CampusUK Technology Solutions
Campus UK Technology Solutions Final year IEEE Projects and IT Courses CampusUK Technology Solutions
Quick Links
  Spoken English
  Buy PTE Vouchers
  Refer a friend
  Photo Gallery
  Currency Converter
  Career with us
  Useful links
  Final Year Projects
  IT Training
  College Partnerships
Campus UK Club
Buy PTE Vouchers
Non IEEE / Application Projects - Computing
Java - Parallel & Distributed Computing
1 PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System
2 Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks
3 A Hybrid Cloud Approach for Secure Authorized Deduplication
4 An Efficient Privacy-Preserving Ranked Keyword Search Method
5 Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks
6 Distributed Database Management Techniques for Wireless Sensor Networks
7 Dynamic Bin Packing for On-Demand Cloud Resource Allocation
8 On Traffic-Aware Partition and Aggregation in MapReduce for Big Data Applications
9 Response Time Based Optimal Web Service Selection
10 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
11 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
12 DCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs
13 Performance-Aware Cloud Resource Allocation via Fitness-enabled Auction
14 POST: Exploiting Dynamic Sociality for Mobile Advertising in Vehicular Networks
15 Robinhood: Towards Efficient Work-stealing in Virtualized Environments
 
Java - Dependable & Secure Computing
1 Group Key Agreement with Local Connectivity
2 High Performance and High Scalable Packet Classification Algorithm for Network Security Systems
3 Low-Rate DoS Attacks Detection Based on Network Multifractal
4 Malware Detection in Cloud Computing Infrastructures
5 PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications
6 Risk Aware Query Replacement Approach for Secure Databases Performance Management
7 Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service
8 Towards Detecting Compromised Accounts on Social Networks
9 Privacy Protection for Wireless Medical Sensor Data
10 A Computational Dynamic Trust Model
for User Authorization
11 Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
12 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
13 An Access Control Model for Online Social
Networks Using User-to-User Relationships
14 Deleting Secret Data with Public Verifiability
15 My Privacy My Decision: Control of Photo
Sharing on Online Social Networks
16 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
 
Java - Dependable & Secure Computing
1 Predicting User-Topic Opinions in Twitter with Social and Topical Context
2 Contact-Aware Data Replication in Roadside Unit
Aided Vehicular Delay Tolerant Networks
3 Discover the Expert: Context-Adaptive Expert Selection for Medical Diagnosis
4 Towards Information Diffusion in Mobile Social Networks
5 Providing Privacy-Aware Incentives in Mobile
Sensing Systems
6 User-Defined Privacy Grid System for Continuous Location-Based Services
7 DaGCM: A Concurrent Data Uploading Framework for Mobile Data Gathering in Wireless Sensor Networks
8 Delay Models for Static and Adaptive Persistent Resource Allocations in Wireless Systems
9 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
 
Java - Service Computing
1 On the Security of Data Access Control for Multiauthority Cloud Storage Systems
2 QoS Evaluation for Web Service Recommendation
3 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
4 Disease Inference from Health-Related Questions via Sparse Deep Learning
5 Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
6 Efficient Keyword Searching in Large-scale Social Network Service
7 Joint Optimization of Resource Provisioning in Cloud Computing
8 Location-Aware and Personalized Collaborative Filtering  for  Web Service Recommendation
9 Multi-Objective Service Composition in
Uncertain Environments
10 Using ant colony system to consolidate VMS for green cloud computing
11 An Integrated Semantic Web Service Discovery and Composition Framework
12 Dynamic Job Ordering and Slot Configurations for MapReduce Workloads
13 Processes Meet Big Data: Connecting Data Science with Process Science
14 SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
15 Data-driven and Feedback-Enhanced Trust Computing Pattern for Large-scale Multi-Cloud Collaborative Services
16 Diversifying Web Service Recommendation Results via Exploring Service Usage History
 
Dot Net - Mobile Computing
1 Delay Analysis of Multichannel Opportunistic Spectrum Access MAC Protocols
2 Virtual Servers Co-Migration for Mobile Accesses Online vs. Offline
3 CoCoWa: A Collaborative Contact-Based
Watchdog for Detecting Selfish Nodes
4 Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage
5 Joint Spectrum and Power Allocation for Multi-node Cooperative Wireless System
 
Dot Net - Parallel & Distributed Computing
1 LEISURE: A Framework for Load-Balanced    Network - Wide  Traffic Measuremen
2 Authenticated Key Exchange Protocols for Parallel Network File Systems
3 Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing
4 Hybrid cloud approach for secure authorized seduplication
5 Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Network
6 Universal Network Coding-Based Opportunistic Routing for Unicast
7 SPA: A Secure and Private Auction Framewor k for Decentralized Online Social Networ ks
8 Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds
 
Dot Net - Dependable & Secure Computing
1 An Access Control Model for Online Social Networks Using User-to-User Relationships
2 A Computational Dynamic Trust Model for User Authorization
3 My Privacy My Decision: Control of Photo Sharing on Online Social Networks
4 Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption
5 Group Key Agreement with Local Connectivity
6 Privacy protection for wirelsess sensor medical data
7 REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks
 
NS2 - Mobile Computing
1 A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks
2 A Distributed Three-Hop Routing Protoco to Increase the Capacity of Hybrid Wireless Networks
3 A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks
4 A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks
5 An OpenFlow Architecture for Energy-Aware Traffic Engineering in Mobile Networks
6 CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes
7 Cognitive Radio-Aware Transport Protocol for Mobile Ad Hoc Networks
8 Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks
9 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
10 Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach
 
Successful Students
Campus UK student
Muthiah Palaniappan
Internet Programming and Database Mgmt (COOP)
Lambton College, Canada
Successful Students
Like us in Facebook
Follow us on Twitter
CampusUK
CampusUK Universities CampusUK
CampusUK CampusUK
CampusUK
 
CampusUK
Home | About Us | Services | Universities | Online Enquiry | Testimonials | News & Events | Useful Links | Contact Us
Copyrights 2015 CampusUK
Disclaimer | Privacy Policy
Powered by: 4CreativeWeb Solutions