SlideShare a Scribd company logo
1 of 5
Download to read offline
JAVA IEEE TITLES
S.NO
PROJECT
CODE PROJECT TITLE DOMAIN
1 J1601
Automatically Mining Facets for Queries from Their
Search Results
Data Mining
2 J1602
Building an intrusion detection system using a filter-
based feature selection algorithm
Data Mining
3 J1603
Crowd sourcing for Top-K Query Processing over
Uncertain Data
Data Mining
4 J1604
Domain-Sensitive Recommendation with User-Item
Subgroup Analysis
Data Mining
5 J1605
Connecting Social Media to E-Commerce: Cold-Start
Product Recommendation Using Microblogging
Information
Data Mining
6 J1606 Booster in High Dimensional Data Classification Data Mining
7 J1607
Cyberbullying Detection based on Semantic-Enhanced
Marginalized Denoising Auto-Encoder
Data Mining
8 J1608
Efficient Algorithms for Mining Top-K High Utility
Itemsets
Data Mining
9 J1609
Cross-Domain Sentiment Classification Using
Sentiment Sensitive Embeddings
Data Mining
10 J1610 Top-k Dominating Queries on Incomplete Data Data Mining
11 J1611
Mining User-Aware Rare Sequential Topic Patterns in
Document Streams
Data Mining
12 J1612
Location Aware Keyword Query Suggestion Based on
Document Proximity
Data Mining
13 J1613
Quantifying Political Leaning from Tweets, Retweets,
and Retweeters
Data Mining
14 J1614
TopicSketch: Real-time Bursty Topic Detection from
Twitter
Data Mining
15 J1615 Efficient Cache-Supported Path Planning on Roads Data Mining
16 J1616
Sentiment Embeddings with Applications to Sentiment
Analysis
Data Mining
17 J1617
Nearest Keyword Set Search in Multi-Dimensional
Datasets
Data Mining
18 J1618
Rating Prediction based on Social Sentiment from
Textual Reviews
Data Mining
19 J1619
Using Hash tag Graph-based Topic Model to Connect
Semantically-related Words without Co-occurrence in
Data Mining
Micro blogs
20 J1620
Relevance Feedback Algorithms Inspired By Quantum
Detection
Data Mining
21 J1621
An Efficient File Hierarchy Attribute-Based
Encryption Scheme in Cloud Computing
Cloud Computing
22 J1622
CDA Generation and Integration for Health
Information Exchange Based on Cloud Computing
System
Cloud Computing
23 J1623
A Secure Anti-Collusion Data Sharing Scheme for
Dynamic Groups in the Cloud
Cloud Computing
24 J1624
A Secure and Dynamic Multi-Keyword Ranked
Search Scheme over Encrypted Cloud Data
Cloud Computing
25 J1625
An Efficient Privacy-Preserving Ranked Keyword
Search Method
Cloud Computing
26 J1626
Circuit Cipher text-Policy Attribute-Based Hybrid
Encryption with Verifiable Delegation in Cloud
Computing
Cloud Computing
27 J1627
Conjunctive Keyword Search With Designated Tester
and Timing Enabled Proxy Re-Encryption Function
for E-Health Clouds
Cloud Computing
28 J1628
Cloud Armor: Supporting Reputation-Based Trust
Management for Cloud Services
Cloud Computing
29 J1629
Fine-Grained Two-Factor Access Control for Web-
Based Cloud Computing Services
Cloud Computing
30 J1630
Conditional Identity-Based Broadcast Proxy Re-
Encryption and Its Application to Cloud Email
Cloud Computing
31 J1631
Dual-Server Public-Key Encryption With Keyword
Search for Secure Cloud Storage
Cloud Computing
32 J1632 Geometric Range Search on Encrypted Spatial Data Cloud Computing
33 J1633
Identity-Based Encryption with Cloud Revocation
Authority and Its Applications
Cloud Computing
34 J1634
Enabling Cloud Storage Auditing With Verifiable
Outsourcing of Key Updates
Cloud Computing
35 J1635
Protecting Your Right: Verifiable Attribute-Based
Keyword Search with Fine-Grained Owner-Enforced
Search Authorization in the Cloud
Cloud Computing
36 J1636
Identity-Based Proxy-Oriented Data Uploading and
Remote Data Integrity Checking in Public Cloud
Cloud Computing
37 J1637
Diplo Cloud: Efficient and Scalable Management of
RDF Data in the Cloud
Cloud Computing
38 J1638
TMACS: A Robust and Verifiable Threshold Multi-
Authority Access Control System in Public Cloud
Storage
Cloud Computing
39 J1639
Secure Data Sharing in Cloud Computing Using
Revocable-Storage Identity-Based Encryption
Cloud Computing
40 J1640
Real-Time Semantic Search Using Approximate
Methodology for Large-Scale Storage Systems
Cloud Computing
41 J1641
Secure Optimization Computation Outsourcing in
Cloud Computing: A Case Study of Linear
Programming
Cloud Computing
42 J1642
DeyPoS: Deduplicatable Dynamic Proof of Storage
for Multi-User Environments
Cloud Computing
43 J1643
A Modified Hierarchical Attribute-Based Encryption
Access Control Method for Mobile Cloud Computing
Cloud Computing
44 J1644
Flexible and Fine-Grained Attribute-Based Data
Storage in Cloud Computing
Cloud Computing
45 J1645 SecRBAC: Secure data in the Clouds Cloud Computing
46 J1646
A Stable Approach for Routing Queries in
Unstructured P2P Networks
Networking
47 J1647
Spatial Reusability-Aware Routing in Multi-Hop
Wireless Networks
Networking
48 J1648
Opportunistic Routing With Congestion Diversity in
Wireless Ad Hoc Networks
Networking
49 J1649
STAMP: Enabling Privacy-Preserving Location
Proofs for Mobile Users
Networking
50 J1650 iPath: Path Inference in Wireless Sensor Networks Networking
51 J1651 Data Lineage in Malicious Environments
Secure
Computing
52 J1652 Detecting Malicious Facebook Applications
Secure
Computing
53 J1653
Inference Attack on Browsing History of Twitter
Users using Public Click Analytics and Twitter
Metadata
Secure
Computing
54 J1654
Contributory Broadcast Encryption with Efficient
Encryption and Short Ciphertexts
Secure
Computing
55 J1655
FRoDO: Fraud Resilient Device for Off-Line Micro-
Payments
Secure
Computing
56 J1656
Resolving Multi-party Privacy Conflicts in Social
Media
Secure
Computing
57 J1657 A Hop-by-Hop Routing Mechanism for Green Internet PDS
58 J1658
The Server Provisioning Problem for Continuous
Distributed Interactive Applications
PDS
59 J1659
Continuous Answering Holistic Queries over Sensor
Networks
PDS
60 J1660
Dictionary Based Secure Provenance Compression for
Wireless Sensor Networks
PDS
61 J1661
EPLQ: Efficient Privacy-Preserving Location-Based
Query Over Outsourced Encrypted Data
Mobile
Computing
62 J1662
Detecting Node Failures in Mobile Wireless
Networks: A Probabilistic Approach
Mobile
Computing
63 J1663
Energy and Memory Efficient Clone Detection in
Wireless Sensor Networks
Mobile
Computing
64 J1664
Secure Overlay Routing Using Key Pre-Distribution:
A Linear Distance Optimization Approach
Mobile
Computing
65 J1665
Optimized Search-and-Compute Circuits and Their
Application to Query Evaluation on Encrypted Data
Information
Forensics &
Security
66 J1666
Profiling Online Social Behaviors for Compromised
Account Detection
Information
Forensics &
Security
67 J1667
Online Multi-Modal Distance Metric Learning with
Application to Image Retrieval
Image Processing
68 J1668 Tag Based Image Search by Social Re-ranking Image Processing
69 J1669
Learning of Multimodal Representations with Random
Walks on the Click Graph
Image Processing
70 J1670
A Scalable Approach for Content-Based Image
Retrieval in Peer to- Peer Networks
Image Processing
71 J1671 Encrypted Data Management with Deduplication Cloud Computing
72 J1672
Leveraging Data Deduplication to Improve the
Performance
Cloud Computing
73 J1673
Two-Factor Data Security Protection Mechanism for
Cloud Storage System
Cloud Computing
74 J1674
Attribute Based Data Sharing Scheme Revisited in
Cloud Computing
Cloud Computing
75 J1675 Incremental Affinity Propagation Clustering Passing Data Mining
76 J1676 Mapping Bug Reports to Relevant Files Cloud Computing
77 J1677 Crawling Hidden Objects with kNN Queries Data Mining
78 J1678 A Scalable Approach for Content-Based Data Mining
79 J1679
Secure Reversible Image Data Hiding over Encrypted
Domain via Key Modulation
Image Processing
80 J1680
Cross-Platform Identification of Anonymous Identical
Users in Multiple
Data Mining
81 J1681
Clustering Data Streams Based on Shared
Density Between Micro-Clusters
Data Mining

More Related Content

What's hot

2015 application projects
2015 application projects2015 application projects
2015 application projectsHari Krishnan
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects MSR PROJECTS
 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14projectsepark
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects listtmksmanju1
 
2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computingmanjunath205
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014sybiantech
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryLeMeniz Infotech
 
IEEE 2016-2017 SOFTWARE TITLE
IEEE 2016-2017  SOFTWARE TITLE IEEE 2016-2017  SOFTWARE TITLE
IEEE 2016-2017 SOFTWARE TITLE FOCUSLOGICPROJECTS
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects listtmksmanju1
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects listtmksmanju1
 

What's hot (14)

2015 application projects
2015 application projects2015 application projects
2015 application projects
 
MS.NET IEEE 2015
MS.NET IEEE 2015MS.NET IEEE 2015
MS.NET IEEE 2015
 
JAVA TITLES 2014
JAVA TITLES 2014JAVA TITLES 2014
JAVA TITLES 2014
 
2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects 2021- 22 IEEE JAVA Projects
2021- 22 IEEE JAVA Projects
 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 
2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing
 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014Final Year Project Titles 2013 2014
Final Year Project Titles 2013 2014
 
2014 IEEE project
2014 IEEE project 2014 IEEE project
2014 IEEE project
 
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherryIeee projects-in-pondicherry | 2015 ieee projects in pondicherry
Ieee projects-in-pondicherry | 2015 ieee projects in pondicherry
 
IEEE 2016-2017 SOFTWARE TITLE
IEEE 2016-2017  SOFTWARE TITLE IEEE 2016-2017  SOFTWARE TITLE
IEEE 2016-2017 SOFTWARE TITLE
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 
2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list2018 and 2019 java ieee projects list
2018 and 2019 java ieee projects list
 

Similar to Java ieee titles2016 student

2016 java - projects list-9581464142
2016  java -  projects list-95814641422016  java -  projects list-9581464142
2016 java - projects list-9581464142MSR PROJECTS
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015kishu0005
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfJAYAPRAKASH JPINFOTECH
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in JavaPapitha Velumani
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
3i techso project title
3i techso project title3i techso project title
3i techso project title3itechso
 
M.tech java 2014 15 list
M.tech java 2014 15 listM.tech java 2014 15 list
M.tech java 2014 15 listSAK Informatics
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 Ganesh Ganesan
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsgagnertechnologies
 
IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC excellertechnoly
 
2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projectsmanjunath205
 
2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projectsmanjunath205
 
Main p roject list for csc it
Main p roject list for  csc itMain p roject list for  csc it
Main p roject list for csc itKhadarbaba Shaik
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Nexgen Technology
 

Similar to Java ieee titles2016 student (20)

2016 java - projects list-9581464142
2016  java -  projects list-95814641422016  java -  projects list-9581464142
2016 java - projects list-9581464142
 
Java 2015
Java 2015Java 2015
Java 2015
 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdf
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
Java titles 2017 2018
Java titles 2017 2018Java titles 2017 2018
Java titles 2017 2018
 
3i techso project title
3i techso project title3i techso project title
3i techso project title
 
M.tech java 2014 15 list
M.tech java 2014 15 listM.tech java 2014 15 list
M.tech java 2014 15 list
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
 
IEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science studentsIEEE 2014 Title's list for computer science students
IEEE 2014 Title's list for computer science students
 
IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC IEEE 2014 Title's list for CSC
IEEE 2014 Title's list for CSC
 
2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects
 
2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects
 
2014 list
2014 list2014 list
2014 list
 
IEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for meIEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for me
 
Dotnet ieee 2014, completed list(gy)
Dotnet ieee 2014, completed list(gy)Dotnet ieee 2014, completed list(gy)
Dotnet ieee 2014, completed list(gy)
 
Main p roject list for csc it
Main p roject list for  csc itMain p roject list for  csc it
Main p roject list for csc it
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 

More from Green Corner Tech,Nellore

More from Green Corner Tech,Nellore (10)

Vlsi Projects titles 2018 19
Vlsi Projects titles 2018 19Vlsi Projects titles 2018 19
Vlsi Projects titles 2018 19
 
Matlab ECE ieee titles 2018 2019
Matlab ECE ieee titles 2018 2019Matlab ECE ieee titles 2018 2019
Matlab ECE ieee titles 2018 2019
 
Diploma projects Mini projects list
Diploma projects Mini projects listDiploma projects Mini projects list
Diploma projects Mini projects list
 
Embedded Projects b.tech 2018-19
Embedded Projects b.tech 2018-19Embedded Projects b.tech 2018-19
Embedded Projects b.tech 2018-19
 
Eee titles2018 2019
Eee titles2018 2019Eee titles2018 2019
Eee titles2018 2019
 
Embedded b tech projects nellore
Embedded b tech projects nelloreEmbedded b tech projects nellore
Embedded b tech projects nellore
 
CSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.NelloreCSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.Nellore
 
Btech eee projects Nellore,Greencornertech
Btech eee projects Nellore,GreencornertechBtech eee projects Nellore,Greencornertech
Btech eee projects Nellore,Greencornertech
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellore
 
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...CSE Java  ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
CSE Java ieee titles 2015-16,Live Projects,Green Corner Tech,Nellore,Andhra ...
 

Recently uploaded

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

Java ieee titles2016 student

  • 1. JAVA IEEE TITLES S.NO PROJECT CODE PROJECT TITLE DOMAIN 1 J1601 Automatically Mining Facets for Queries from Their Search Results Data Mining 2 J1602 Building an intrusion detection system using a filter- based feature selection algorithm Data Mining 3 J1603 Crowd sourcing for Top-K Query Processing over Uncertain Data Data Mining 4 J1604 Domain-Sensitive Recommendation with User-Item Subgroup Analysis Data Mining 5 J1605 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information Data Mining 6 J1606 Booster in High Dimensional Data Classification Data Mining 7 J1607 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder Data Mining 8 J1608 Efficient Algorithms for Mining Top-K High Utility Itemsets Data Mining 9 J1609 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings Data Mining 10 J1610 Top-k Dominating Queries on Incomplete Data Data Mining 11 J1611 Mining User-Aware Rare Sequential Topic Patterns in Document Streams Data Mining 12 J1612 Location Aware Keyword Query Suggestion Based on Document Proximity Data Mining 13 J1613 Quantifying Political Leaning from Tweets, Retweets, and Retweeters Data Mining 14 J1614 TopicSketch: Real-time Bursty Topic Detection from Twitter Data Mining 15 J1615 Efficient Cache-Supported Path Planning on Roads Data Mining 16 J1616 Sentiment Embeddings with Applications to Sentiment Analysis Data Mining 17 J1617 Nearest Keyword Set Search in Multi-Dimensional Datasets Data Mining 18 J1618 Rating Prediction based on Social Sentiment from Textual Reviews Data Mining 19 J1619 Using Hash tag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Data Mining
  • 2. Micro blogs 20 J1620 Relevance Feedback Algorithms Inspired By Quantum Detection Data Mining 21 J1621 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing Cloud Computing 22 J1622 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System Cloud Computing 23 J1623 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing 24 J1624 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing 25 J1625 An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud Computing 26 J1626 Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing 27 J1627 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds Cloud Computing 28 J1628 Cloud Armor: Supporting Reputation-Based Trust Management for Cloud Services Cloud Computing 29 J1629 Fine-Grained Two-Factor Access Control for Web- Based Cloud Computing Services Cloud Computing 30 J1630 Conditional Identity-Based Broadcast Proxy Re- Encryption and Its Application to Cloud Email Cloud Computing 31 J1631 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage Cloud Computing 32 J1632 Geometric Range Search on Encrypted Spatial Data Cloud Computing 33 J1633 Identity-Based Encryption with Cloud Revocation Authority and Its Applications Cloud Computing 34 J1634 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates Cloud Computing 35 J1635 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud Cloud Computing 36 J1636 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud Cloud Computing 37 J1637 Diplo Cloud: Efficient and Scalable Management of RDF Data in the Cloud Cloud Computing
  • 3. 38 J1638 TMACS: A Robust and Verifiable Threshold Multi- Authority Access Control System in Public Cloud Storage Cloud Computing 39 J1639 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Cloud Computing 40 J1640 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems Cloud Computing 41 J1641 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming Cloud Computing 42 J1642 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments Cloud Computing 43 J1643 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Cloud Computing 44 J1644 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing Cloud Computing 45 J1645 SecRBAC: Secure data in the Clouds Cloud Computing 46 J1646 A Stable Approach for Routing Queries in Unstructured P2P Networks Networking 47 J1647 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks Networking 48 J1648 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks Networking 49 J1649 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users Networking 50 J1650 iPath: Path Inference in Wireless Sensor Networks Networking 51 J1651 Data Lineage in Malicious Environments Secure Computing 52 J1652 Detecting Malicious Facebook Applications Secure Computing 53 J1653 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata Secure Computing 54 J1654 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts Secure Computing 55 J1655 FRoDO: Fraud Resilient Device for Off-Line Micro- Payments Secure Computing 56 J1656 Resolving Multi-party Privacy Conflicts in Social Media Secure Computing 57 J1657 A Hop-by-Hop Routing Mechanism for Green Internet PDS
  • 4. 58 J1658 The Server Provisioning Problem for Continuous Distributed Interactive Applications PDS 59 J1659 Continuous Answering Holistic Queries over Sensor Networks PDS 60 J1660 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks PDS 61 J1661 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data Mobile Computing 62 J1662 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach Mobile Computing 63 J1663 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks Mobile Computing 64 J1664 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach Mobile Computing 65 J1665 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data Information Forensics & Security 66 J1666 Profiling Online Social Behaviors for Compromised Account Detection Information Forensics & Security 67 J1667 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval Image Processing 68 J1668 Tag Based Image Search by Social Re-ranking Image Processing 69 J1669 Learning of Multimodal Representations with Random Walks on the Click Graph Image Processing 70 J1670 A Scalable Approach for Content-Based Image Retrieval in Peer to- Peer Networks Image Processing 71 J1671 Encrypted Data Management with Deduplication Cloud Computing 72 J1672 Leveraging Data Deduplication to Improve the Performance Cloud Computing 73 J1673 Two-Factor Data Security Protection Mechanism for Cloud Storage System Cloud Computing 74 J1674 Attribute Based Data Sharing Scheme Revisited in Cloud Computing Cloud Computing 75 J1675 Incremental Affinity Propagation Clustering Passing Data Mining 76 J1676 Mapping Bug Reports to Relevant Files Cloud Computing 77 J1677 Crawling Hidden Objects with kNN Queries Data Mining 78 J1678 A Scalable Approach for Content-Based Data Mining
  • 5. 79 J1679 Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation Image Processing 80 J1680 Cross-Platform Identification of Anonymous Identical Users in Multiple Data Mining 81 J1681 Clustering Data Streams Based on Shared Density Between Micro-Clusters Data Mining