Follow us on Facebook

Header Ads

Java IEEE Projects 2015

2015-2016 IEEE JAVA PROJECT TITLES:

2015 – 16 IEEE CLOUD COMPUTING PROJECT TITLES:

JPJ1501 -A Hybrid Cloud Approach for Secure Authorized Deduplication

JPJ1502 - A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing

JPJ1503 - A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems

JPJ1504 - A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

JPJ1505 - A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

JPJ1506 - An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration

JPJ1507 - Audit-Free Cloud Storage via Deniable Attribute-based Encryption

JPJ1508 - Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing

JPJ1509 - CloudArmor: Supporting Reputation-based Trust Management for Cloud Services

JPJ1510 - Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

JPJ1511 - Enabling Cloud Storage Auditing With Key-Exposure Resistance

JPJ1512 - Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data

JPJ1513 - Identity-Based Encryption with Outsourced Revocation in Cloud Computing

JPJ1514 - Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage

JPJ1515 - Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing

JPJ1516 - Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage

JPJ1517 - Provable Multicopy Dynamic Data Possession in Cloud Computing Systems

JPJ1518 - Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

JPJ1519 - Secure Auditing and Deduplicating Data in Cloud

JPJ1520 - Stealthy Denial of Service Strategy in Cloud Computing

 

2015 -16 IEEE DATA MINING PROJECT TITLES

JPJ1521 - Best Keyword Cover Search

JPJ1522 - Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

JPJ1523 - Context-Based Diversification for Keyword Queries over XML Data

JPJ1524 - Discovery of Ranking Fraud for Mobile Apps

JPJ1525 - Malware Propagation in Large-Scale Networks

JPJ1526 - On Summarization and Timeline Generation for Evolutionary Tweet Streams

JPJ1527 - Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

JPJ1528 - Progressive Duplicate Detection

JPJ1529 - Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection

JPJ1530 - Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services

JPJ1531 - Scalable Constrained Spectral Clustering

JPJ1532 - Towards Effective Bug Triage with Software Data Reduction Techniques

JPJ1533 - Tweet Segmentation and Its Application to Named Entity Recognition

 

2015- 16 IEEE NETWORKING PROJECT TITLES

JPJ1534 - A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks

JPJ1535 - A Proximity-Aware Interest-Clustered P2P File Sharing System

JPJ1536 - Detecting Malicious Facebook Applications

JPJ1537 - Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing

 

2015- 16 IEEE MOBILE COMPUTING PROJECT TITLES

JPJ1538 - Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks

JPJ1539 - Friendbook: A Semantic-Based Friend Recommendation System for Social Networks

JPJ1540 - Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

JPJ1541 - User-Defined Privacy Grid System for Continuous Location-Based Services

 

2015 – 16 IEEE SECURE COMPUTING PROJECT TITLES

JPJ1542 - A Computational Dynamic Trust Model for User Authorization

JPJ1543 - A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

JPJ1544 - Continuous and Transparent User Identity Verification for Secure Internet Services

JPJ1545 - Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

JPJ1546 - DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks

JPJ1547 - Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

JPJ1548 - Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

JPJ1549 - Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers

 

2015 – 16 IEEE PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES

JPJ1550 - Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks

JPJ1551 - Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

JPJ1552 - Secure Distributed Deduplication Systems with Improved Reliability

 

2015- 16 IEEE INFORMATION FORENSICS AND SECURITY PROJECT TITLES

JPJ1553 - A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations

JPJ1554 - Effective Key Management in Dynamic Wireless Sensor Networks

JPJ1555 - Key Updating for Leakage Resiliency with Application to AES Modes of Operation

JPJ1556 - Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter

JPJ1557 - Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks

 

2015 – 16 IEEE IMAGE PROCESSING PROJECT TITLES

JPJ1558 - An Attribute-Assisted Reranking Model for Web Image Search

JPJ1559 - EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

JPJ1560 - Learning to Rank Image Tags With Limited Training Examples

  2015- 16 IEEE SERVICE COMPUTING (WEBS SERVICE) PROJECT TITLES

JPJ1561 - Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

JPJ1562 - Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation

2015 – 16 IEEE FUZZY SYSTEMS PROJECT TITLES

JPJ1563 - A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services

ADDITIONAL TITLES

Real-Time Detection of Traffic From Twitter Stream Analysis

t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation

Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search

Privacy-Preserving Detection of Sensitive Data Exposure

Discovering Latent Semantics in Web Documents using Fuzzy Clustering

CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes

SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces

Throughput Maximization in Cognitive Radio Networks using Levenberg-Marquardt Algorithm

On the Security of Data Access Control for Multiauthority Cloud Storage Systems

An Efficient Distributed Trust Model for Wireless Sensor Networks

ViDE: A Vision-Based Approach for Deep Web Data Extraction