Get 2014 Quality Java IEEE Projects @ Low Cost Call Us 9566355386 / 9962588976
JAVA IEEE Projects
S.No | Code | Titles | Domain | Year |
---|---|---|---|---|
1 | LM_J014_01 | Supporting Privacy Protection in Personalized Web Search | Data Mining | Feb 2014 |
2 | LM_J014_02 | Fast Nearest Neighbor Search with Keywords | Data Mining | April 2014 |
3 | LM_J014_03 | Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme | Data Mining | Jan 2014 |
4 | LM_J014_04 | LARS: An Efficient and Scalable Location-Aware Recommender System | Data Mining | June 2014 |
5 | LM_J014_05 | Dynamic Query Forms for Database Queries | Data Mining | Preprint |
6 | LM_J014_06 | Privacy Preserving Delegated Access Control in Public Clouds | Data Mining | Preprint |
7 | LM_J014_07 | m-Privacy for Collaborative Data Publishing | Data Mining | Preprint |
8 | LM_J014_08 | Scalable Keyword Search on Large RDF Data | Data Mining | Preprint |
9 | LM_J014_09 | Secure Mining of Association Rules in Horizontally Distributed Databases | Data Mining | April 2014 |
10 | LM_J014_10 | Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation - Information Forensics and Security | Image Processing | Jan 2014 |
11 | LM_J014_11 | Fingerprint Compression Based on Sparse Representation | Image Processing | Feb 2014 |
12 | LM_J014_12 | Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression | Image Processing | Jan 2014 |
13 | LM_J014_13 | Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud | Cloud Computing | March 2014 |
14 | LM_J014_14 | Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing | Cloud Computing | Jan 2014 |
15 | LM_J015_15 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Networking | Feb 2014 |
16 | LM_J014_16 | Incentive Based Data Sharing in Delay Tolerant Mobile Networks | Wireless Communication | Jan 2014 |
17 | LM_J015_17 | Hiding in the Mobile Crowd: Location Privacy through Collaboration | Network Security | Aug 2015 |
18 | LM_J014_18 | Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks | Mobile Computing | Feb 2014 |
19 | LM_J014_19 | SocialTube: P2P-Assisted Video Sharing in Online Social Networks | Mobile Computing | Sep 2014 |
20 | LM_J014_20 | Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks | Mobile Computing | Preprint |
21 | LM_J014_21 | Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks | Mobile Computing | March 2014 |
22 | LM_J014_22 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | Mobile Computing | Preprint |
23 | LM_J014_23 | Distributed Resource Allocation for Multi-Cell Relay-Aided OFDMA Systems | Mobile Computing | Sep 2014 |
24 | LM_J014_24 | Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | Parallel Distributed Systems | Feb 2014 |
25 | LM_J014_25 | Traffic pattern-based content leakage detection for trusted content delivery networks | Parallel Distributed Systems | Feb 2014 |
26 | LM_J014_26 | A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis | Parallel Distributed Systems | Feb 2014 |
27 | LM_J014_27 | Cross-Layer Approach for Minimizing Routing Disruption in IP Networks | Parallel Distributed Systems | July 2014 |
28 | LM_J014_28 | Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage | Parallel Distributed Systems | Feb 2014 |
29 | LM_J014_29 | Bandwidth Distributed Denial of Service: Attacks and Defenses | Security and Privacy | Feb 2014 |
- Java IEEE Projects Titles 2014
-
JAVA IEEE Projects
S.No Code Titles Domain Year 1 LM_J014_01 Supporting Privacy Protection in Personalized Web Search Data Mining Feb 2014 2 LM_J014_02 Fast Nearest Neighbor Search with Keywords Data Mining April 2014 3 LM_J014_03 Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme Data Mining Jan 2014 4 LM_J014_04 LARS: An Efficient and Scalable Location-Aware Recommender System Data Mining June 2014 5 LM_J014_05 Dynamic Query Forms for Database Queries Data Mining Preprint 6 LM_J014_06 Privacy Preserving Delegated Access Control in Public Clouds Data Mining Preprint 7 LM_J014_07 m-Privacy for Collaborative Data Publishing Data Mining Preprint 8 LM_J014_08 Scalable Keyword Search on Large RDF Data Data Mining Preprint 9 LM_J014_09 Secure Mining of Association Rules in Horizontally Distributed Databases Data Mining April 2014 10 LM_J014_10 Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation - Information Forensics and Security Image Processing Jan 2014 11 LM_J014_11 Fingerprint Compression Based on Sparse Representation Image Processing Feb 2014 12 LM_J014_12 Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression Image Processing Jan 2014 13 LM_J014_13 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing March 2014 14 LM_J014_14 Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing Cloud Computing Jan 2014 15 LM_J015_15 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking Feb 2014 16 LM_J014_16 Incentive Based Data Sharing in Delay Tolerant Mobile Networks Wireless Communication Jan 2014 17 LM_J015_17 Hiding in the Mobile Crowd: Location Privacy through Collaboration Network Security Aug 2015 18 LM_J014_18 Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks Mobile Computing Feb 2014 19 LM_J014_19 SocialTube: P2P-Assisted Video Sharing in Online Social Networks Mobile Computing Sep 2014 20 LM_J014_20 Energy-optimum Throughput and Carrier Sensing Rate in CSMA-based Wireless Networks Mobile Computing Preprint 21 LM_J014_21 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing March 2014 22 LM_J014_22 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks Mobile Computing Preprint 23 LM_J014_23 Distributed Resource Allocation for Multi-Cell Relay-Aided OFDMA Systems Mobile Computing Sep 2014 24 LM_J014_24 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Parallel Distributed Systems Feb 2014 25 LM_J014_25 Traffic pattern-based content leakage detection for trusted content delivery networks Parallel Distributed Systems Feb 2014 26 LM_J014_26 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Parallel Distributed Systems Feb 2014 27 LM_J014_27 Cross-Layer Approach for Minimizing Routing Disruption in IP Networks Parallel Distributed Systems July 2014 28 LM_J014_28 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Parallel Distributed Systems Feb 2014 29 LM_J014_29 Bandwidth Distributed Denial of Service: Attacks and Defenses Security and Privacy Feb 2014