This document lists 61 IEEE Java projects titles from the year 2013 across several domains:
1. The projects focused on topics related to cloud computing, data mining, mobile computing, networking, parallel and distributed systems, secure computing, wireless sensor networks, and image processing.
2. Specific projects aimed to improve load balancing in clouds, enable social video sharing in clouds, and address privacy and security issues in multi-cloud environments.
3. Other projects mined data for business events, protected privacy in public auditing of cloud storage, and developed frameworks for data integrity across clouds.
On National Teacher Day, meet the 2024-25 Kenan Fellows
Ieee 2013 java projects list
1. IEEE JAVA PROJECTS TITLES YEAR--2013
PROJECT TITLE DOMAIN
1. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
Development
Cloud Computing
2. AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Cloud Computing
2. Social Video Sharing in the Clouds
3. Collaboration in Multi Cloud Computing Environments Framework & Security
Issues
Cloud Computing
4. Mining Contracts for Business Events and Temporal Constraints in Service
Engagements
Cloud Computing
3. 5. Privacy Preserving Delegated Access Control in Public Cloud Cloud Computing
6. Privacy Preserving Public Auditing for Secure Cloud Storage Cloud Computing
7. Winds of Change from Vendor Lock-In to the Meta Cloud Cloud Computing
8. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme Cloud Computing
9. Load Rebalancing for Distributed File Systems in Clouds Cloud Computing
4. 10. Intelligent Lung Cancer Prediction System Data Mining
11. Fast nearest neighbor search with key words Data Mining
12. A Fast Clustering-Based Feature Subset Selection Algorithm for High
Dimensional Data
Data Mining
13. A System to Filter Unwanted Messages from OSN User Walls Data Mining
14. Cloud MoV Cloud-based Mobile Social TV Data Mining
5. 15. Comparable Entity Mining from Comparative Questions Data Mining
16. Crowd Sourcing Predictors of Behavioral Outcomes Data Mining
17. Facilitating effective user navigation through website structure improvement Data Mining
18. Focus Learning to Crawl Web Forums Data Mining
19. Incentive Compatible Privacy-Preserving Data Analysis Data Mining
20. PMSE : A Personalized Mobile Search Engine Data Mining
6. 21. Robust Module Based Data Management Data Mining
22. Sensitive Label Privacy Protection on Social Network Data Data Mining
23. Spatial Approximate String Search Data Mining
24. Multiparty Access Control for Online Social Networks: Model and Mechanisms Data Mining
7. 25. Annotating Search Results from Databases Data Mining
26. A Method for Mining Infrequent Causal Associations and Its Application in
Finding Adverse Drug Reaction Signal Pairs
Data Mining
27. m-Privacy for Collaborative Data Publishing Data Mining
28. Improving Various Reversible Data Hiding Schemes Image Processing
29. A Scalable Server Architecture for Mobile Presence Services in Social Network Mobile Computing
8. Applications
30. Distributed Cooperative Caching in Social Wireless Networks Mobile Computing
31. Mobile relay configuration in data-intensive wireless sensor networks Mobile Computing
32. Privacy Preserving Distributed Profile Matching in Proximity-based Mobile
Social Networks
Mobile Computing
33. Towards a statistical framework for source anonymity in sensor networks Mobile Computing
9. 34. Vampire attacks: Draining life from wireless ad-hoc sensor networks Mobile Computing
35. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected
Mobile Networks
Mobile Computing
36. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless
Networks
Mobile Computing
37. Discovery and verification of neighbor positions in mobile adhoc networks Mobile Computing
10. 38. Access Policy Consolidation for Event Processing Systems Networking
39. Fully Anonymous Profile Matching in Mobile Social Networks Networking
40. Optimizing Cloud Resources for Delivering IPTV Services through
Virtualization
Networking
41. Price Differentiation for Communication Networks Networking
11. 42. Pack: Prediction based cloud bandwidth and cost reduction system Networking
43. Fast-Transmission-to-Remote-Cooperative-Groups-A-New-Key-Management-
Paradigm
Networking
44. Dynamic resource allocation using virtual machines for cloud computing
environment
Parallel and
Distribution
45. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Parallel and
12. using Attribute-based Encryption distribution
46. CAM Cloud-Assisted Privacy Preserving Mobile Health Monitoring Secure Computing
47. Extracting Spread-Spectrum Hidden Data from Digital Media Secure Computing
48. Two Tales of Privacy in Online Social Networks Secure Computing
49. Utility-Privacy Tradeoff in Databases An Information-theoretic Approach Secure Computing
13. 50. A Secure Protocol For Spontaneous Wireless Ad-Hoc Network Creation Wireless Sensor
Networks
51. A Highly Scalable Key Pre Distribution Scheme For Wireless Sensor Networks Wireless Sensor
Networks
52. Attribute-Based Encryption With Verifiable Outsourced Decryption Secure Computing
53. Protecting Sensitive Labels in Social Network Data Anonymization Data Mining
14. 54. Privacy against Aggregate Knowledge Attacks Data Mining
55. IP-Geolocation Mapping for Moderately Connected Internet Regions Parallel and
distribution
56. Secure Mining Of Association Rules In Horizontally Distributed Databases Data Mining
57. SORT A Self-Organizing Trust Model for Peer-to-Peer Systems Secure Computing
58. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Code Words Multi Media
15. 59. Super-Resolution-based Inpainting Image Processing
60. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Networking
61. Intrusion Detection Technique by using K means, Fuzzy Neural Network and
SVM classifiers
Networking