Vous êtes sur la page 1sur 9

Java IEEE Projects Titles 2016-2017

LeMeniz Infotech
36, 100 feet Road, Natesan Nagar( Near Indira Gandhi Statue and Next to Fish-O-Fish),
Pondicherry-605 005
Web : www.ieeemaster.com / www.lemenizinfotech.com
Mail : info@lemenizinfotech.com / projects@lemenizinfotech.com
Phone : 9566355386 / 9962588976
S.No

Title

Year

IEEE based on CLOUD COMPUTING


1

AMTS: Adaptive multi-objective task scheduling strategy in cloud


computing

2016

An Efficient Privacy-Preserving Ranked Keyword Search Method

2016

Security in Cloud-Computing-Based Mobile Health

2016

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

2016

CDA Generation and Integration for Health Information Exchange


Based on Cloud

2016

Model-Driven Development Patterns for Mobile Services in Cloud of


Things

2016

An anomalous behavior detection model in cloud computing

2016

Optimizing Cost for Online Social Networks on Geo-Distributed


Clouds

2016

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

2016

10

A Modified Hierarchical Attribute-Based Encryption Access Control


Method for Mobile Cloud Computing

2016

11

Secure Data Sharing in Cloud Computing Using Revocable-Storage


Identity-Based Encryption

2016

12

Online Resource Scheduling Under Concave Pricing for Cloud


Computing

2016

13

Dynamic Operations of Cloud Radio Access Networks (C-RAN) for


Mobile Cloud Computing

2016

14

CloudArmor: Supporting Reputation-Based Trust Management for


Cloud Services

2016

15

A Dynamical and Load-Balanced Flow Scheduling Approach for Big


Data Centers in Clouds Systems

2016

16

Analysis of classical encryption techniques in cloud computing

2016

17

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its


Application to Cloud Email

2016

18

2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data
Integrity Checking in Public Cloud

19

Dynamic Resource Partitioning for Heterogeneous Multi-CoreBasedCloud Computing in Smart Cities

2016

20

Energy-efficient Adaptive Resource Management for Real-time


Vehicular Cloud Services

2016

21

An Efficient File Hierarchy Attribute-Based Encryption Scheme in


Cloud Computing

2016

22

Encrypted Data Management with Deduplication in Cloud Computing

2016

23

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

2016

24

Online Resource Scheduling Under Concave Pricing for Cloud


Computing

2016

IEEE based on DATA MINING


1

A Survey on Trajectory Data Mining: Techniques and Applications

2016

Scalable Semi-Supervised Learning by Efficient Anchor Graph


Regularization

2016`

A Comprehensive Study on Willingness Maximization for Social


Activity Planning with Quality Guarantee

2016

Mining Graphs for Understanding Time-Varying Volumetric Data

2016

Location Aware Keyword Query Suggestion Based on Document


Proximity

2016

Cyberbullying Detection based on Semantic-Enhanced Marginalized


Denoising Auto-Encoder

2016

Resolving Multi-Party Privacy Conflicts in Social Media

2016

Pattern mining in linked data by edge-labeling

2016

Model of human knowledge extraction for a KBS using reasoning


cases

2016

10

Privacy-Preserving-Outsourced Association Rule Mining on Vertically


Partitioned Databases

2016

11

Cross-Platform Identification of Anonymous Identical Users in


Multiple Social Media Networks

2016

12

Mining User-Aware Rare Sequential Topic Patterns in Document


Streams

2016

13

Online Ensemble Learning of Data Streams with Gradually Evolved


Classes

2016

14

Top-k Dominating Queries on Incomplete Data

2016

15

Extracting Cross-Ontology Weighted Association Rules from Gene


Ontology Annotations

2016

16

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User


Environment

2016

17

Mining Health Examination Records A Graph-based Approach

2016

18

Computing Tools and Techniques for Emergency Response

2016

19

Pattern Based Sequence Classification

2016

20

Mining User-Aware Rare Sequential Topic Patterns in Document


Streams

2016

21

Rating Prediction based on Social Sentiment from Textual Reviews

2016

22

User Preference Learning for Online Social Recommendation

2016

23

Predicting Student Performance Using Personalized Analytics

2016

24

Automatically Mining Facets for Queries from Their Search Results

2016

25

Efficient Algorithms for Mining Top-K High Utility Itemsets

2016

26

Object Discovery: Soft Attributed Graph Mining

2016

27

Classification-based Mining of Reusable Components on Software


Product Lines

2016

28

Fault Diagnosis of Multimode Processes Based on Similarities

2016

29

A Reversible Data Hiding Scheme Based on Code Division


Multiplexing

2016

30

Reversible Data Hiding in Encrypted Images With Distributed Source


Encoding

2016

31

Secure Reversible Image Data Hiding Over Encrypted Domain via Key
Modulation

2016

32

Automatically Mining Facets for Queries from Their Search Results

2016

IEEE based on NETWORK SECURITY


1

A Survey of Security in Software Defined Networks

2016

OpenSec: Policy-Based Security Using Software-Defined Networking


Security

2016

Cloud Belief Rule Base Model for Network Security Situation


Prediction

2016

On the vulnerabilities of Voronoi-based approaches to mobile sensor


Deployment

2016

Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc


Networks

2016

Comprehensive survey on security services in vehicular ad-hoc


networks

2016

Collusion-resistant unidirectional proxy re-encryption scheme from


lattices

2016

Fast multi-pattern matching algorithm on compressed network traffic

2016

Bayes-based ARP attack detection algorithm for cloud centers

2016

IEEE based on WEB MINING


1

Web Service Personalized Quality of Service Prediction via


Reputation-Based Matrix Factorization

2016

Performance Evaluation of Transactional Composite Web Services

2016

Connecting Social Media to E-Commerce: Cold-Start Product


Recommendation Using Micro

Social Friend Recommendation Based on Multiple Network


Correlation

2016

2016

IEEE based on Secure computing


1

Secure Auditing and Deduplicating Data in Cloud

2016

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over


Encrypted Cloud Data

2016

A key-centric processor architecture for secure computing

2016

Efficient Anonymous Message Submission

2016

A Secure Management Scheme Designed in Cloud

2016

Public Integrity Auditing for Shared Dynamic Cloud Data with Group
User Revocation

2016

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in


the Cloud

2016

Secure Auditing and Deduplicating Data in Cloud

2016

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over


Encrypted Cloud Data

2016

10

Secure access delegation of encrypted medical information

2016

11

Secure inter cloud data migration

2016

12

Group Key Agreement with Local Connectivity

2016

IEEE based on IMAGES PROCESSING


1

Blind Image Blur Estimation via Deep Learning

2016

Bitplane Image Coding With Parallel Coefficient Processing

2016

Automatic Design of Color Filter Arrays in the Frequency Domain

2016

Texture Classification Using Dense Micro-Block Difference

2016

Super-Resolution of Multi-Observed RGB-D Images Based on


Nonlocal Regression and Total Variation

2016

Image Segmentation Using Parametric Contours With Free Endpoints

2016

Analyzing the Effect of JPEG Compression on Local Variance of Image


Intensity

2016

Multi-Scale Patch-Based Image Restoration

2016

Image Sharpness Assessment by Sparse Representation

2016

Vous aimerez peut-être aussi