SlideShare a Scribd company logo
1 of 3
1POINTER TECHNOLOGY
IEEE JAVA TITLES 2013

1. Toward Privacy Preserving And Collusion Resistance In A Location Proof Updating
System
2. Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using
Attribute Based Encryption
3. Distributed Detection In Mobile Access Wireless Sensor Networks Under Byzantine
Attacks
4. Lightweight Sybil Attack Detection In MANNETs
5. FTH-B&B: A Fault Tolerant Hierarchical Branch And Bound For Large Scale Unreliable
Environments
6. EPPDR: An Efficient Privacy Preserving Demand Response Scheme With Adaptive Key
Evaluation In Smart Grid
7. SORT: A Self -Organizing Trust Model For Peer-Peer Systems
8. Cross Domain Privacy Preserving Cooperative Firewall Optimization
9. Using Fuzzy Logic Control To Provide Intelligent Traffic Management Service For High
Speed Networks
10. A Survey Of Defense Mechanisms Against Denial Of Service (DDOS) Flooding Attacks
11. Social Tube: P2p Assisted Video Sharing In Online Social Network
12. Refining Reputation To Truly Select High-QoS Servers In Peer-Peer Networks
13. Attribute Aware Data Aggregation Using Potential Based Dynamic Routing In Wireless
Sensor Network
14. Delay Tolerant Bulk Data Transfer On The Internet
15. Range Based Skyline Queries In Mobile Environment
16. A Symmetric Load Balancing Algorithm With Performance Guarantees For DHT
17. Towards Secure Multi Keyword Top-K Retrieval Over Encrypted Cloud Data
18. Dynamic Optimization Of Multi Attribute Resource Allocation In Self Organization
Clouds
19. Privacy Preserving Back-Propagation Neural Networks Learning Made Practical With
Cloud Computing
20. A Cloud Based Approach For Interoperable EHRs
21. Electricity Cost Saving Strategies In Data Centers By Using Energy Storage
22. A Truthful Dynamic Workflow Scheduling Mechanism For Commercial Multi Cloud
Environment
23. Dynamic Resource Allocation Using Virtual Machines For Cloud Computing
Environment
24. Hint Based Execution Of Workload In Cloud With Nefeli
No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.
Ph – 044 342323407; Mobile –9043350456, 9500139248
Email: onepointertechnology@gmail.com website: www.1pointer.com
1POINTER TECHNOLOGY
25. Performance Of Virtual Machines Under Networked Denial Of Service Attacks:
Experiments And Analysis
26. Coaching The Exploration And Exploitation In Active Learning For Interactive Video
Retrieval
27. Focus: Learning To Crawl Web Forums
28. On The Investigation Of Cloud Based Mobile Media Environments With Service
Population And QoS Aware Mechanisms
29. C-Mart: Benchmarking The Cloud
30. Design And Implementation Of A Web Service Based Public Oriented Personalized
Health Care Platform
31. Scalable Distributed Service Integrity Attestation for Software As A Service Clouds.
32. Heap Graph Based Software Theft Detection
33. Security And Privacy Enhancing Multi Cloud Architecture
34. Nice: Network Intrusion Detection And Countermeasure Selection In Virtual Network
System
35. Workload Based Software Rejuvenation In Cloud Systems
36. Defeating Sql Injection
37. Service Oriented Architecture In Variability Intensive Environment: Pitfalls And Best
Practices In The Example Of Local E-Government
38. Systematic Elaboration Of Scalability Requirements Through Goal Obstacle Analysis
39. A Software Suite For Efficient Use Of The European Qualifications Framework In
Online And Blended Courses
40. Self Organizing Roles On Agile Software Development Team
41. Context Dependent Logo Matching And Recognition
42. Robust Document Image Binarization Technique For Degrade Document Images
43. Fingerprint Combination For Privacy Protection
44. Automatic Segmentation Of Scaling In 2-D Psoriasis Skin Images
45. Improving The Network Lifetime Of Mannets Through Cooperative Mac Protocol
Design
46. Beyond Text QA: Multimedia Answer Generation By Harvesting Web Information
47. CloudMoV: Cloud Based Mobile Social Network TV
48. How To Use Search Engine Optimization Techniques To Increase Website Visibility
49. A Method For Mining Infrequent Causal Association And Its Application In Finding
Adverse Drug Reaction Signal Pairs
50. Reinforced Similarity Integration In Image Rich Information Networks
51. Evaluating Data Reliability: An Evidential Answer With Application To A Web Enabled
Data Warehouse
52. Discovering The Top-K Unexplained Sequences In Time Stamped Observation Data
No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.
Ph – 044 342323407; Mobile –9043350456, 9500139248
Email: onepointertechnology@gmail.com website: www.1pointer.com
1POINTER TECHNOLOGY
53. CDAMA: Concealed Data Aggregation Scheme For Multiple Application In Wireless
Sensor Network
54. Infusing Social Network With Culture
55. Pay-As-You-Go Entity Resolution
56. A User-Friendly Patent Search Paradigm
57. Incentive Compatible Privacy Preserving Data Analysis
58. Bad Data Injection Attack And Defense In Electricity Market Using Game Theory Study
59. DNS For Massive Scale Command And Control
60. Optimal Client-Server Assignment For Internet Distributed System
61. A Distributed Control Law for Load Balancing In Content Delivery Networks.
62. Fuzzy Web Data Tables Integration Guided By An Ontological And Terminological
Resource
63. Conditional Privacy Preserving Security Protocol For NFC Application

………Your Own Concept Papers Can Be Accepted

No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017.
Ph – 044 342323407; Mobile –9043350456, 9500139248
Email: onepointertechnology@gmail.com website: www.1pointer.com

More Related Content

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

final year Ieee java project titles 2013 2014

  • 1. 1POINTER TECHNOLOGY IEEE JAVA TITLES 2013 1. Toward Privacy Preserving And Collusion Resistance In A Location Proof Updating System 2. Scalable And Secure Sharing Of Personal Health Records In Cloud Computing Using Attribute Based Encryption 3. Distributed Detection In Mobile Access Wireless Sensor Networks Under Byzantine Attacks 4. Lightweight Sybil Attack Detection In MANNETs 5. FTH-B&B: A Fault Tolerant Hierarchical Branch And Bound For Large Scale Unreliable Environments 6. EPPDR: An Efficient Privacy Preserving Demand Response Scheme With Adaptive Key Evaluation In Smart Grid 7. SORT: A Self -Organizing Trust Model For Peer-Peer Systems 8. Cross Domain Privacy Preserving Cooperative Firewall Optimization 9. Using Fuzzy Logic Control To Provide Intelligent Traffic Management Service For High Speed Networks 10. A Survey Of Defense Mechanisms Against Denial Of Service (DDOS) Flooding Attacks 11. Social Tube: P2p Assisted Video Sharing In Online Social Network 12. Refining Reputation To Truly Select High-QoS Servers In Peer-Peer Networks 13. Attribute Aware Data Aggregation Using Potential Based Dynamic Routing In Wireless Sensor Network 14. Delay Tolerant Bulk Data Transfer On The Internet 15. Range Based Skyline Queries In Mobile Environment 16. A Symmetric Load Balancing Algorithm With Performance Guarantees For DHT 17. Towards Secure Multi Keyword Top-K Retrieval Over Encrypted Cloud Data 18. Dynamic Optimization Of Multi Attribute Resource Allocation In Self Organization Clouds 19. Privacy Preserving Back-Propagation Neural Networks Learning Made Practical With Cloud Computing 20. A Cloud Based Approach For Interoperable EHRs 21. Electricity Cost Saving Strategies In Data Centers By Using Energy Storage 22. A Truthful Dynamic Workflow Scheduling Mechanism For Commercial Multi Cloud Environment 23. Dynamic Resource Allocation Using Virtual Machines For Cloud Computing Environment 24. Hint Based Execution Of Workload In Cloud With Nefeli No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248 Email: onepointertechnology@gmail.com website: www.1pointer.com
  • 2. 1POINTER TECHNOLOGY 25. Performance Of Virtual Machines Under Networked Denial Of Service Attacks: Experiments And Analysis 26. Coaching The Exploration And Exploitation In Active Learning For Interactive Video Retrieval 27. Focus: Learning To Crawl Web Forums 28. On The Investigation Of Cloud Based Mobile Media Environments With Service Population And QoS Aware Mechanisms 29. C-Mart: Benchmarking The Cloud 30. Design And Implementation Of A Web Service Based Public Oriented Personalized Health Care Platform 31. Scalable Distributed Service Integrity Attestation for Software As A Service Clouds. 32. Heap Graph Based Software Theft Detection 33. Security And Privacy Enhancing Multi Cloud Architecture 34. Nice: Network Intrusion Detection And Countermeasure Selection In Virtual Network System 35. Workload Based Software Rejuvenation In Cloud Systems 36. Defeating Sql Injection 37. Service Oriented Architecture In Variability Intensive Environment: Pitfalls And Best Practices In The Example Of Local E-Government 38. Systematic Elaboration Of Scalability Requirements Through Goal Obstacle Analysis 39. A Software Suite For Efficient Use Of The European Qualifications Framework In Online And Blended Courses 40. Self Organizing Roles On Agile Software Development Team 41. Context Dependent Logo Matching And Recognition 42. Robust Document Image Binarization Technique For Degrade Document Images 43. Fingerprint Combination For Privacy Protection 44. Automatic Segmentation Of Scaling In 2-D Psoriasis Skin Images 45. Improving The Network Lifetime Of Mannets Through Cooperative Mac Protocol Design 46. Beyond Text QA: Multimedia Answer Generation By Harvesting Web Information 47. CloudMoV: Cloud Based Mobile Social Network TV 48. How To Use Search Engine Optimization Techniques To Increase Website Visibility 49. A Method For Mining Infrequent Causal Association And Its Application In Finding Adverse Drug Reaction Signal Pairs 50. Reinforced Similarity Integration In Image Rich Information Networks 51. Evaluating Data Reliability: An Evidential Answer With Application To A Web Enabled Data Warehouse 52. Discovering The Top-K Unexplained Sequences In Time Stamped Observation Data No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248 Email: onepointertechnology@gmail.com website: www.1pointer.com
  • 3. 1POINTER TECHNOLOGY 53. CDAMA: Concealed Data Aggregation Scheme For Multiple Application In Wireless Sensor Network 54. Infusing Social Network With Culture 55. Pay-As-You-Go Entity Resolution 56. A User-Friendly Patent Search Paradigm 57. Incentive Compatible Privacy Preserving Data Analysis 58. Bad Data Injection Attack And Defense In Electricity Market Using Game Theory Study 59. DNS For Massive Scale Command And Control 60. Optimal Client-Server Assignment For Internet Distributed System 61. A Distributed Control Law for Load Balancing In Content Delivery Networks. 62. Fuzzy Web Data Tables Integration Guided By An Ontological And Terminological Resource 63. Conditional Privacy Preserving Security Protocol For NFC Application ………Your Own Concept Papers Can Be Accepted No: 41, Opposite to Nathella Jewellery, south usman Road, T.Nagar, Chennai-600 017. Ph – 044 342323407; Mobile –9043350456, 9500139248 Email: onepointertechnology@gmail.com website: www.1pointer.com