence

49 Cancer detection using biclustering

50 Predicting School Failure and Dropout by Using Data Mining Techniques

51 Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers

52 Classification Tree for Risk Assessment in Patients Suffering From Congestive Heart Failure

via Long-Term Heart Rate Variability