Java IEEE Projects 2016 2017 in Chennai

IEEE JAVA PROJECT LIST 2016-2017

INFORMATION FORENSICS AND SECURITY PROJECTS

SNOProjects List
1An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
2Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
3Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
4Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
5Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
6Hidden Ciphertext Policy Attribute Based Encryption under Standard Assumptions
7Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
8Profiling Online Social Behaviors for Compromised Account Detection
9Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
10Detection of Superpoints Using a Vector Bloom Filter
11Server-Aided Public Key Encryption with Keyword Search

CLOUD COMPUTING PROJECTS

1Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming
2ID2S Password Authenticated Key Exchange Protocols
3Dynamic and Public Auditing with Fair Arbitration for Cloud Data
4Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption
5Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
6DeyPoS Deduplicatable Dynamic Proof of Storage for Multi User Environments
7Secure Auditing and Deduplicating Data in Cloud
8Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
9Identity-Based Encryption with Cloud Revocation Authority and Its Applications

PARALLEL AND DISTRIBUTED SYSTEMS PROJECTS

1Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
2CloudArmor Supporting Reputation based Trust Management for Cloud Services
3An Efficient Privacy Preserving Ranked Keyword Search Method
4Protecting Your Right Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
5Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
6A Secure Anti-Collision Data Sharing Scheme for Dynamic Groups in Cloud
7A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data
8Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
9TMACS A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

DATA MINING PROJECTS

1Booster in High Dimensional Data Classification
2Relevance Feedback Algorithms Inspired By Quantum Detection
3Top k Dominating Queries on Incomplete Data
4Cross Domain Sentiment Classification Using Sentiment Sensitive Embeddings
5Crowdsourcing for Top-K Query Processing over Uncertain Data
6Understanding Short Texts through Semantic Enrichment and Hashing
7Sentiment Embeddings with Applications to Sentiment Analysis
8A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
9RSkNN kNN Search on Road Networks by Incorporating Social Influence
9RSkNN kNN Search on Road Networks by Incorporating Social Influence
10A Novel Recommendation Model Regularized with User Trust and Item Ratings
11TopicSketch Real-Time Bursty Topic Detection from Twitter
12Top-Down XML Keyword Query Processing
13Quantifying Political Leaning from Tweets, Retweets, and Re tweeters
14Inverted Linear Quadtree Efficient Top K Spatial Keyword Search
15Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
16Domain-Sensitive Recommendation with User-Item Subgroup Analysis
17T-Closeness through microaggregation Strict privacy with enhanced utility preservation
18Connecting Social Media to E-commerce Cold-Start Product Recommendation
19Efficient Cache-Supported Path Planning on Roads
20Efficiently Estimating Statistics of Points of Interests on Maps
21Mining User-Aware Rare Sequential Topic Patterns in Document Streams
22Mitigating Cross Site Scripting Attacks with a Content Security Policy
23Online Multi-Model Distance Metric Learning With Application to Image Retrievel
24Personalized Health Care Cloud Services For Disease Risk Assessment
24Resolving Multi-Party Privacy Conflicts in Social Media
25Tell Me What You Eat, and I Will Tell You Where You Come From A Data Science Approach for Global Recipe Data on the Web

SECURE COMPUTING PROJECTS

1FRoDO Fraud Resilient Device for Off-Line Micro-Payments
2Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
3An enhanced system to identify mischievous social malware on Facebook applications

NETWORKING PROJECTS

1STAMP Enabling Privacy Preserving Location Proofs for Mobile Users
2Detecting Malicious Facebook Applications
3Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks
4On Denial of Service Attacks in Software Defined Networks
5Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
6Relay Selection Analysis for an Opportunistic Two-hop Multi-user System in a Poisson Field of Nodes

FUZZY SYSTEMS

1Answering Approximate Queries over XML Data

IMAGE PROCESSING

1Learning of Multi-model Representations With Random Walks on the Click Graph
2Hiding The Text And Image Message Of Variable Size Using Encryption And Compression Algorithms In Video Steganography

DATA ANALYSIS AND NETWORKING

1Analysis of customer churn prediction in telecom industry using decision trees and logistic regression

INTELLIGNET SYSTEM

1Trust Agent-Based Behavior Induction in Social Networks

MOBILE COMPUTING

1Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
2Detecting Mobile Malicious Webpages in Real Time
3Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach
4Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

SERVICES COMPUTING

1CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
2KSF-OABE Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
3Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
4Privacy-Preserving Location Sharing Services for Social Networks
5SecRBAC Secure data in the Clouds

CYBERNETICS

1TTSA An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds

BIG DATA

1Personalized Travel Sequence Recommendation on Multi-Source Big Social Media

MULTIMEDIA PROJECTS

1Social Friend Recommendation Based on Multiple Network Correlation

SOFTWARE ENGINEERING PROJECTS

1Mapping Bug Reports to Relevant Files A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation

INTERNET OF THINGS

1EPLQ Efficient Privacy-Preserving Location Based Query Over Outsourced Encrypted Data

BE PROJECTS

MINI PROJECTS