JAVA PROJECTS

JAVA-2016 IEEE PROJECTS
CLOUD COMPUTING

S.NO
TITLES
1A Secure and Dynamic Multi -Keyword Ranked Search Scheme over Encrypted Cloud Data
2A Secure Anti -Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3An Efficient File Hierarchy Attribute -Based Encryption Scheme in Cloud Computing
4An Efficient Privacy-Preserving Ranked Keyword Search Method CLOUD
5CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
6Circuit Ciphertext -Policy Attribute -Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
7CloudArmor: Supporting Reputation -Based Trust Management for Cloud Services
8Conditional Identity -Based Broadcast Proxy Re -Encryption and Its Application to Cloud Email
9Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
10DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
11Dual -Server Public -Key Encryption With Keyword Search for Secure Cloud Storage
12Dynamic and Public Auditing with Fair Arbitration for Cloud Data CLOUD
13Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
14Fine -Grained Two -Factor Access Control for Web -Based Cloud Computing Services
15Geometric Range Search on Encrypted Spatial Data
16Identity -Based Encryption with Cloud Revocation Authority and Its Applications
17Identity -Based Proxy -Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
18Protecting Your Right: Verifiable Attribute -Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
19Real -Time Semantic Search Using Approximate Methodology for Large Scale Storage Systems
20Secure Data Sharing in Cloud Computing Using Revocable -Storage Identity-Based Encryption
21Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
22TMACS: A Robust and Verifiable Threshold Multi -Authority Access Control System in Public Cloud Storage
23A Modified Hierarchical Attribute -Based Encryption Access Control Method for Mobile Cloud Computing
24A Modified Hierarchical Attribute -Based Encryption Access Control Method for Mobile Cloud Computing
25Flexible and Fine -Grained Attribute -Based Data Storage in Cloud Computing
26SecRBAC: Secure data in the Cloud

JAVA-2016 IEEE PROJECTS
DATA MINING

S.NO
TITLES
27A Novel Recommendation Model Regularized with User Trust and Item Ratings
28Automatically Mining Facets for Queries from Their Search Results
29Booster in High Dimensional Data Classification
30Building an intrusion detection system using a filter -based feature selection algorithm
31Connecting Social Media to E -Commerce: Cold -Start Product Recommendation Using Micro blogging Information
32Cross -Domain Sentiment Classification Using Sentiment Sensitive Embeddings
33Crowdsourcing for Top-K Query Processing over Uncertain Data
34Cyberbullying Detection based on Semantic -Enhanced Marginalized Denoising Auto-Encoder
35Domain -Sensitive Recommendation with User -Item Subgroup Analysis
36Efficient Algorithms for Mining Top -K High Utility Itemsets
37Efficient Cache-Supported Path Planning on Roads
38Mining User -Aware Rare Sequential Topic Patterns in Document Streams
39Nearest Keyword Set Search in Multi-Dimensional Datasets
40Rating Prediction based on Social Sentiment from Textual Reviews
41Location Aware Keyword Query Suggestion Based on Document Proximity
42Using Hashtag Graph -based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
43Quantifying Political Leaning from Tweets, Retweets, and Retweeters
44Relevance Feedback Algorithms Inspired By Quantum Detection
45Sentiment Embeddings with Applications to Sentiment Analysis
46Top-Down XML Keyword Query Processing
47TopicSketch: Real-time Bursty Topic Detection from Twitter
48Top-k Dominating Queries on Incomplete Data
49Understanding Short Texts through Semantic Enrichment and Hashing

JAVA-2016 IEEE PROJECTS
NETWORKING

S.NO
TITLES
50A Stable Approach for Routing Queries in Unstructured P2P Networks
51iPath: Path Inference in Wireless Sensor Networks
52Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
53Spatial Reusability -Aware Routing in Multi -Hop Wireless Networks
54Enabling Privacy -Preserving Location Proofs for Mobile Users

JAVA-2016 IEEE PROJECTS
MOBILE COMPUTING

S.NO
TITLES
55Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
56EPLQ: Efficient Privacy -Preserving Location -Based Query Over Outsourced Encrypted Data
57Secure Overlay Routing Using Key Pre -Distribution: A Linear Distance Optimization Approach
58Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

JAVA-2016 IEEE PROJECTS
SECURE COMPUTING

S.NO
TITLES
59Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
60Data Lineage in Malicious Environments
61Detecting Malicious Facebook Applications
62FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
63Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
64Resolving Multi-party Privacy Conflicts in Social Media

JAVA-2016 IEEE PROJECTS
PARALLEL & DISTRIBUTED SYSTEMS

S.NO
TITLES
65A Hop-by-Hop Routing Mechanism for Green Internet
66Continuous Answering Holistic Queries over Sensor Networks
67Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
68The Server Provisioning Problem for Continuous Distributed Interactive Applications

JAVA-2016 IEEE PROJECTS
INFORMATION FORENSICS AND SECURITY

S.NO
TITLES
69Hidden Ciphertext Policy Attribute -Based Encryption Under Standard Assumptions
70Optimized Search -and -Compute Circuits and Their Application to Query Evaluation on Encrypted Data
71Privacy -Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
72Profiling Online Social Behaviors for Compromised Account Detection

JAVA-2016 IEEE PROJECTS
IMAGE PROCESSING

S.NO
TITLES
73A Locality Sensitive Low -Rank Model for Image Tag Completion
74A Scalable Approach for Content -Based Image Retrieval in Peer - to-Peer Networks
75Learning of Multimodal Representations with Random Walks on the Click Graph
76Online Multi -Modal Distance Metric Learning with Application to Image Retrieval
77Tag Based Image Search by Social Re-ranking

JAVA-2016 IEEE PROJECTS
MULTIMEDIA

S.NO
TITLES
78Social Friend Recommendation Based on Multiple Network Correlation
79User -Service Rating Prediction by Exploring Social Users’ Rating Behaviors

JAVA-2016 IEEE PROJECTS
JAVA

S.NO
TITLES
80Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine
81Metamorphic Testing for Software Quality Assessment: A Study of Search Engines
82SITAR: GUI Test Script Repair
83Answering Approximate Queries over XML Data