• +919751800789
  • 1croreprojects@gmail.com
  • Chennai, Tamilnadu

2015 – 2016 IEEE JAVA PROJECTS

At 1 Crore Project Centre Chennai, we’re dedicated to advancing your career and academic journey with a focus on 2015-2016 IEEE Java Projects. Java remains a cornerstone of modern software development, and our center is your gateway to mastering this versatile language. Our team of experienced instructors and industry experts are committed to providing you with the knowledge and guidance you need to excel in your Java project endeavors.

Our 1 Crore Project Centre in Chennai offers a diverse range of 2015-2016 IEEE Java Projects that cover various domains, from web development to data analytics and beyond. We understand the importance of staying up-to-date with the latest trends and technologies in the field, and our projects reflect this commitment. You’ll have the opportunity to work on cutting-edge projects that not only enhance your skills but also make a real impact in the world of technology.

When you choose 1 Crore Project Centre Chennai for your 2015-2016 IEEE Java Projects, you’re not just enrolling in a program; you’re becoming part of a community of driven individuals who share your passion for Java and technology. Our state-of-the-art facilities, comprehensive resources, and collaborative learning environment ensure that you have everything you need to succeed. Join us on your journey to excellence in Java, and let’s transform your ideas into reality.

Cloud Computing

  • Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud
  • CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
  • Identity Based Encryption with Outsourced Revocation in Cloud Computing
  • Secure Distributed Deduplication Systems with Improved Reliability
  • Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted
  • A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
  • A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
  • Secure Auditing and Deduplicating Data in Cloud
  • User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
  • A Hybrid Cloud Approach for Secure Authorized Deduplication
  • Median Filtering Forensics Based on Convolutional Neural NetworkS
  • Continuous and Transparent User Identity Verification for Secure Internet
  • Cost Effective Authentic and Anonymous Data Sharing with Forward Security
  • Shared Authority Based Privacy preserving Authentication Protocol in Cloud Computing
  • Privacy Preserving Multi Keyword Ranked Search over Encrypted Cloud Data
  • Audit Free Cloud Storage via deniable Attribute based Encryption

Data Mining

  • Malware Propagation in Large Scale Networks
  • Designing High Performance Web-Based Computing Services to Promote Telemedicine Database
  • Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
  • Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge
  • Context-Based Diversification for Keyword Queries over XML Data
  • Towards Effective Bug Triage with Software Data Reduction Techniques
  • Designing High Performance Web-Based Computing Services to Promote Telemedicine Database
  • Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
  • Best Keyword Cover Search
  • Data Mining Based Crime Investigation Systems Taxonomy and Relevance
  • Discovery of Ranking Fraud for Mobile Apps
  • Efficient heart disease prediction system using decision tree
  • Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word
  • Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
  • Scalable Feature Selection in High-Dimensional Data Based on GRASP
  • Parallel processing of dynamic continuous queries over streaming data flows
  • Towards Secure Cryptographic Software Implementation Against Side Channel Power
  • Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF
  • A Case Based Recommendation Approach for Market Basket Data
  • SmartCrawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces

Image Processing

  • Query Specific Rank Fusion for Image Retrieval
  • Mining weakly labeled web facial images for search based face annotation
  • Learning to Rank Image Tags With Limited Training Examples
  • An Attribute-Assisted Reranking Model for Web Image Search
  • EMR A Scalable Graph based Ranking Model for Content based Image Retrieval

Information and Forensic Security

  • Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
  • Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
  • Key Updating for Leakage Resiliency with Application to AES Modes of Operation

Networking

  • Cloud cyber attack against Social Network
  • A Distortion Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
  • Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud
  • A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
  • Secure Data Aggregation Technique for WSN in the Presence of Collusion Attacks
  • Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient
  • A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
  • Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
  • Detecting Malicious Facebook Applications

Secure Computing

  • Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
  • A Computational Dynamic Trust Model for User Authorization
  • Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

Mobile Computing

  • User-Defined Privacy Grid System for Continuous Location-Based Services

Services Computing

  • Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
Reach Us