Contact Us.- 09993897203
Email: ramnath@dstarena.com,
Add:146/7/2 Premium Center
Zone-1,MP Nagar
Bhopal-462011

Registration
MATLAB,PHP,VHDL(VLSI),EMBEDDED SYSTEM,ANDROID WEBSITE DESIGN Industrial Training will be start Soon

JAVA

Branch: Computer Science 

Topic: JAVA

S.no. Project code Project theme Technology Download
1 ICDST-JV01 Keyword Extraction and Clustering for Document Recommendation in Conversations Data Mining Download
2 ICDST-JV02 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Cloud Computing Download
3 ICDST-JV03 Improving Accuracy and Robustness of Self-Tuning Histograms by Subspace Clustering Data Mining Download
4 ICDST-JV04 Privacy Protection for Wireless Medical Sensor Data Dependable and Secure Computing Download
5 ICDST-JV05 Audit-Free Cloud Storage via Deniable Attribute-based Encryption Cloud Computing Download
6 ICDST-JV06 TRIP: An Interactive Retrieving-Inferring Data Imputation Approach Data Mining Download
7 ICDST-JV07 CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability Cloud Computing Download
8 ICDST-JV08 Secure Auditing and Deduplicating Data in Cloud Cloud Computing Download
9 ICDST-JV09 Pattern-Aided Regression Modeling and Prediction Model Analysis Download
10 ICDST-JV10 A Decentralized Cloud Firewall Framework with Resources Provisioning Cost Optimization Cloud Computing Download
11 ICDST-JV11 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing Download
12 ICDST-JV12 On efficient feature ranking methods for High-throughput data analysis Data Mining Download
13 ICDST-JV13 A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Mobile Computing Download
14 ICDST-JV14 Online Resource Scheduling under Concave Pricing for Cloud Computing Cloud Computing Download
15 ICDST-JV15 The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Networking Download
16 ICDST-JV16 A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection Data Mining Download
17 ICDST-JV17 System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments Cloud Computing Download
18 ICDST-JV18 Efficient Algorithms for Mining the Concise and Lossless Representation of High Utility Item sets Data Mining Download
19 ICDST-JV19 A Computational Dynamic Trust Model for User Authorizationic Dependable and Secure Computing Download
20 ICDST-JV20 Top-k Similarity Join in Heterogeneous Information Networks Data Mining Download
21 ICDST-JV21 CPCDN: Content Delivery Powered by Context and User Intelligence Data Mining Download
22 ICDST-JV22 Active Learning for Ranking through Expected Loss Optimization Data Mining Download
23 ICDST-JV23 Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption Dependable and Secure Computing` Download
24 ICDST-JV24 Relational Collaborative Topic Regression for Recommender Systems Data Mining Download
25 ICDST-JV25 Relevance Feature Discovery for Text Mining Data Mining Download
26 ICDST-JV26 Differentially Private Frequent Itemset Mining via Transaction Splitting Data Mining Download
27 ICDST-JV27 Differentially Private Frequent Itemset Mining via Transaction Splitting Cloud Computing Download
28 ICDST-JV28 Mining Partially-Ordered Sequential Rules Common to Multiple Sequences Data Mining Download
29 ICDST-JV29 Backward Path Growth for Efficient Mobile Sequential Recommendation Data Mining Download
30 ICDST-JV30 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Dependable and Secure Computing Download
31 ICDST-JV31 On the Security of Data Access Control for Multi authority Cloud Storage Systems Service Computing Download
32 ICDST-JV32 QoS Evaluation for Web Service Recommendation Service Computing Download
33 ICDST-JV33 CRoM and HuspExt: Improving Efficiency of High Utility Sequential Pattern Extraction Data Mining Download
34 ICDST-JV34 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Data Mining Download
35 ICDST-JV35 FastRAQ: A Fast Approach to Range-Aggregate Queries in Big Data Environments Cloud Computing Download
36 ICDST-JV36 Global Redundancy Minimization for Feature Ranking Data Mining Download
37 ICDST-JV37 Review Selection Using Micro-Reviews Data Mining Download
38 ICDST-JV38 Towards Information Diffusion in Mobile Social Networks Mobile Computing Download
39 ICDST-JV39 Location-Sharing Systems With Enhanced Privacy in Mobile Online Social Networks Networking Download
40 ICDST-JV40 Mobile Based Healthcare Management Using Artificial Intelligence Data Mining Download
41 ICDST-JV41 PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving m-Healthcare Cloud Computing System Parallel and Distributed Computing Download
42 ICDST-JV42 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks Parallel and Distributed Computing Download
43 ICDST-JV43 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks Networking Download
44 ICDST-JV44 Optimized Resource Management Decision System (ORM-DS) for Distributed Infrastructure Management in Cloud Computing Cloud Computing Download
45 ICDST-JV45 A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks Networking Download
46 ICDST-JV46 Revisiting Attribute-Based Encryption with Verifiable Outsourced Decryption Data Mining Download
47 ICDST-JV47 Extending Association Rule Summarization Techniques to Assess Risk of Diabetes Mellitus Data Mining Download
48 ICDST-JV48 Verifiable Auditing for Outsourced Database in Cloud Computing Cloud Computing Download
49 ICDST-JV49 A Cost-Effective Deadline-Constrained Dynamic Scheduling Algorithm for Scientific Workflows in a Cloud Environment Cloud Computing Download
50 ICDST-JV50 A Cost-Effective Deadline-Constrained Dynamic Scheduling Algorithm for Scientific Workflows in a Cloud Environment Data Mining Download
51 ICDST-JV51 A Cost-Effective Deadline-Constrained Dynamic Scheduling Algorithm for Scientific Workflows in a Cloud Environment Parallel and Distributed Computing Download
52 ICDST-JV52 A Joint Segmentation and Classification Framework for Sentence Level Sentiment Classification Data Mining Download
53 ICDST-JV53 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing Download
54 ICDST-JV54 A Similarity-Based Learning Algorithm Using Distance Transformation Data Mining Download
55 ICDST-JV55 A Similarity-Based Learning Algorithm Using Distance Transformation Data Mining Download
56 ICDST-JV56 A Universal Fairness Evaluation Framework for Resource Allocation in Cloud Computing Cloud Computing Download
57 ICDST-JV57 Active Learning from Relative Comparisons Data Mining Download
58 ICDST-JV58 Adaptive Processing for Distributed Skyline Queries over Uncertain Data Data Mining Download
59 ICDST-JV59 Adding Geospatial Data Provenance into SDI—A Service-Oriented Approach Data Mining Download
60 ICDST-JV60 Aggressive Resource Provisioning for Ensuring QOS in virtualized Environment Data Mining Download
61 ICDST-JV61 An Access Control Model for Online Social Networks Using User-to-User Relationships Dependable and Secure Computing Download
62 ICDST-JV62 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration Cloud Computing Download
63 ICDST-JV63 An Efficient Privacy-Preserving Ranked Keyword Search Method Parallel and Distributed Computing Download
64 ICDST-JV64 An Intelligent Economic Approach for Dynamic Resource Allocation in Cloud Services Cloud Computing Download
65 ICDST-JV65 An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques Data Mining Download
66 ICDST-JV66 ANGEL: Agent-Based Scheduling for Real-Time Tasks in Virtualized Clouds Cloud Computing Download
67 ICDST-JV67 Answering Pattern Queries Using Views Download
68 ICDST-JV68 Attribute-based  Access  Control  with  Constant-size  Ciphertext  in Cloud Computing Cloud Computing Download
69 ICDST-JV69 Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server Cloud Computing Download
70 ICDST-JV70 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing Download
71 ICDST-JV71 CloudArmor: Supporting Reputation-based Trust Management for Cloud Services Cloud Computing Download
72 ICDST-JV72 Cloud-Assisted Safety Message Dissemination in VANET–Cellular Heterogeneous Wireless Network Cloud Computing Download
73 ICDST-JV73 CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework Cloud Computing Download
74 ICDST-JV74 Clustering Deviations for Black Box Regression Testing of Database Applications Data Mining Download
75 ICDST-JV75 Collaboration- and Fairness-Aware Big Data Management in Distributed Clouds Cloud Computing Download
76 ICDST-JV76 Collaborative Task Execution in Mobile Cloud Computing Under a Stochastic Wireless Channel Data Mining Download
77 ICDST-JV77 Collaborative Task Execution in Mobile Cloud Computing Under a Stochastic Wireless Channel Mobile Computing Download
78 ICDST-JV78 Context-based Collaborative Filtering for Citation Recommendation Data Mining Download
79 ICDST-JV79 Context-based Collaborative Filtering for Citation Recommendation Data Mining Download
80 ICDST-JV80 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks Parallel and Distributed Computing Download
81 ICDST-JV81 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security Data Mining Download
82 ICDST-JV82 Crowdsourcing for Top-K Query Processing over Uncertain Data Data Mining Download
83 ICDST-JV83 DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party Cloud Computing Download
84 ICDST-JV84 Deleting Secret Data with Public Verifiability Dependable and Secure Computing Download
85 ICDST-JV85 Design and Evaluation of the Optimal Cache Allocation for Content-Centric Networking Networking Download
86 ICDST-JV86 Designing High-Performance Web-Based Computing Services to Promote Telemedicine Database Management System Service Computing Download
87 ICDST-JV87 Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis Mobile Computing Download
88 ICDST-JV88 Discovering Latent Semantics in Web Documents using Fuzzy Clustering Data Mining Download
89 ICDST-JV89 Discovery of Ranking Fraud for Mobile Apps Data Mining Download
90 ICDST-JV90 Distributed Database Management Techniques for Wireless Sensor Networks Parallel and Distributed Computing Download
91 ICDST-JV91 Distributed denial of service attacks in software-defined networking with cloud computing Networking Download
92 ICDST-JV92 Disease Inference from Health-Related Questions via Sparse Deep Learning Service Computing Download
93 ICDST-JV93 DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security Cloud Computing Download
94 ICDST-JV94 Dynamic Bin Packing for On-Demand Cloud Resource Allocation Parallel and Distributed Computing Download
95 ICDST-JV95 Dynamic Proofs of Retrievability for Coded Cloud Storage Systems Service Computing Download
96 ICDST-JV96 Efficient Attribute-Based Comparable Data Access Control Data Mining Download
97 ICDST-JV97 Efficient Keyword Searching in Large-scale Social Network Service Service Computing Download
98 ICDST-JV96 Efficient Attribute-Based Comparable Data Access Control Data Mining Download
99 ICDST-JV99 Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem Cloud Computing Download
100 ICDST-JV100 Energy-Efficient Group Key Agreement for Wireless Networks Wireless Sensor Networking Download
101 ICDST-JV101 Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security Networking Download
102 ICDST-JV102 Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET Networking Download
103 ICDST-JV103 Facilitating Coordination between Software Developers: A Study and Techniques for Timely and Efficient Recommendations Software Engineering Download
104 ICDST-JV104 Finding Top k Most Influential Spatial Facilities over Uncertain Objects Data Mining Download
105 ICDST-JV105 Fine-Grained Knowledge Sharing in Collaborative Environments Data Mining Download
106 ICDST-JV106 Flexible Data Access Control based on Trust and Reputation in Cloud Computing Cloud Computing Download
107 ICDST-JV107 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Cloud Computing Download
108 ICDST-JV108 Indexing Evolving Events from Tweet Streams Data Mining Download
109 ICDST-JV109 Integrating Human Behavior Modeling and Data Mining Techniques to Predict Human Errors in Numerical Typing Data Mining Download
110 ICDST-JV110 IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios Data Mining Download
111 ICDST-JV111 Joint Optimization of Resource Provisioning in Cloud Computing Service Computing Download
112 ICDST-JV112 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Cloud Computing Download
113 ICDST-JV113 k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data Data Mining Download
114 ICDST-JV114 kNNVWC: An Efficientk-Nearest Neighbours Approach based on Various-Widths Clustering Data Mining Download
115 ICDST-JV115 Local Feature Selection for Data Classification Data Mining Download
116 ICDST-JV116 Location Aware Keyword Query Suggestion Based on Document Proximity Data Mining Download
117 ICDST-JV117 Location-Aware and Personalized Collaborative Filtering  for  Web Service Recommendation Service Computing Download
118 ICDST-JV118 Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks Wireless Sensor Networking Download
119 ICDST-JV119 Malware Propagation in Large-Scale Networks Networking Download
120 ICDST-JV120 Mathematical Programming Approach for Revenue Maximization in Cloud Federations Cloud Computing Download
121 ICDST-JV121 Mining Temporal Patterns in Time Interval-based Data Data Mining Download
122 ICDST-JV122 Multi-Objective Service Composition in Uncertain Environments Service Computing Download
123 ICDST-JV123 My Privacy My Decision: Control of Photo Sharing on Online Social Networks Dependable and Secure Computing Download
124 ICDST-JV124 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications Parallel and Distributed Computing Download
125 ICDST-JV125 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices Cloud Computing Download
126 ICDST-JV126 Optimal Cloudlet Placement and User to Cloudlet Allocation in Wireless Metropolitan Area Networks Cloud Computing Download
127 ICDST-JV127 Pattern-based Topics for Document Modelling in Information Filtering Data Mining Download
128 ICDST-JV128 Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing Cloud Computing Download
129 ICDST-JV129 Polarity Consistency Checking for Domain Independent Sentiment Dictionaries Data Mining Download
130 ICDST-JV130 Predicting User-Topic Opinions in Twitter with Social and Topical Context Mobile Computing Download
131 ICDST-JV131 Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks Wireless Sensor Networking Download
132 ICDST-JV132 Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage Data Mining Download
133 ICDST-JV133 Privacy-Preserving Detection of Sensitive Data Exposure Data Mining Download
134 ICDST-JV134 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data Cloud Computing Download
135 ICDST-JV135 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems Cloud Computing Download
136 ICDST-JV136 Providing Privacy-Aware Incentives in Mobile Sensing Systems Mobile Computing Download
137 ICDST-JV137 RankRC: Large-scale Nonlinear Rare Class Ranking Data Mining Download
138 ICDST-JV138 Response Time Based Optimal Web Service Selection Data Mining Download
139 ICDST-JV139 Reverse Keyword Search for Spatio-Textual Top-kQueries in Location-Based Services Parallel and Distributed Computing Download
140 ICDST-JV140 Reverse Keyword Search for Spatio-Textual Top-kQueries in Location-Based Services Data Mining Download
141 ICDST-JV141 Robust cloud management of MANET checkpoint sessions Cloud Computing Download
142 ICDST-JV142 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks Cloud Computing Download
143 ICDST-JV143 Scalable Distributed Processing Of K Nearest Neighbore Queries over Moving Objects Data Mining Download
144 ICDST-JV144 Secure Anonymous Key Distribution Scheme for Smart Grid Networking Download
145 ICDST-JV145 Secure Cloud Storage Meets with Secure Network Coding Networking Download
146 ICDST-JV146 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks Dependable and Secure Computing Download
147 ICDST-JV147 SeDaSC: Secure Data Sharing in Clouds Cloud Computing Download
148 ICDST-JV148 Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Cloud Computing Download
149 ICDST-JV149 Sentiment analysis: from opinion mining to human-agent interaction Data Mining Download
150 ICDST-JV150 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing Parallel and Distributed Computing Download
151 ICDST-JV151 Similarity Measure Selection for Clustering Time Series Databases Data Mining Download
152 ICDST-JV152 Social Recommendation with Cross-Domain Transferable Knowledge Data Mining Download
153 ICDST-JV153 Splitting Large Medical Data Sets based on Normal Distribution in Cloud Environment Cloud Computing Download
154 ICDST-JV154 Steganography Using Reversible Texture Synthesis Digital Image Processing Download
155 ICDST-JV155 TASC:Topic-Adaptive Sentiment Classification on Dynamic Tweets Data Mining Download
156 ICDST-JV156 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud Computing Download
157 ICDST-JV157 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage Data Mining Download
158 ICDST-JV158 Towards Effective Bug Triage with Software Data Reduction Techniques Data Mining Download
159 ICDST-JV159 Towards Privacy Preserving Publishing of set-valued Data on Hybrid Cloud Cloud Computing Download
160 ICDST-JV160 Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds Cloud Computing Download
161 ICDST-JV161 Transparent Real-Time Task Scheduling on Temporal Resource Partitions Data Mining Download
162 ICDST-JV162 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

 

 

Cloud Computing Download
163 ICDST-JV163 User-Defined Privacy Grid System for Continuous Location-Based Services Mobile Computing Download
164 ICDST-JV164 Using ant colony system to consolidate VMS for green cloud computing Service Computing Download
165 ICDST-JV165 Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing Cloud Computing Download
166 ICDST-JV166 VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils Data Mining Download
167 ICDST-JV167 Network-Based Modeling and Intelligent Data Mining of Social Media for Improving Care Networking Download
168 ICDST-JV168 An Integrated Semantic Web Service Discovery and Composition Framework Networking Download
169 ICDST-JV169 DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks Mobile Computing Download
170 ICDST-JV170 Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems Cloud Computing Download
171 ICDST-JV171 Delay Models for Static and Adaptive Persistent Resource Allocations in Wireless Systems Mobile Computing Download
172 ICDST-JV172 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Mobile Computing Download
173 ICDST-JV173 Dynamic Job Ordering and Slot Configurations for MapReduce Workloads Service Computing Download
174 ICDST-JV174 DyScale: a MapReduce Job Scheduler for Heterogeneous Multicore Processors Cloud Computing Download
175 ICDST-JV175 Group Key Agreement with Local Connectivity Dependable and Secure Computing Download
176 ICDST-JV176 HFSP: Bringing Size-Based Scheduling To Hadoop Cloud Computing Download
177 ICDST-JV177 High Performance and High Scalable Packet Classification Algorithm for Network Security Systems Dependable and Secure Computing Download
178 ICDST-JV178 Low-Rate DoS Attacks Detection Based on Network Multifractal Dependable and Secure Computing Download
179 ICDST-JV179 Malware Detection in Cloud Computing Infrastructures Dependable and Secure Computing Download
180 ICDST-JV180 PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications Dependable and Secure Computing Download
181 ICDST-JV181 Performance-Aware Cloud Resource Allocation via Fitness-enabled Auction Parallel and Distributed Computing Download
182 ICDST-JV182 POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks Parallel and Distributed Computing Download
183 ICDST-JV183 Processes Meet Big Data: Connecting Data Science with Process Science Service Computing Download
184 ICDST-JV184 Risk Aware Query Replacement Approach for Secure Databases Performance Management Dependable and Secure Computing Download
185 ICDST-JV185 Robinhood: Towards Efficient Work-stealing in Virtualized Environments Parallel and Distributed Computing Download
186 ICDST-JV186 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces Service Computing Download
187 ICDST-JV187 Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Dependable and Secure Computing Download
188 ICDST-JV188 Towards Detecting Compromised Accounts on Social Networks Dependable and Secure Computing Download
189 ICDST-JV189 TruXy: Trusted Storage Cloud for Scientific Workflows Cloud Computing Download
190 ICDST-JV190 Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing Cloud Computing Download
191 ICDST-JV191 Compact Conformal Map for Greedy Routing in Wireless Mobile Sensor Networks Networking Download
192 ICDST-JV192 Efficient Algorithms for Mining Top-K High Utility Itemsets Data Mining Download
193 ICDST-JV193 Unsupervised Feature Selection with Controlled Redundancy (UFeSCoR) Data Mining Download
194 ICDST-JV194 Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services Data Mining Download
195 ICDST-JV195 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

 

Cloud Computing Download
196 ICDST-JV196 RODS: Rarity based Outlier Detection in a Sparse Coding Framework Data Mining Download
197 ICDST-JV197 Diversifying Web Service Recommendation Results via Exploring Service Usage History Service Computing Download
198 ICDST-JV198 Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing Cloud Computing Download
199 ICDST-JV199 Hybrid k -Nearest Neighbor Classifier Data Mining Download
200 ICDST-JV200 Pattern Based Sequence Classification Download
201 ICDST-JV201 Dynamic Weight-Based Individual Similarity Calculation for Information Searching in Social Computing Cloud Computing Download
202 ICDST-JV202 Boosting Response Aware Model-Based Collaborative Filtering Data Mining Download
203 ICDST-JV203 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage Cloud Computing Download
204 ICDST-JV204 A Time-Efficient Approach for Detecting Errors in Big Sensor Data on Cloud Cloud Computing Download
205 ICDST-JV205 Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification Data Mining Download
206 ICDST-JV206 Deadline Guaranteed Service for Multi-Tenant Cloud Storage Parallel and Distributed Computing Download
207 ICDST-JV207 Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Cloud Computing Download
208 ICDST-JV208 Collective Energy-Efficiency Approach to Data Center Networks Planning Cloud Computing Download
209 ICDST-JV209 Placement and Performance Analysis of Virtual Multicast Networks in Fat-Tree Data Center Networks Parallel and Distributed Computing Download
210 ICDST-JV210 RSk NN: k NN Search on Road Networks by Incorporating Social Influence Networking Download
211 ICDST-JV211 Probabilistic static load-balancing of parallel mining of frequent sequences Data Mining Download
212 ICDST-JV212 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services Cloud Computing Download
213 ICDST-JV213 Optimal Cloud Computing Resource Allocation for Demand Side Management Cloud Computing Download
214 ICDST-JV214 A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing Cloud Computing Download
215 ICDST-JV215 Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing Cloud Computing Download
216 ICDST-JV216 Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy Data Mining Download
217 ICDST-JV217 Inverted Linear Quadtree: Efficient Top-K ord Search Data Mining Download
218 ICDST-JV218 A Novel Recommendation Model Regularized with User Trust and Item Ratings  

Data Mining

Download
219 ICDST-JV219 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Cloud Computing Download
220 ICDST-JV220 Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates Cloud Computing Download
221 ICDST-JV221 Cold-Start Recommendation with Provable Guarantees: A Decoupled Approach Data Mining Download
222 ICDST-JV222 Multiagent-Based Resource Allocation for Energy Minimization in Cloud Computing Systems Cloud Computing Download
223 ICDST-JV223 Time Series Shapelets: A New Primitive for Data Mining Data Mining Download
224 ICDST-JV224 A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast Mobile Computing Download
225 ICDST-JV225 A Novel Encryption Based Framework for Cloud Databases Networking Download
226 ICDST-JV226 A PERSONALIZED WEB SEARCH BASED ON USER PROFILE AND USER CLICKS Data Mining Download
227 ICDST-JV227 A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Cloud Computing Download
228 ICDST-JV228 A secure remote user mutual authentication scheme using smart cards Network Security Download
229 ICDST-JV229 A Secure Transmission Scheme for Textual Data with Least Overhead Data Mining Download
230 ICDST-JV230 A Sorted Neighborhood Approach to Multidimensional Privacy Preserving Blocking Data Mining Download
231 ICDST-JV231 A Survey of Key Management for Secure Group Communication Dependable and Secure Computing, Download
232 ICDST-JV232 A System to Filter Unwanted Messages from OSN User Walls Data Mining Download
233 ICDST-JV233 A trustworthy QoS-based collaborative filtering approach for web service discovery Networking Download
234 ICDST-JV234 A Unifying Framework of Mining Trajectory Patterns of Various Temporal Tightness Data Mining Download
235 ICDST-JV235 ACTIVE LEARNING OF CONSTRAINTS FOR SEMI-SUPERVISED CLUSTERING Data Mining Download
236 ICDST-JV236 An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks Networking Download
237 ICDST-JV237 An Advanced Moving Object Detection Algorithm for Automatic Traffic Monitoring In Real-World Limited Bandwidth Networks Networking Download
238 ICDST-JV238 An Efficient Multicore based Parallel Computing Approach for TSP Problems Parallel and Distributed Computing, Download
239 ICDST-JV239 An OpenFlow Architecture for Energy-Aware Traffic Engineering in Mobile Networks Networking Download
240 ICDST-JV240 An optimized algorithm for association rule mining using FP tree Data Mining Download
241 ICDST-JV241 An unsupervised feature selection algorithm based on ant colony optimization Data Mining Download
242 ICDST-JV242 Anomaly-Based Network Intrusion Detection System Networking Download
243 ICDST-JV243 Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler Data Mining Download
244 ICDST-JV244 Applying Network Coding to Peer-to-Peer File Sharing Networking Download
245 ICDST-JV245 Automated College Timetable Generator Data Mining Download
246 ICDST-JV246 Autonomous Agent Based Load Balancing Algorithm in Cloud Computing Cloud Computing Download
247 ICDST-JV247 Balancing throughput and response time in online scientific Clouds via Ant Colony Optimization Data Mining Download
248 ICDST-JV248 BDCaM: Big Data for Context-aware Monitoring – A Personalized Knowledge Discovery Framework for Assisted Healthcare Cloud Computing Download
249 ICDST-JV249 BeTL: MapReduce Checkpoint Tactics Beneath the Task Level Service Computing Download
250 ICDST-JV250 Big Data, Big Knowledge: Big Data for Personalized Healthcare Data Mining Download
251 ICDST-JV251 Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge Data Mining Download
252 ICDST-JV252 Building a Scalable Database-Driven Reverse Dictionary Data Mining Download
253 ICDST-JV253 Calculate Time and Space Complexity Data Mining Download
254 ICDST-JV254 Cloud Federations in the Sky: Formation Game and Mechanism Cloud Computing Download
255 ICDST-JV255 Cloud- Trust – a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds Cloud Computing Download
256 ICDST-JV256 CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes Mobile Computing Download
257 ICDST-JV257 Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users Cloud Computing Download
258 ICDST-JV258 Composite Intelligent Method for Spam Filtering Network Security Download
259 ICDST-JV259 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption Cloud Computing Download
260 ICDST-JV260 Cost-Effective Resource Provisioning for MapReduce in a Cloud Parallel and Distributed Computing, Download
261 ICDST-JV261 Data hiding in encrypted h.264/avc video streams by codeword substitution Data Mining Download
262 ICDST-JV262 Data Leakage Detection Data Mining Download
263 ICDST-JV263 Data mining in lung cancer pathologic staging diagnosis: Correlation between clinical and pathology information Data Mining Download
264 ICDST-JV264 Deadline based Resource Provisioning and Scheduling Algorithm for Scientific Work flows on Clouds Data Mining Download
265 ICDST-JV265 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach Networking Download
266 ICDST-JV266 Discovering Binding Cores in Protein-DNA Binding Using Association Rule Mining with Statistical Measures Data Mining Download
267 ICDST-JV267 Distributed Byzantine fault detection technique in wireless sensor networks based on hypothesis testing Wireless Sensor Networks, Download
268 ICDST-JV268 Double Counting in 2 t -ary RSA Precomputation Reveals the Secret Exponent Network Security Download
269 ICDST-JV269 Dual-image-based reversible data hiding method using center folding strategy Data Mining Download
270 ICDST-JV270 Dynamic Test Reconfiguration for Composite Web Services Service Computing Download
271 ICDST-JV271 Dynamic Collaboration Between Networked Robots and Clouds in Resource-Constrained Environments Networking Download
272 ICDST-JV272 Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms Mobile Computing Download
273 ICDST-JV273 Efficient Motif Discovery for Large-Scale Time Series in Healthcare Data Mining Download
274 ICDST-JV274 Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment Cloud Computing Download
275 ICDST-JV275 Emotion Recognition Using a Data-Driven Fuzzy Inference System Data Mining Download
276 ICDST-JV276 Enabling Cloud Storage Auditing With Key-Exposure Resistance Cloud Computing Download
277 ICDST-JV277 Energy-Efficient Fault-Tolerant Data Storage and Processing in Mobile Cloud Cloud Computing Download
278 ICDST-JV278 Ensuring Data Storage Security in Cloud Computing Cloud Computing Download
279 ICDST-JV279 Evolutionary Multi-Objective Workflow Scheduling in Cloud Cloud Computing Download
280 ICDST-JV280 Exact and Heuristic Resource Mapping Algorithms for Distributed and Hybrid Clouds Cloud Computing Download
281 ICDST-JV281 Exploring User Sociocentric and Egocentric Behaviors in Online and Detected Social Networks Networking Download
282 ICDST-JV282 Extending MapReduce across Clouds with BStream Cloud Computing Download
283 ICDST-JV283 Feature Selection and Classification of Microarray Data using MapReduce based ANOVA and K-Nearest Neighbor Bigdata Download
284 ICDST-JV284 Forecasting holiday daily tourist flow based on seasonal support vector regression with adaptive genetic algorithm Networking Download
285 ICDST-JV285 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks Mobile Computing Download
286 ICDST-JV286 Geographical Search with Approximate String in Spatial Databases Networking Download
287 ICDST-JV287 Hybrid Ant Bee Algorithm for Fuzzy Expert System Based Sample Classification Networking Download
288 ICDST-JV288 HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches Data Mining Download
289 ICDST-JV289 i 2 MapReduce: Incremental MapReduce for Mining Evolving Big Data Data Mining Download
290 ICDST-JV290 Identity-Based Distributed Provable D ata Possession in Multicloud Storage Mobile Computing Download
291 ICDST-JV291 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints Dependable and Secure Computing, Download
292 ICDST-JV292 Improving the efficiency of mapreduce scheduling algorithm in hadoop Data Mining Download
293 ICDST-JV293 Intelligent transport systems Data Mining Download
294 ICDST-JV294 Interpreting the Public Sentiment Variations on Twitte Data Mining Download
295 ICDST-JV295 Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks Networking Download
296 ICDST-JV296 Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks Parallel and Distributed Computing, Download
297 ICDST-JV297 Load Balancing in IP Networks Using Generalized Destination-Based Multipath Routing Networking Download
298  ICDST-JV298 Methodologies for Cross-Domain Data Fusion: An Overview Data Mining Download
299 ICDST-JV299 Mining Gene Expression Data Focusing Cancer Therapeutics: A Digest Data Mining Download
300 ICDST-JV300 Mobile Crowd Computing with Work Stealing Networking Download
301 ICDST-JV301 Modeling a Dynamic Data Replication Strategy to Increase System Availability in Cloud Computing Environments Data Mining Download
302 ICDST-JV302 Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning Data Mining Download
303 ICDST-JV303 Modular Software Model Checking for Distributed Systems Data Mining Download
304 ICDST-JV304 Monitoring Online Tests through Data Visualization Data Mining Download
305 ICDST-JV305 Multi-Criteria User Modeling in Recommender Systems Cloud Computing Download
306 ICDST-JV306 Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce Parallel and Distributed Computing, Download
307 ICDST-JV307 New Techniques for Mining Frequent Patterns in Unordered Trees Data Mining Download
308 ICDST-JV308 Online Crime Management System Data Mining Download
309 ICDST-JV309 Online Shopping Data Mining Download
310 ICDST-JV310 PAGE: A Partition Aware Engine for Parallel Graph Computation Networking Download
311 ICDST-JV311 PAIS: A Proximity-aware Interest-clustered P2P File Sharing System Service Computing Download
312 ICDST-JV312 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud Service Computing Download
311 ICDST-JV313 Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter Data Mining Download
312 ICDST-JV314 Phishing Detection System Using Machine Learning and Hadoop-MapReduce Data Mining Download
313 ICDST-JV315 PhishStorm: Detecting Phishing With Streaming Analytics Service Computing Download
314 ICDST-JV316 Private Data Analytics on Biomedical Sensing Data Via Distributed Computation Data Mining Download
315 ICDST-JV317 Product Aspect Ranking and Its Applications Data Mining Download
316 ICDST-JV318 Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud Cloud Computing Download
317 ICDST-JV319 Query Expansion using Thesaurus in Improving Malay Hadith Retrieval System Data Mining Download
318 ICDST-JV310 Real-Time Big Data Analytical Architecture for Remote Sensing Application Data Mining Download
319 ICDST-JV310 Regional Grain Yield Response t o Climate Change in China: A Statistic Modeling Approach Data Mining Download
320 ICDST-JV310 RELAI testing: a technique to assess and improve software reliability Data Mining Download
321 ICDST-JV321 Reversible Data Hiding in Encrypted Image with Distributed Source Encoding Mobile Computing Download
322 ICDST-JV322 Secure Sensitive Data Sharing on a Big Data Platform Data Mining Download
323 ICDST-JV323 Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware Network Security Download
324 ICDST-JV324 SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Mobile Computing Download
325 ICDST-JV325 Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework Data Mining Download
326 ICDST-JV326 Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds Parallel and Distributed Computing Download
327 ICDST-JV327 Service-generated Big Data and Big Data-as-a-Service: An Overview Data Mining Download
328 ICDST-JV328 Sitware Event Management Data Mining Download
329 ICDST-JV329 Social-Aware Video Multicast Based on Device-to-Device Communications Networking Download
330 ICDST-JV330 Statistical Characterizations and Environment Modelling of Impacts of Water Quality. Data Mining Download
331 ICDST-JV331 Student data mining solution–knowledge management system related to higher education institutions Data Mining Download
332 ICDST-JV332 Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources Parallel and Distributed Computing, Download
334 ICDST-JV333 Task Scheduling in the Cloud Computing Based on the Cuckoo Search Algorithm Cloud Computing Download
335 ICDST-JV335 Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment Service Computing Download
336 ICDST-JV336 Timetable Generation using Backtracking Technique Data Mining Download
337 ICDST-JV337 To improve Blood Donation Process using Data Mining Techniques Data Mining Download
338 ICDST-JV338 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds Parallel and Distributed Computing, Download
339 ICDST-JV339 Twitter Sentiment Analysis Data Mining Download
340 ICDST-JV340 Typicality-Based Collaborative Filtering Recommendation Data Mining Download
341 ICDST-JV341 Using Facebook for Image Steganography Cloud Computing Download
342 ICDST-JV342 VMThunder: Fast Provisioning of Large-Scale Virtual Machine C lusters Parallel and Distributed Computing, Download
343 ICDST-JV343 We are so close, less than 4 degrees separating you and me Data Mining Download
344 ICDST-JV344 Web Service Recommendation via Exploiting Location and QoS Information Data Mining Download
345 ICDST-JV345 A CLASSIFICATION MECHANSIM FOR LEAF DISEASE DETECTION IN CLOUD Data Mining Download
346 ICDST-JV346 A Cold Start Recommendation System Using Item Correlation and User Similarity Data Mining Download
347 ICDST-JV347 A Combined Classification A lgorithm Based on C4.5 and N B Data Mining Download
348 ICDST-JV348 A Compressed-Domain Image Filtering and Re-Ranking Approach for Multi-Agent Image Retrieval Networking Download
349 ICDST-JV349 A Combined Classification A lgorithm Based on C4.5 and N B Data Mining Download
350 ICDST-JV350 A Compressed-Domain Image Filtering and Re-Ranking Approach for Multi-Agent Image Retrieval Digital Image Processing Download
351 ICDST-JV351 A General Scalable and Elastic Content-based Publish/Subscribe Service Parallel and Distributed Computing, Download
352 ICDST-JV352 A Group Incremental Approach to Feature Selection Applying Rough Set Technique Data Mining Download
353 ICDST-JV353 A Holistic Approach to Distributed Dimensionality Reduction of Big Data Cloud Computing Download
354 ICDST-JV354 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks Dependable and Secure Computing Download
355 ICDST-JV355 A minimum enclosing ball-based support vector machine approach for detection of phishing websites Data Mining Download
356 ICDST-JV356 A Novel Approach for Denoising and Enhancement of Extremely Low-light Video Digital Image Processing Download
357 ICDST-JV357 Recognizing Common CT Imaging Signs of Lung Diseases Through a New Feature Selection Method Based on Fisher Criterion and Genetic Optimization Data Mining Download
358 ICDST-JV358 Automatic Change Analysis in Satellite Images Using Binary Descriptors and Lloyd–Max Quantization Data Mining Download
359 ICDST-JV359 Spatiotemporal Saliency Detection for Video Sequences Based on Random Walk With Restart Data Mining Download
360 ICDST-JV360 An Optimal-Distance-Based Transmission Strategy for Lifetime Maximization of Wireless Sensor Networks Data Mining Download
361 ICDST-JV361 Successive Interference Mitigation in Multiuser MIMO Interference Channels Data Mining Download

Comments are closed.