Forming section troubleshooting checklist for improving wire life (1).ppt
Java ieee 2015
1. JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
S.NO
PROJECT
CODE
PROJECT TITLE DOMAIN
1 J1501
A Hybrid Cloud Approach for Secure Authorized
Deduplication
Cloud Computing
2 J1502
A Profit Maximization Scheme with Guaranteed
Quality of Service in Cloud Computing
Cloud Computing
3 J1503
A Scalable and Reliable Matching Service for
Content-Based Publish/Subscribe Systems
Cloud Computing
4 J1504
A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
Cloud Computing
5 J1505
A Secure Anti-Collusion Data Sharing Scheme for
Dynamic Groups in the Cloud
Cloud Computing
6 J1506
An Authenticated Trust and Reputation Calculation
and Management System for Cloud and Sensor
Networks Integration
Cloud Computing
7 J1507
Audit-Free Cloud Storage via Deniable Attribute-
based Encryption
Cloud Computing
8 J1508
Circuit Cipher text-policy Attribute-based Hybrid
Encryption with Verifiable Delegation in Cloud
Computing
Cloud Computing
9 J1509
Cloud Armor: Supporting Reputation-based Trust
Management for Cloud Services
Cloud Computing
10 J1510
Control Cloud Data Access Privilege and Anonymity
with Fully Anonymous Attribute-Based Encryption
Cloud Computing
11 J1511
Enabling Cloud Storage Auditing With Key-Exposure
Resistance
Cloud Computing
12 J1512
Enabling Fine-grained Multi-keyword Search
Supporting Classified Sub-dictionaries over Encrypted
Cloud Data
Cloud Computing
13 J1513
Identity-Based Encryption with Outsourced
Revocation in Cloud Computing
Cloud Computing
14 J1514
Key-Aggregate Searchable Encryption (KASE) for
Group Data Sharing via Cloud Storage
Cloud Computing
15 J1515
Privacy Preserving Ranked Multi-Keyword Search for
Multiple Data Owners in Cloud Computing
Cloud Computing
16 J1516
Privacy-Preserving Public Auditing for Regenerating-
Code-Based Cloud Storage
Cloud Computing
2. JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
17 J1517
Provable Multi copy Dynamic Data Possession in
Cloud Computing Systems
Cloud Computing
18 J1518
Public Integrity Auditing for Shared Dynamic Cloud
Data with Group User Revocation
Cloud Computing
19 J1519 Secure Auditing and Deduplicating Data in Cloud Cloud Computing
20 J1520
Stealthy Denial of Service Strategy in Cloud
Computing
Cloud Computing
21 J1521
Mobi Context: A Context-aware Cloud-Based Venue
Recommendation Framework
Cloud Computing
22 J1522
SAE: Toward Efficient Cloud Data Analysis
Service for Large-Scale Social Networks
Cloud Computing
23 J1523
A Fuzzy Preference Tree-Based Recommender
System for Personalized Business-to-Business E-
Services
FUZZY
SYSTEMS
24 J1524
Understanding the Performance and Potential of
Cloud Computing for Scientific Applications
Cloud Computing
25 J1525
Towards Optimized Fine-Grained Pricing of IaaS
Cloud Platform
Cloud Computing
26 J1526
Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Cloud Computing
27 J1527
Reactive Resource Provisioning Heuristics for
Dynamic Data flows on Cloud Infrastructure
Cloud Computing
28 J1528
Location-Aware and Personalized Collaborative
Filtering for Web Service Recommendation
SERVICE
COMPUTING
(WEB SERVICE)
29 J1529
OPoR: Enabling Proof of Retrievability in Cloud
Computing with Resource-Constrained Devices
Cloud Computing
30 J1530 Best Keyword Cover Search DATA MINING
31 J1531
Co-Extracting Opinion Targets and Opinion Words
from Online Reviews Based on the Word Alignment
Model
DATA MINING
32 J1532
Context-Based Diversification for Keyword Queries
over XML Data
DATA MINING
33 J1533 Discovery of Ranking Fraud for Mobile Apps DATA MINING
34 J1534 Malware Propagation in Large-Scale Networks DATA MINING
35 J1535
On Summarization and Timeline Generation for
Evolutionary Tweet Streams
DATA MINING
3. JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
36 J1536
Privacy Policy Inference of User-Uploaded Images on
Content Sharing Sites
DATA MINING
37 J1537 Progressive Duplicate Detection DATA MINING
38 J1538
Reverse Nearest Neighbors in Unsupervised Distance-
Based Outlier Detection
DATA MINING
39 J1539
Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based
Services
DATA MINING
40 J1540 Scalable Constrained Spectral Clustering DATA MINING
41 J1541
Towards Effective Bug Triage with Software Data
Reduction Techniques
DATA MINING
42 J1542
Tweet Segmentation and Its Application to Named
Entity Recognition
DATA MINING
43 J1543
Subgraph Matching with Set Similarity in a Large
Graph Database
DATA MINING
44 J1544
Structured Learning from Heterogeneous Behavior for
Social Identity Linkage
DATA MINING
45 J1545
Making Digital Artifacts on the Web Verifiable and
Reliable
DATA MINING
46 J1546 Anonymizing Collections of Tree-Structured Data DATA MINING
47 J1547 FOCS: Fast Overlapped Community Search DATA MINING
48 J1548
Sparsity Learning Formulations for Mining Time-
Varying Data
DATA MINING
49 J1549
K-Nearest Neighbor Classification over Semantically
Secure Encrypted Relational
DATA MINING
50 J1550
The Impact of View Histories on Edit
Recommendations
DATA MINING
51 J1551
Agent-based Interactions and Economic Encounters in
an Intelligent Inter Cloud
DATA MINING
52 J1552
A Distortion-Resistant Routing Framework for Video
Traffic in Wireless Multihop Networks
NETWORKING
53 J1553 Detecting Malicious Face book Applications NETWORKING
54 J1554
Maximizing P2P File Access Availability in Mobile
Ad Hoc Networks though Replication for Efficient
File Sharing
NETWORKING
4. JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
55 J1555
A Proximity-Aware Interest-Clustered P2P File
Sharing System
NETWORKING
56 J1556 FRAppE: Detecting Malicious Facebook Applications NETWORKING
57 J1557
Dynamic Routing for Data Integrity and Delay
Differentiated Services in Wireless Sensor Networks
MOBILE
COMPUTING
58 J1558
Friendbook: A Semantic-Based Friend
Recommendation System for Social Networks
MOBILE
COMPUTING
59 J1559
Privacy-Preserving and Truthful Detection of Packet
Dropping Attacks in Wireless Ad Hoc Networks
MOBILE
COMPUTING
60 J1560
Designing High Performance Web-Based Computing
Services to Promote Telemedicine Database
Management System
SERVICE
COMPUTING
(WEB SERVICE)
61 J1561
Maximizing Energy Efficiency in Multiple Access
Channels by Exploiting Packet Dropping and
Transmitter Buffering
MOBILE
COMPUTING
62 J1562
Tracking Temporal Community Strength in Dynamic
Networks
MOBILE
COMPUTING
63 J1563
Modeling and Analysis of Communication Traffic
Heterogeneity in Opportunistic Networks
MOBILE
COMPUTING
64 J1564
Towards Information Diffusion in Mobile Social
Networks
MOBILE
COMPUTING
65 J1565
Automatic Face Naming by Learning Discriminative
Affinity Matrices From Weakly Labeled Image
IMAGE
PROCESSING
66 J1566
A Computational Dynamic Trust Model for User
Authorization
SECURE
COMPUTING
67 J1567
A Lightweight Secure Scheme for Detecting
Provenance Forgery and Packet Drop Attacks in
Wireless Sensor Networks
SECURE
COMPUTING
68 J1568
Continuous and Transparent User Identity Verification
for Secure Internet Services
SECURE
COMPUTING
69 J1569
Contributory Broadcast Encryption with Efficient
Encryption and Short Cipher texts
SECURE
COMPUTING
70 J1570
DDSGA: A Data-Driven Semi-Global Alignment
Approach for Detecting Masquerade Attacks
SECURE
COMPUTING
5. JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
71 J1571
Improved Privacy-Preserving P2P Multimedia
Distribution Based on Recombined Fingerprints
SECURE
COMPUTING
72 J1572
Secure Data Aggregation Technique for Wireless
Sensor Networks in the Presence of Collusion Attacks
SECURE
COMPUTING
73 J1573
Secure Spatial Top-k Query Processing via Untrusted
Location- Based Service Providers
SECURE
COMPUTING
74 J1574
Smart Crawler: A Two-stage Crawler for Efficiently
Harvesting Deep-Web Interfaces
SECURE
COMPUTING
75 J1575
Collusion-Tolerable Privacy-Preserving Sum and
Product Calculation without Secure Channel
SECURE
COMPUTING
76 J1576
Learning to Rank Image Tags with Limited Training
Examples
IMAGE
PROCESSING
77 J1577
Group Key Agreement with Local Connectivity SECURE
COMPUTING
78 J1578
Data Lineage in Malicious Environments SECURE
COMPUTING
79 J1579
Geolocalized Modeling for Dish Recognition IMAGE
PROCESSING
80 J1580
Improving Privacy and Security in Decentralized
Ciphertext-Policy Attribute-Based Encryption
SECURE
COMPUTING
81 J1581
Semantic-Improved Color Imaging Applications: It
Is All About Context
IMAGE
PROCESSING
82 J1582 YouTube Video Promotion by Cross-network IMAGE
PROCESSING
83 J1583
Multi view Alignment Hashing for Efficient Image
Search
IMAGE
PROCESSING
84 J1584
Anonymity-based Privacy-preserving Data Reporting
for Participatory Sensing
SECURE
COMPUTING
85 J1585
Asymmetric Social Proximity Based Private Matching
Protocols for Online Social Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
86 J1586
Cost-Effective Authentic and Anonymous Data
Sharing with Forward Security
PARALLEL &
DISTRIBUTED
SYSTEMS
87 J1587
Secure Distributed Deduplication Systems with
Improved Reliability
PARALLEL &
DISTRIBUTED
SYSTEMS
88 J1588
Learning to Rank Image Tags With Limited Training
Examples
IMAGE
PROCESSING
6. JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
89 J1589
EMR: A Scalable Graph-based Ranking Model for
Content-based Image Retrieval
IMAGE
PROCESSING
90 J1590
An Attribute-Assisted Reranking Model for Web
Image Search
IMAGE
PROCESSING
91 J1591
Software Puzzle: A Countermeasure to Resource-
Inflated Denial of- Service Attacks
INFORMATION
FORENSICS AND
SECURITY
92 J1592
Collusion-Tolerable Privacy-Preserving Sum and
Product Calculation without Secure Channel
PARALLEL &
DISTRIBUTED
SYSTEMS
93 J1593
Passive IP Trace back: Disclosing the Locations of IP
Spoofers from Path Backscatter
INFORMATION
FORENSICS AND
SECURITY
94 J1594
A Framework for Secure Computations with Two
Non-Colluding Servers and Multiple Clients, Applied
to Recommendations
INFORMATION
FORENSICS AND
SECURITY
95 J1595
Effective Key Management in Dynamic Wireless
Sensor Networks
INFORMATION
FORENSICS AND
SECURITY
96 J1596
Key Updating for Leakage Resiliency with
Application to AES Modes of Operation
INFORMATION
FORENSICS AND
SECURITY