Vous êtes sur la page 1sur 6

2016 - 2017 JAVAIEEE FINALYEAR Projects

S.
N
Lang/Yea
O
Project IEEE 2016-17 JAVA Project Titles Domain r
Code

CLOUD
1 VSJ1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme COMPUTING JAVA/2016
over Encrypted Cloud Data

A Secure Anti-Collusion Data Sharing Scheme for Dynamic CLOUD


2 VSJ1602 Groups COMPUTING JAVA/2016
in the Cloud

An Efficient File Hierarchy Attribute-Based Encryption Scheme CLOUD


3 VSJ1603 in COMPUTING JAVA/2016
Cloud Computing

An Efficient Privacy-Preserving Ranked Keyword Search CLOUD


4 VSJ1604 Method COMPUTING JAVA/2016

CDA Generation and Integration for Health Information CLOUD


VSJ1605 Exchange COMPUTING
5 JAVA/2016
Based on Cloud Computing System

Circuit Cipher text-Policy Attribute-Based Hybrid Encryption CLOUD


VSJ1606 with COMPUTING
6 JAVA/2016
Verifiable Delegation in Cloud Computing

CLOUD
7 VSJ1607 CloudArmor: Supporting Reputation-Based Trust Management COMPUTING JAVA/2016
for Cloud Services

Conditional Identity-Based Broadcast Proxy Re-Encryption and CLOUD


8 VSJ1608 Its COMPUTING JAVA/2016
Application to Cloud Email

Conjunctive Keyword Search With Designated Tester and CLOUD


9 VSJ1609 Timing COMPUTING JAVA/2016
Enabled Proxy Re-Encryption Function for E-Health Clouds

CLOUD
10 VSJ1610 DiploCloud: Efficient and Scalable Management of RDF Data in COMPUTING JAVA/2016
the Cloud

CLOUD
11 VSJ1611 Dual-Server Public-Key Encryption With Keyword Search for COMPUTING JAVA/2016
Secure Cloud Storage

Dynamic and Public Auditing with Fair Arbitration for Cloud CLOUD
12 VSJ1612 Data COMPUTING JAVA/2016

CLOUD
VSJ1613 Enabling Cloud Storage Auditing With Verifiable Outsourcing of COMPUTING
13 JAVA/2016
Key Updates

CLOUD
VSJ1614 Fine-Grained Two-Factor Access Control for Web-Based Cloud COMPUTING
14 JAVA/2016
Computing Services
15 VSJ1615 Geometric Range Search on Encrypted Spatial Data CLOUD COMPUTING JAVA/2016

VSJ1616 Identity-Based Encryption with Cloud Revocation Authority and CLOUD COMPUTING
16 JAVA/2016
Its Applications

VSJ1617 Identity-Based Proxy-Oriented Data Uploading and Remote Data CLOUD COMPUTING
17 JAVA/2016
Integrity Checking in Public Cloud

VSJ1618 Protecting Your Right: Verifiable Attribute-Based Keyword Search CLOUD COMPUTING
18 with Fine-Grained Owner-Enforced Search Authorization in the JAVA/2016
Cloud

19 VSJ1619 Real-Time Semantic Search Using Approximate Methodology for CLOUD COMPUTING JAVA/2016
Large-Scale Storage Systems

20 VSJ1620 Secure Data Sharing in Cloud Computing Using Revocable-Storage CLOUD COMPUTING JAVA/2016
Identity-Based Encryption

21 VSJ1621 Secure Optimization Computation Outsourcing in Cloud CLOUD COMPUTING JAVA/2016


Computing: A Case Study of Linear Programming

22 VSJ1622 TMACS: A Robust and Verifiable Threshold Multi-Authority CLOUD COMPUTING JAVA/2016
Access Control System in Public Cloud Storage

23 VSJ1623 A Modified Hierarchical Attribute-Based Encryption Access CLOUD COMPUTING JAVA/2016


Control Method for Mobile Cloud Computing

VSJ1624 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User CLOUD COMPUTING
24 JAVA/2016
Environments

25 VSJ1625 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud CLOUD COMPUTING JAVA/2016
Computing

26 VSJ1626 SecRBAC: Secure data in the Clouds CLOUD COMPUTING JAVA/2016

27 VSJ1627 A Novel Recommendation Model Regularized with User Trust and DATA MINING JAVA/2016
Item Ratings

28 VSJ1628 Automatically Mining Facets for Queries from Their Search DATA MINING JAVA/2016
Results

29 VSJ1629 Booster in High Dimensional Data Classification DATA MINING JAVA/2016

VSJ1630 Building an intrusion detection system using a filter-based DATA MINING


30 JAVA/2016
feature selection algorithm
31 VSJ1631 Connecting Social Media to E-Commerce: Cold-Start Product DATA MINING JAVA/2016
Recommendation Using Microblogging Information

32 VSJ1632 Cross-Domain Sentiment Classification Using Sentiment Sensitive DATA MINING JAVA/2016
Embeddings

33 VSJ1633 Crowdsourcing for Top-K Query Processing over Uncertain Data DATA MINING JAVA/2016

34 VSJ1634 Cyberbullying Detection based on Semantic-Enhanced DATA MINING JAVA/2016


Marginalized Denoising Auto-Encoder

35 VSJ1635 Domain-Sensitive Recommendation with User-Item Subgroup DATA MINING JAVA/2016


Analysis

36 VSJ1636 Efficient Algorithms for Mining Top-K High Utility Itemsets DATA MINING JAVA/2016

37 VSJ1637 Efficient Cache-Supported Path Planning on Roads DATA MINING JAVA/2016

VSJ1638 Mining User-Aware Rare Sequential Topic Patterns in Document DATA MINING
38 JAVA/2016
Streams

39 VSJ1639 Nearest Keyword Set Search in Multi-Dimensional Datasets DATA MINING JAVA/2016

40 VSJ1640 Rating Prediction based on Social Sentiment from Textual DATA MINING JAVA/2016
Reviews

41 VSJ1641 Location Aware Keyword Query Suggestion Based on Document DATA MINING JAVA/2016
Proximity

42 VSJ1642 Using Hashtag Graph-based Topic Model to Connect DATA MINING JAVA/2016
Semantically-related Words without Co-occurrence in Microblogs

VSJ1643 Quantifying Political Leaning from Tweets, Retweets, and DATA MINING
43 JAVA/2016
Retweeters

44 VSJ1644 Relevance Feedback Algorithms Inspired By Quantum Detection DATA MINING JAVA/2016

45 VSJ1645 Sentiment Embeddings with Applications to Sentiment Analysis DATA MINING JAVA/2016

46 VSJ1646 Top-Down XML Keyword Query Processing DATA MINING JAVA/2016

47 VSJ1647 Topic Sketch: Real-time Bursty Topic Detection from Twitter DATA MINING JAVA/2016

48 VSJ1648 Top-k Dominating Queries on Incomplete Data DATA MINING JAVA/2016


49 VSJ1649 Understanding Short Texts through Semantic Enrichment and DATA MINING JAVA/2016
Hashing

50 VSJ1650 A Stable Approach for Routing Queries in Unstructured P2P NETWORKING JAVA/2016
Networks

51 VSJ1651 iPath: Path Inference in Wireless Sensor Networks NETWORKING JAVA/2016

52 VSJ1652 Opportunistic Routing With Congestion Diversity in Wireless Ad NETWORKING JAVA/2016


Hoc Networks

53 VSJ1653 Spatial Reusability-Aware Routing in Multi-Hop Wireless NETWORKING JAVA/2016


Networks

54 VSJ1654 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile NETWORKING JAVA/2016
Users

55 VSJ1655 Energy and Memory Efficient Clone Detection in Wireless Sensor MOBILE COMPUTING JAVA/2016
Networks

56 VSJ1656 EPLQ: Efficient Privacy-Preserving Location-Based Query Over MOBILE COMPUTING JAVA/2016
Outsourced Encrypted Data

57 VSJ1657 Secure Overlay Routing Using Key Pre-Distribution: A Linear MOBILE COMPUTING JAVA/2016
Distance Optimization Approach

VSJ1658 Detecting Node Failures in Mobile Wireless Networks: A MOBILE COMPUTING


58 JAVA/2016
Probabilistic Approach

VSJ1659 A Hop-by-Hop Routing Mechanism for Green Internet PARALLEL &


59 JAVA/2016
DISTRIBUTED
SYSTEMS

VSJ1660 Continuous Answering Holistic Queries over Sensor Networks PARALLEL &
60 JAVA/2016
DISTRIBUTED
SYSTEMS

VSJ1661 Dictionary Based Secure Provenance Compression for Wireless PARALLEL &
61 JAVA/2016
DISTRIBUTED
Sensor Networks SYSTEMS

VSJ1662 The Server Provisioning Problem for Continuous Distributed PARALLEL &
62 JAVA/2016
DISTRIBUTED
Interactive Applications SYSTEMS

VSJ1663 Contributory Broadcast Encryption with Efficient Encryption and SECURE COMPUTING
63 JAVA/2016
Short Ciphertexts

64 VSJ1664 Data Lineage in Malicious Environments SECURE COMPUTING JAVA/2016


65 VSJ1665 Detecting Malicious Facebook Applications SECURE COMPUTING JAVA/2016

66 VSJ1666 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments SECURE COMPUTING JAVA/2016

67 VSJ1667 Inference Attack on Browsing History of Twitter Users using SECURE COMPUTING JAVA/2016
Public Click Analytics and Twitter Metadata

68 VSJ1668 Resolving Multi-party Privacy Conflicts in Social Media SECURE COMPUTING JAVA/2016

VSJ1669 Hidden Ciphertext Policy Attribute-Based Encryption Under INFORMATION


69 Standard Assumptions FORENSICS & JAVA/2016
SECURITY

VSJ1670 Optimized Search-and-Compute Circuits and Their Application to INFORMATION


70 Query Evaluation on Encrypted Data FORENSICS & JAVA/2016
SECURITY

VSJ1671 Privacy-Preserving Utility Verification of the Data Published by INFORMATION


71 Non-interactive Differentially Private Mechanisms FORENSICS & JAVA/2016
SECURITY

VSJ1672 Profiling Online Social Behaviors for Compromised Account INFORMATION


72 Detection FORENSICS & JAVA/2016
SECURITY

73 VSJ1673 A Locality Sensitive Low-Rank Model for Image Tag Completion IMAGE PROCESSING JAVA/2016

74 VSJ1674 A Scalable Approach for Content-Based Image Retrieval in Peer- IMAGE PROCESSING JAVA/2016
to-Peer Networks

75 VSJ1675 Learning of Multimodal Representations with Random Walks on IMAGE PROCESSING JAVA/2016
the Click Graph

76 VSJ1676 Online Multi-Modal Distance Metric Learning with Application to IMAGE PROCESSING JAVA/2016
Image Retrieval

77 VSJ1677 Tag Based Image Search by Social Re-ranking IMAGE PROCESSING JAVA/2016

VSJ1678 Social Friend Recommendation Based on Multiple Network MULTIMEDIA (Social


78 JAVA/2016
Correlation Networking)

79 VSJ1679 User-Service Rating Prediction by Exploring Social Users Rating MULTIMEDIA (Social JAVA/2016
Behaviors Networking)

80 VSJ1680 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- SOFTWARE JAVA/2016
Grained Benchmark, and Feature Evaluation ENGINEERING

Metamorphic Testing for Software Quality Assessment:


VSJ1681 A Study SOFTWARE
81 JAVA/2016
of Search Engines ENGINEERING

VSJ1682 SITAR: GUI Test Script Repair SOFTWARE


82 JAVA/2016
ENGINEERING

83 VSJ1683 Answering Approximate Queries over XML Data FUZZY SYSTEMS JAVA/2016

Vous aimerez peut-être aussi