+91 9751800789 / 9500533042

#1
Trusted
Company
Students &
Clients
Finalyear ece projects
Finalyear ece projects
Finalyear ece projects Ready to discuss your project?
9751800789
This is the lightbox content.

2015 - 2016 IEEE Java Projects Titles

Cloud Computing

  • Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud
  • CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
  • Identity Based Encryption with Outsourced Revocation in Cloud Computing
  • Secure Distributed Deduplication Systems with Improved Reliability
  • Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted
  • A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
  • A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
  • Secure Auditing and Deduplicating Data in Cloud
  • User Anonymous Authentication Scheme for Decentralized Access Control in Clouds
  • A Hybrid Cloud Approach for Secure Authorized Deduplication
  • Median Filtering Forensics Based on Convolutional Neural NetworkS
  • Continuous and Transparent User Identity Verification for Secure Internet
  • Cost Effective Authentic and Anonymous Data Sharing with Forward Security
  • Shared Authority Based Privacy preserving Authentication Protocol in Cloud Computing
  • Privacy Preserving Multi Keyword Ranked Search over Encrypted Cloud Data
  • Audit Free Cloud Storage via deniable Attribute based Encryption

Data Mining

  • Malware Propagation in Large Scale Networks
  • Designing High Performance Web-Based Computing Services to Promote Telemedicine Database
  • Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
  • Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge
  • Context-Based Diversification for Keyword Queries over XML Data
  • Towards Effective Bug Triage with Software Data Reduction Techniques
  • Designing High Performance Web-Based Computing Services to Promote Telemedicine Database
  • Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers
  • Best Keyword Cover Search
  • Data Mining Based Crime Investigation Systems Taxonomy and Relevance
  • Discovery of Ranking Fraud for Mobile Apps
  • Efficient heart disease prediction system using decision tree
  • Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word
  • Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
  • Scalable Feature Selection in High-Dimensional Data Based on GRASP
  • Parallel processing of dynamic continuous queries over streaming data flows
  • Towards Secure Cryptographic Software Implementation Against Side Channel Power
  • Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF
  • A Case Based Recommendation Approach for Market Basket Data
  • SmartCrawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces

Image Processing

  • Query Specific Rank Fusion for Image Retrieval
  • Mining weakly labeled web facial images for search based face annotation
  • Learning to Rank Image Tags With Limited Training Examples
  • An Attribute-Assisted Reranking Model for Web Image Search
  • EMR A Scalable Graph based Ranking Model for Content based Image Retrieval

Information and Forensic Security

  • Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
  • Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
  • Key Updating for Leakage Resiliency with Application to AES Modes of Operation

Networking

  • Cloud cyber attack against Social Network
  • A Distortion Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
  • Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud
  • A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
  • Secure Data Aggregation Technique for WSN in the Presence of Collusion Attacks
  • Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient
  • A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks
  • Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
  • Detecting Malicious Facebook Applications

Secure Computing

  • Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
  • A Computational Dynamic Trust Model for User Authorization
  • Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

Mobile Computing

  • User-Defined Privacy Grid System for Continuous Location-Based Services

Services Computing

  • Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation

If you Have Any Questions Call Us On 9751800789