IEEE 2016 - 2017 JAVA TITLES

 

IEEE JAVA PROJECT TITLES 2016 - 2017

S.NO

TITLES

DOMAIN

1.    

EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud

CLOUD COMPUTING

2.    

Model-Driven Development Patterns for Mobile Services in Cloud of Things

CLOUD COMPUTING

3.    

Follow-Me Cloud: When Cloud Services Follow Mobile Users

CLOUD COMPUTING

4.    

Stochastic Load Balancing for Virtual Resource Management in  Datacenters

CLOUD COMPUTING

5.    

Providing User Security Guarantees in Public Infrastructure Clouds

CLOUD COMPUTING

6.    

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

CLOUD COMPUTING

7.    

Crowd sourcing based Description of Urban Emergency Events using Social Media Big Data

CLOUD COMPUTING

8.    

Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics

CLOUD COMPUTING

9.    

Using Socio-Spatial Context in Mobile Cloud Offload Process for Energy Conservation in Wireless Devices

CLOUD COMPUTING

10.                       

Using Crowd sourcing to Provide QoS for Mobile Cloud Computing

CLOUD COMPUTING

11.                       

A  Novel Statistical Cost Model and an Algorithm for Efficient Application Offloading to Clouds

CLOUD COMPUTING

12.                       

A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing

CLOUD COMPUTING

13.                       

A Data and Task  Co-scheduling Algorithm for Scientific Cloud Workflows

CLOUD COMPUTING

14.                       

Achieving Energy Efficiency in Data Centers Using an Artificial Intelligence Abstraction Model

CLOUD COMPUTING

15.                       

Assurance of Security and Privacy Requirements for Cloud Deployment Model

CLOUD COMPUTING

16.                       

 On the Performance Impact of Data Access Middleware for Data Stores

CLOUD COMPUTING

17.                       

Identity-Based Private Matching over Outsourced Encrypted Datasets

CLOUD COMPUTING

18.                       

ADON: Application-Driven Overlay Network-as-a-Service for Data-Intensive Science

CLOUD COMPUTING

19.                       

Chaotic Searchable Encryption for Mobile Cloud Storage

CLOUD COMPUTING

20.                       

Cypher DB: A Novel Architecture for Outsourcing Secure Database Processing

CLOUD COMPUTING

21.                       

Architectural Protection of Application Privacy Against Software and Physical Attacks in Un trusted Cloud Environment

CLOUD COMPUTING

22.                       

A Context-aware Service Evaluation Approach over Big Data for  Cloud Applications

CLOUD COMPUTING

23.                       

A Decision-Theoretic Rough Set Approach for Dynamic Data Mining

DATA MINING

24.                       

TelCoVis: Visual Exploration of Co-occurrence in Urban Human Mobility Based on Telco Data

DATA MINING

25.                       

Interactive Visual Discovering of Movement Patterns from Sparsely Sampled Geo-tagged Social Media Data

DATA MINING

26.                       

ecoSense: Minimize Participants' Total 3G Data Cost in Mobile Crowdsensing Using Opportunistic Relays

DATA MINING

27.                       

A Kind of Novel ITS Based on Space-Air-Ground Big-Data

DATA MINING

28.                       

Recent Development in Big Data Analytics for Business Operations and Risk Management

DATA MINING

29.                       

Online Ensemble Learning of Data Streams with Gradually Evolved Classes

DATA MINING

30.                       

Diplo Cloud: Efficient and Scalable Management of RDF Data in the  Cloud

DATA MINING

31.                       

Graph Regularized Feature Selection with Data Reconstruction

DATA MINING

32.                       

NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks

DATA MINING

33.                       

Nearest Keyword Set Search in Multi-Dimensional Datasets

DATA MINING

34.                       

Online Mode Switch Algorithms for Maintaining Data Freshness in Dynamic Cyber-Physical Systems

DATA MINING

35.                       

Data-driven Soft  Decoding of Compressed Images in Dual Transform-Pixel Domain

IMAGE PROCESSING

36.                       

Double-Tip Artefact Removal from Atomic Force Microscopy Images

IMAGE PROCESSING

37.                       

Weakly Supervised Fine-Grained Categorization with Part-Based Image Representation

IMAGE PROCESSING

38.                       

Robust Visual Tracking via Convolutional Networks without Training

IMAGE PROCESSING

39.                       

Learning Invariant Color Features for Person Re-Indentification

IMAGE PROCESSING

40.                       

A Diffusion and Clustering-based Approach for Finding Coherent Motions and Understanding Crowd Scenes

IMAGE PROCESSING

41.                       

Automatic Design of Color Filter Arrays in The Frequency Domain

IMAGE PROCESSING

42.                       

Learning Iteration-wise Generalized Shrinkage-Thre sholding  Operators for Blind Deconvolution

IMAGE PROCESSING

43.                       

Image Segmentation Using Parametric Contours With Free Endpoints

IMAGE PROCESSING

44.                       

CASAIR: Content and Shape-Aware Image Retargeting and Its  Applications

IMAGE PROCESSING

45.                       

Texture classification using Dense Micro-block Difference

IMAGE PROCESSING

46.                       

Statistical performance analysis of a fast super-resolution technique using noisy translations

IMAGE PROCESSING

47.                       

Internet-based Indoor Navigation Services

WEB SERVICES

48.                       

Tools Enabling Online Contributions by Older Adults

WEB SERVICES

49.                       

Social media interaction and analytics for enhanced educational experiences

WEB SERVICES

50.                       

Crowdsourcing processes: a survey of approaches and opportunities

WEB SERVICES

51.                       

GWMEP: Task-Manager-as-a-Service in Apache CloudStack

WEB SERVICES

52.                       

Service Provisioning in Content-Centric Networking: Challenges, Opportunities, and Promising Directions

WEB SERVICES

53.                       

Distributed Data Management Service for VPH Applications

WEB SERVICES

54.                       

Ensembling Classifiers for Detecting User's Intentions behind Web Queries

WEB SERVICES

55.                       

Techniques for Defending from Buffer Overflow Vulnerability Security Exploits

WEB SERVICES

56.                       

Separating Operational and Control Behaviors: A New Approach to Web Services Modeling

WEB SERVICES

57.                       

Incentive Mechanisms in P2P Media Streaming Systems

WEB SERVICES

58.                       

An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks

NETWORKING

59.                       

An Optimization Framework for Mobile Data Collection in Energy- Harvesting Wireless Sensor Networks

NETWORKING

60.                       

Distributed and Fair Beaconing Rate Adaptation for Congestion  Control in Vehicular Networks

NETWORKING

61.                       

Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering

NETWORKING

62.                       

Unlicensed Spectra Fusion and Interference Coordination for LTE  Systems

NETWORKING

63.                       

On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment

NETWORKING

64.                       

A Super process With Upper Confidence Bounds for Cooperative  Spectrum Sharing

NETWORKING

a.      

Mitigating Cross-Site Scripting Attacks with a Content Security Policy

 

65.                         

ID2S Password-Authenticated Key Exchange Protocols

 

 

66.                         

Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage

 

 

67.                         

A Shoulder Surfing Resistant Graphical Authentication System

 

 

68.                         

A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee

 

 

69.                         

Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

 

 

70.                         

Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks

 

 

71.                         

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

 

 

72.                         

Mining User-Aware Rare Sequential Topic Patterns in Document Streams

 

 

73.                         

OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE

 

 

74.                         

SecRBAC: Secure data in the Clouds

 

 

75.                         

Trust Agent-Based Behavior Induction in Social Networks

 

 

76.                         

Tag Based Image Search by Social Re-ranking

 

 

77.                         

Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback

 

 

78.                         

A Locality Sensitive Low-Rank Model for Image Tag Completion

 

 

79.                         

A Locality Sensitive Low-Rank Model for Image Tag Completion

 

 

80.                         

A Shoulder Surfing Resistant Graphical Authentication System

 

 

81.                         

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

 

 

82.                         

Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search

 

 

83.                         

 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

 

 

84.                         

Mining User-Aware Rare Sequential Topic Patterns in Document Streams

 

 

85.                         

Mitigating Cross-Site Scripting Attacks with a Content Security Policy

 

 

86.                         

Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy

 

 

87.                         

Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases

 

 

88.                         

SecRBAC: Secure data in the Clouds

 

 

89.                         

Tag Based Image Search by Social Re-ranking

 

 

 

 

 



Place your Enquiry...

Captcha  Can't read click to refresh

OFFER


SPECIAL LINKS


LATEST NEWS