• +919751800789
  • 1croreprojects@gmail.com
  • Chennai, Tamilnadu


Welcome to 1 Crore Project Centre Chennai, where excellence meets opportunity. If you’re a tech enthusiast looking to expand your horizons in the world of Java programming, our 2016-2017 IEEE Java projects are your gateway to success. We understand the importance of staying ahead in the fast-paced tech industry, and that’s why our projects are carefully crafted to provide you with hands-on experience, real-world applications, and a chance to work on groundbreaking ideas.

Our team at 1 Crore Project Centre Chennai is dedicated to your success. With years of experience in Java development and a deep understanding of IEEE standards, we offer a diverse range of projects that cater to various domains and interests. Whether you’re a student, a recent graduate, or a professional looking to upskill, our projects provide you with the knowledge and practical skills needed to thrive in the ever-evolving IT landscape.

Don’t miss out on this opportunity to be part of something exceptional. Join 1 Crore Project Centre Chennai today and embark on a journey that will redefine your career. Our 2016-2017 IEEE Java projects are not just about learning; they’re about innovation, creativity, and a chance to make a lasting impact. Elevate your career prospects and stay ahead of the curve with the projects that matter. Choose excellence, choose 1 Crore Project Centre Chennai. 

Information and Forensic Security

  • An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
  • Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
  • Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
  • Privacy-Preserving Utility Verification of the Data Published by Non-Interactive Differentially Private Mechanisms
  • Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
  • Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
  • Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
  • Profiling Online Social Behaviors for Compromised Account Detection
  • Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
  • Server-Aided Public Key Encryption With Keyword Search

Cloud Computing

  • Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
  • ID2S Password-Authenticated Key Exchange Protocols
  • Dynamic and Public Auditing with Fair Arbitration for Cloud Data
  • Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
  • Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
  • DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
  • Secure Auditing and Deduplicating Data in Cloud
  • Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
  • Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Parallel and Distributed System

  • Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
  • CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
  • An Efficient Privacy-Preserving Ranked Keyword Search Method
  • Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
  • Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
  • A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
  • A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
  • TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
  • Authenticated Key Exchange Protocols for Parallel Network File Systems


  • Social Friend Recommendation Based on Multiple Network Correlation

Software Engineering

  • Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation

Internet Of Things

  • Booster in High Dimensional Data Classification
  • Relevance Feedback Algorithms Inspired By Quantum Detection
  • Top-k dominating queries on incomplete data
  • Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
  • Crowdsourcing for top-K query processing over uncertain data
  • Understanding short texts through semantic enrichment and hashing
  • Sentiment Embeddings with Applications to Sentiment Analysis
  • A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
  • RSkNN: kNN Search on Road Networks by Incorporating Social Influence
  • A Novel Recommendation Model Regularized with User Trust and Item Ratings
  • TopicSketch: Real-Time Bursty Topic Detection from Twitter
  • Top-Down XML Keyword Query Processing
  • Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
  • Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
  • Domain-sensitive Recommendation with user-item subgroup analysis
  • t-closeness through microaggregation: Strict privacy with enhanced utility preservation
  • Quantifying Political Leaning from Tweets, Retweets, and Retweeters
  • Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
  • Efficient Cache-Supported Path Planning on Roads
  • Efficiently Estimating Statistics of Points of Interests on Maps
  • Mitigating Cross-Site Scripting Attacks with a Content Security Policy
  • Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
  • Online Multi-Modal Distance Metric Learning with Application to Image Retrieval


  • TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds

Secure Computing

  • FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
  • Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data
  • An enhanced system to identify mischievous social malwares on Facebook applications


  • STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
  • Detecting Malicious Facebook Applications
  • Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks
  • On Denial of Service Attacks in Software Defined Networks
  • Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
  • Relay Selection Analysis for an Opportunistic Two-Hop Multi-User System in a Poisson Field of Nodes

Fuzzy Systems

  • Answering Approximate Queries Over XML Data

Image Processing

  • Learning of Multimodal Representations With Random Walks on the Click Graph
  • Hiding The Text And Image Message Of Variable Size Using Encryption And Compression Algorithms In Video Steganography

Data Analysis and Networking

  • Analysis of customer churn prediction in telecom industry using decision trees and logistic regression

Intelligent Systems

  • Trust Agent-Based Behavior Induction in Social Networks

Mobile Computing

  • Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
  • Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach
  • Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

Big Data

  • Personalized Travel Sequence Recommendation on Multi-Source Big Social Media

Services Computing

  • CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
  • KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
  • Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
  • Privacy-Preserving Location Sharing Services for Social Networks
  • SecRBAC: Secure data in the Clouds