SlideShare a Scribd company logo
1 of 6
Download to read offline
JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
S.NO
PROJECT
CODE
PROJECT TITLE DOMAIN
1 J1501
A Hybrid Cloud Approach for Secure Authorized
Deduplication
Cloud Computing
2 J1502
A Profit Maximization Scheme with Guaranteed
Quality of Service in Cloud Computing
Cloud Computing
3 J1503
A Scalable and Reliable Matching Service for
Content-Based Publish/Subscribe Systems
Cloud Computing
4 J1504
A Secure and Dynamic Multi-keyword Ranked Search
Scheme over Encrypted Cloud Data
Cloud Computing
5 J1505
A Secure Anti-Collusion Data Sharing Scheme for
Dynamic Groups in the Cloud
Cloud Computing
6 J1506
An Authenticated Trust and Reputation Calculation
and Management System for Cloud and Sensor
Networks Integration
Cloud Computing
7 J1507
Audit-Free Cloud Storage via Deniable Attribute-
based Encryption
Cloud Computing
8 J1508
Circuit Cipher text-policy Attribute-based Hybrid
Encryption with Verifiable Delegation in Cloud
Computing
Cloud Computing
9 J1509
Cloud Armor: Supporting Reputation-based Trust
Management for Cloud Services
Cloud Computing
10 J1510
Control Cloud Data Access Privilege and Anonymity
with Fully Anonymous Attribute-Based Encryption
Cloud Computing
11 J1511
Enabling Cloud Storage Auditing With Key-Exposure
Resistance
Cloud Computing
12 J1512
Enabling Fine-grained Multi-keyword Search
Supporting Classified Sub-dictionaries over Encrypted
Cloud Data
Cloud Computing
13 J1513
Identity-Based Encryption with Outsourced
Revocation in Cloud Computing
Cloud Computing
14 J1514
Key-Aggregate Searchable Encryption (KASE) for
Group Data Sharing via Cloud Storage
Cloud Computing
15 J1515
Privacy Preserving Ranked Multi-Keyword Search for
Multiple Data Owners in Cloud Computing
Cloud Computing
16 J1516
Privacy-Preserving Public Auditing for Regenerating-
Code-Based Cloud Storage
Cloud Computing
JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
17 J1517
Provable Multi copy Dynamic Data Possession in
Cloud Computing Systems
Cloud Computing
18 J1518
Public Integrity Auditing for Shared Dynamic Cloud
Data with Group User Revocation
Cloud Computing
19 J1519 Secure Auditing and Deduplicating Data in Cloud Cloud Computing
20 J1520
Stealthy Denial of Service Strategy in Cloud
Computing
Cloud Computing
21 J1521
Mobi Context: A Context-aware Cloud-Based Venue
Recommendation Framework
Cloud Computing
22 J1522
SAE: Toward Efficient Cloud Data Analysis
Service for Large-Scale Social Networks
Cloud Computing
23 J1523
A Fuzzy Preference Tree-Based Recommender
System for Personalized Business-to-Business E-
Services
FUZZY
SYSTEMS
24 J1524
Understanding the Performance and Potential of
Cloud Computing for Scientific Applications
Cloud Computing
25 J1525
Towards Optimized Fine-Grained Pricing of IaaS
Cloud Platform
Cloud Computing
26 J1526
Service Operator-aware Trust Scheme for Resource
Matchmaking across Multiple Clouds
Cloud Computing
27 J1527
Reactive Resource Provisioning Heuristics for
Dynamic Data flows on Cloud Infrastructure
Cloud Computing
28 J1528
Location-Aware and Personalized Collaborative
Filtering for Web Service Recommendation
SERVICE
COMPUTING
(WEB SERVICE)
29 J1529
OPoR: Enabling Proof of Retrievability in Cloud
Computing with Resource-Constrained Devices
Cloud Computing
30 J1530 Best Keyword Cover Search DATA MINING
31 J1531
Co-Extracting Opinion Targets and Opinion Words
from Online Reviews Based on the Word Alignment
Model
DATA MINING
32 J1532
Context-Based Diversification for Keyword Queries
over XML Data
DATA MINING
33 J1533 Discovery of Ranking Fraud for Mobile Apps DATA MINING
34 J1534 Malware Propagation in Large-Scale Networks DATA MINING
35 J1535
On Summarization and Timeline Generation for
Evolutionary Tweet Streams
DATA MINING
JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
36 J1536
Privacy Policy Inference of User-Uploaded Images on
Content Sharing Sites
DATA MINING
37 J1537 Progressive Duplicate Detection DATA MINING
38 J1538
Reverse Nearest Neighbors in Unsupervised Distance-
Based Outlier Detection
DATA MINING
39 J1539
Route-Saver: Leveraging Route APIs for Accurate and
Efficient Query Processing at Location-Based
Services
DATA MINING
40 J1540 Scalable Constrained Spectral Clustering DATA MINING
41 J1541
Towards Effective Bug Triage with Software Data
Reduction Techniques
DATA MINING
42 J1542
Tweet Segmentation and Its Application to Named
Entity Recognition
DATA MINING
43 J1543
Subgraph Matching with Set Similarity in a Large
Graph Database
DATA MINING
44 J1544
Structured Learning from Heterogeneous Behavior for
Social Identity Linkage
DATA MINING
45 J1545
Making Digital Artifacts on the Web Verifiable and
Reliable
DATA MINING
46 J1546 Anonymizing Collections of Tree-Structured Data DATA MINING
47 J1547 FOCS: Fast Overlapped Community Search DATA MINING
48 J1548
Sparsity Learning Formulations for Mining Time-
Varying Data
DATA MINING
49 J1549
K-Nearest Neighbor Classification over Semantically
Secure Encrypted Relational
DATA MINING
50 J1550
The Impact of View Histories on Edit
Recommendations
DATA MINING
51 J1551
Agent-based Interactions and Economic Encounters in
an Intelligent Inter Cloud
DATA MINING
52 J1552
A Distortion-Resistant Routing Framework for Video
Traffic in Wireless Multihop Networks
NETWORKING
53 J1553 Detecting Malicious Face book Applications NETWORKING
54 J1554
Maximizing P2P File Access Availability in Mobile
Ad Hoc Networks though Replication for Efficient
File Sharing
NETWORKING
JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
55 J1555
A Proximity-Aware Interest-Clustered P2P File
Sharing System
NETWORKING
56 J1556 FRAppE: Detecting Malicious Facebook Applications NETWORKING
57 J1557
Dynamic Routing for Data Integrity and Delay
Differentiated Services in Wireless Sensor Networks
MOBILE
COMPUTING
58 J1558
Friendbook: A Semantic-Based Friend
Recommendation System for Social Networks
MOBILE
COMPUTING
59 J1559
Privacy-Preserving and Truthful Detection of Packet
Dropping Attacks in Wireless Ad Hoc Networks
MOBILE
COMPUTING
60 J1560
Designing High Performance Web-Based Computing
Services to Promote Telemedicine Database
Management System
SERVICE
COMPUTING
(WEB SERVICE)
61 J1561
Maximizing Energy Efficiency in Multiple Access
Channels by Exploiting Packet Dropping and
Transmitter Buffering
MOBILE
COMPUTING
62 J1562
Tracking Temporal Community Strength in Dynamic
Networks
MOBILE
COMPUTING
63 J1563
Modeling and Analysis of Communication Traffic
Heterogeneity in Opportunistic Networks
MOBILE
COMPUTING
64 J1564
Towards Information Diffusion in Mobile Social
Networks
MOBILE
COMPUTING
65 J1565
Automatic Face Naming by Learning Discriminative
Affinity Matrices From Weakly Labeled Image
IMAGE
PROCESSING
66 J1566
A Computational Dynamic Trust Model for User
Authorization
SECURE
COMPUTING
67 J1567
A Lightweight Secure Scheme for Detecting
Provenance Forgery and Packet Drop Attacks in
Wireless Sensor Networks
SECURE
COMPUTING
68 J1568
Continuous and Transparent User Identity Verification
for Secure Internet Services
SECURE
COMPUTING
69 J1569
Contributory Broadcast Encryption with Efficient
Encryption and Short Cipher texts
SECURE
COMPUTING
70 J1570
DDSGA: A Data-Driven Semi-Global Alignment
Approach for Detecting Masquerade Attacks
SECURE
COMPUTING
JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
71 J1571
Improved Privacy-Preserving P2P Multimedia
Distribution Based on Recombined Fingerprints
SECURE
COMPUTING
72 J1572
Secure Data Aggregation Technique for Wireless
Sensor Networks in the Presence of Collusion Attacks
SECURE
COMPUTING
73 J1573
Secure Spatial Top-k Query Processing via Untrusted
Location- Based Service Providers
SECURE
COMPUTING
74 J1574
Smart Crawler: A Two-stage Crawler for Efficiently
Harvesting Deep-Web Interfaces
SECURE
COMPUTING
75 J1575
Collusion-Tolerable Privacy-Preserving Sum and
Product Calculation without Secure Channel
SECURE
COMPUTING
76 J1576
Learning to Rank Image Tags with Limited Training
Examples
IMAGE
PROCESSING
77 J1577
Group Key Agreement with Local Connectivity SECURE
COMPUTING
78 J1578
Data Lineage in Malicious Environments SECURE
COMPUTING
79 J1579
Geolocalized Modeling for Dish Recognition IMAGE
PROCESSING
80 J1580
Improving Privacy and Security in Decentralized
Ciphertext-Policy Attribute-Based Encryption
SECURE
COMPUTING
81 J1581
Semantic-Improved Color Imaging Applications: It
Is All About Context
IMAGE
PROCESSING
82 J1582 YouTube Video Promotion by Cross-network IMAGE
PROCESSING
83 J1583
Multi view Alignment Hashing for Efficient Image
Search
IMAGE
PROCESSING
84 J1584
Anonymity-based Privacy-preserving Data Reporting
for Participatory Sensing
SECURE
COMPUTING
85 J1585
Asymmetric Social Proximity Based Private Matching
Protocols for Online Social Networks
PARALLEL &
DISTRIBUTED
SYSTEMS
86 J1586
Cost-Effective Authentic and Anonymous Data
Sharing with Forward Security
PARALLEL &
DISTRIBUTED
SYSTEMS
87 J1587
Secure Distributed Deduplication Systems with
Improved Reliability
PARALLEL &
DISTRIBUTED
SYSTEMS
88 J1588
Learning to Rank Image Tags With Limited Training
Examples
IMAGE
PROCESSING
JAVA IEEE PROJECTS LIST
2015
2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005
89 J1589
EMR: A Scalable Graph-based Ranking Model for
Content-based Image Retrieval
IMAGE
PROCESSING
90 J1590
An Attribute-Assisted Reranking Model for Web
Image Search
IMAGE
PROCESSING
91 J1591
Software Puzzle: A Countermeasure to Resource-
Inflated Denial of- Service Attacks
INFORMATION
FORENSICS AND
SECURITY
92 J1592
Collusion-Tolerable Privacy-Preserving Sum and
Product Calculation without Secure Channel
PARALLEL &
DISTRIBUTED
SYSTEMS
93 J1593
Passive IP Trace back: Disclosing the Locations of IP
Spoofers from Path Backscatter
INFORMATION
FORENSICS AND
SECURITY
94 J1594
A Framework for Secure Computations with Two
Non-Colluding Servers and Multiple Clients, Applied
to Recommendations
INFORMATION
FORENSICS AND
SECURITY
95 J1595
Effective Key Management in Dynamic Wireless
Sensor Networks
INFORMATION
FORENSICS AND
SECURITY
96 J1596
Key Updating for Leakage Resiliency with
Application to AES Modes of Operation
INFORMATION
FORENSICS AND
SECURITY

More Related Content

What's hot

2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects listTmks Infotech
 
2016 java - projects list
2016  java -  projects list2016  java -  projects list
2016 java - projects listMSR PROJECTS
 
Main p roject list for csc it
Main p roject list for  csc itMain p roject list for  csc it
Main p roject list for csc itKhadarbaba Shaik
 
IEEE 2016-2017 SOFTWARE TITLE
IEEE 2016-2017  SOFTWARE TITLE IEEE 2016-2017  SOFTWARE TITLE
IEEE 2016-2017 SOFTWARE TITLE FOCUSLOGICPROJECTS
 
M.tech java 2014 15 list
M.tech java 2014 15 listM.tech java 2014 15 list
M.tech java 2014 15 listSAK Informatics
 
Tammina infotech ieee titles 2012 2013
Tammina infotech ieee titles 2012 2013Tammina infotech ieee titles 2012 2013
Tammina infotech ieee titles 2012 2013Rajendra Patnaik
 

What's hot (8)

Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
 
2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects list
 
2016 java - projects list
2016  java -  projects list2016  java -  projects list
2016 java - projects list
 
Main p roject list for csc it
Main p roject list for  csc itMain p roject list for  csc it
Main p roject list for csc it
 
IEEE 2016-2017 SOFTWARE TITLE
IEEE 2016-2017  SOFTWARE TITLE IEEE 2016-2017  SOFTWARE TITLE
IEEE 2016-2017 SOFTWARE TITLE
 
M.tech java 2014 15 list
M.tech java 2014 15 listM.tech java 2014 15 list
M.tech java 2014 15 list
 
Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16Hb services java ieee 2015 - 16
Hb services java ieee 2015 - 16
 
Tammina infotech ieee titles 2012 2013
Tammina infotech ieee titles 2012 2013Tammina infotech ieee titles 2012 2013
Tammina infotech ieee titles 2012 2013
 

Similar to Java ieee 2015

IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 Ganesh Ganesan
 
2016 java - projects list-9581464142
2016  java -  projects list-95814641422016  java -  projects list-9581464142
2016 java - projects list-9581464142MSR PROJECTS
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nelloreGreen Corner Tech,Nellore
 
Ms.net 2016- projects list
Ms.net   2016- projects listMs.net   2016- projects list
Ms.net 2016- projects listNEWZEN INFOTECH
 
Main p roject list for csc it
Main p roject list for  csc itMain p roject list for  csc it
Main p roject list for csc itKhadarbaba Shaik
 
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS InfotechTmks Infotech
 
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,BangaloreTmks Infotech
 
2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed Computing2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed ComputingTmks Infotech
 
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS InfotechTmks Infotech
 
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,BngaloreTmks Infotech
 
2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network Security2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network SecurityTmks Infotech
 
2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects listTmks Infotech
 
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,BangaloreTmks Infotech
 

Similar to Java ieee 2015 (20)

Java 2015
Java 2015Java 2015
Java 2015
 
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015 IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
IEEE JAVA DOTNET ANDROID PROJECT TITLES 2014 - 2015
 
2016 java - projects list-9581464142
2016  java -  projects list-95814641422016  java -  projects list-9581464142
2016 java - projects list-9581464142
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellore
 
Ms.net 2016- projects list
Ms.net   2016- projects listMs.net   2016- projects list
Ms.net 2016- projects list
 
Java titles 2017 2018
Java titles 2017 2018Java titles 2017 2018
Java titles 2017 2018
 
CSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.NelloreCSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.Nellore
 
2014 list
2014 list2014 list
2014 list
 
M.tech java list 2013
M.tech java list  2013M.tech java list  2013
M.tech java list 2013
 
Main p roject list for csc it
Main p roject list for  csc itMain p roject list for  csc it
Main p roject list for csc it
 
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
2015 and 2016 ieee for Wireless Sensor Networks @ TMKS Infotech
 
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Service Conputing @ TMKS Infotech,Bangalore
 
2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed Computing2015 and 2016 ieee projects for Parallel and Distributed Computing
2015 and 2016 ieee projects for Parallel and Distributed Computing
 
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
2015 and 2016 ieee projects for Data Mining @ TMKS Infotech
 
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
2015 and 2016 ieee projects for Image Processing @ TMKS Infotech,Bngalore
 
2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network Security2015 and 2016 ieee for Network Security
2015 and 2016 ieee for Network Security
 
2015 and 2016 ieee projects list
2015 and 2016 ieee projects list2015 and 2016 ieee projects list
2015 and 2016 ieee projects list
 
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore2015 and 2016 ieee projects  for Secure Computing @ TMKS Infotech,Bangalore
2015 and 2016 ieee projects for Secure Computing @ TMKS Infotech,Bangalore
 

Recently uploaded

70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectGayathriM270621
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptNoman khan
 

Recently uploaded (20)

70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
STATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subjectSTATE TRANSITION DIAGRAM in psoc subject
STATE TRANSITION DIAGRAM in psoc subject
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Forming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).pptForming section troubleshooting checklist for improving wire life (1).ppt
Forming section troubleshooting checklist for improving wire life (1).ppt
 

Java ieee 2015

  • 1. JAVA IEEE PROJECTS LIST 2015 2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001. Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082. www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005 S.NO PROJECT CODE PROJECT TITLE DOMAIN 1 J1501 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2 J1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing Cloud Computing 3 J1503 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems Cloud Computing 4 J1504 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data Cloud Computing 5 J1505 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing 6 J1506 An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration Cloud Computing 7 J1507 Audit-Free Cloud Storage via Deniable Attribute- based Encryption Cloud Computing 8 J1508 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing Cloud Computing 9 J1509 Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services Cloud Computing 10 J1510 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption Cloud Computing 11 J1511 Enabling Cloud Storage Auditing With Key-Exposure Resistance Cloud Computing 12 J1512 Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data Cloud Computing 13 J1513 Identity-Based Encryption with Outsourced Revocation in Cloud Computing Cloud Computing 14 J1514 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage Cloud Computing 15 J1515 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing Cloud Computing 16 J1516 Privacy-Preserving Public Auditing for Regenerating- Code-Based Cloud Storage Cloud Computing
  • 2. JAVA IEEE PROJECTS LIST 2015 2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001. Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082. www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005 17 J1517 Provable Multi copy Dynamic Data Possession in Cloud Computing Systems Cloud Computing 18 J1518 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Cloud Computing 19 J1519 Secure Auditing and Deduplicating Data in Cloud Cloud Computing 20 J1520 Stealthy Denial of Service Strategy in Cloud Computing Cloud Computing 21 J1521 Mobi Context: A Context-aware Cloud-Based Venue Recommendation Framework Cloud Computing 22 J1522 SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks Cloud Computing 23 J1523 A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E- Services FUZZY SYSTEMS 24 J1524 Understanding the Performance and Potential of Cloud Computing for Scientific Applications Cloud Computing 25 J1525 Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform Cloud Computing 26 J1526 Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds Cloud Computing 27 J1527 Reactive Resource Provisioning Heuristics for Dynamic Data flows on Cloud Infrastructure Cloud Computing 28 J1528 Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation SERVICE COMPUTING (WEB SERVICE) 29 J1529 OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices Cloud Computing 30 J1530 Best Keyword Cover Search DATA MINING 31 J1531 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model DATA MINING 32 J1532 Context-Based Diversification for Keyword Queries over XML Data DATA MINING 33 J1533 Discovery of Ranking Fraud for Mobile Apps DATA MINING 34 J1534 Malware Propagation in Large-Scale Networks DATA MINING 35 J1535 On Summarization and Timeline Generation for Evolutionary Tweet Streams DATA MINING
  • 3. JAVA IEEE PROJECTS LIST 2015 2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001. Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082. www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005 36 J1536 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites DATA MINING 37 J1537 Progressive Duplicate Detection DATA MINING 38 J1538 Reverse Nearest Neighbors in Unsupervised Distance- Based Outlier Detection DATA MINING 39 J1539 Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services DATA MINING 40 J1540 Scalable Constrained Spectral Clustering DATA MINING 41 J1541 Towards Effective Bug Triage with Software Data Reduction Techniques DATA MINING 42 J1542 Tweet Segmentation and Its Application to Named Entity Recognition DATA MINING 43 J1543 Subgraph Matching with Set Similarity in a Large Graph Database DATA MINING 44 J1544 Structured Learning from Heterogeneous Behavior for Social Identity Linkage DATA MINING 45 J1545 Making Digital Artifacts on the Web Verifiable and Reliable DATA MINING 46 J1546 Anonymizing Collections of Tree-Structured Data DATA MINING 47 J1547 FOCS: Fast Overlapped Community Search DATA MINING 48 J1548 Sparsity Learning Formulations for Mining Time- Varying Data DATA MINING 49 J1549 K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational DATA MINING 50 J1550 The Impact of View Histories on Edit Recommendations DATA MINING 51 J1551 Agent-based Interactions and Economic Encounters in an Intelligent Inter Cloud DATA MINING 52 J1552 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks NETWORKING 53 J1553 Detecting Malicious Face book Applications NETWORKING 54 J1554 Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing NETWORKING
  • 4. JAVA IEEE PROJECTS LIST 2015 2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001. Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082. www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005 55 J1555 A Proximity-Aware Interest-Clustered P2P File Sharing System NETWORKING 56 J1556 FRAppE: Detecting Malicious Facebook Applications NETWORKING 57 J1557 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks MOBILE COMPUTING 58 J1558 Friendbook: A Semantic-Based Friend Recommendation System for Social Networks MOBILE COMPUTING 59 J1559 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks MOBILE COMPUTING 60 J1560 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System SERVICE COMPUTING (WEB SERVICE) 61 J1561 Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering MOBILE COMPUTING 62 J1562 Tracking Temporal Community Strength in Dynamic Networks MOBILE COMPUTING 63 J1563 Modeling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks MOBILE COMPUTING 64 J1564 Towards Information Diffusion in Mobile Social Networks MOBILE COMPUTING 65 J1565 Automatic Face Naming by Learning Discriminative Affinity Matrices From Weakly Labeled Image IMAGE PROCESSING 66 J1566 A Computational Dynamic Trust Model for User Authorization SECURE COMPUTING 67 J1567 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks SECURE COMPUTING 68 J1568 Continuous and Transparent User Identity Verification for Secure Internet Services SECURE COMPUTING 69 J1569 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts SECURE COMPUTING 70 J1570 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks SECURE COMPUTING
  • 5. JAVA IEEE PROJECTS LIST 2015 2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001. Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082. www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005 71 J1571 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints SECURE COMPUTING 72 J1572 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks SECURE COMPUTING 73 J1573 Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers SECURE COMPUTING 74 J1574 Smart Crawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces SECURE COMPUTING 75 J1575 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel SECURE COMPUTING 76 J1576 Learning to Rank Image Tags with Limited Training Examples IMAGE PROCESSING 77 J1577 Group Key Agreement with Local Connectivity SECURE COMPUTING 78 J1578 Data Lineage in Malicious Environments SECURE COMPUTING 79 J1579 Geolocalized Modeling for Dish Recognition IMAGE PROCESSING 80 J1580 Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption SECURE COMPUTING 81 J1581 Semantic-Improved Color Imaging Applications: It Is All About Context IMAGE PROCESSING 82 J1582 YouTube Video Promotion by Cross-network IMAGE PROCESSING 83 J1583 Multi view Alignment Hashing for Efficient Image Search IMAGE PROCESSING 84 J1584 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing SECURE COMPUTING 85 J1585 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks PARALLEL & DISTRIBUTED SYSTEMS 86 J1586 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security PARALLEL & DISTRIBUTED SYSTEMS 87 J1587 Secure Distributed Deduplication Systems with Improved Reliability PARALLEL & DISTRIBUTED SYSTEMS 88 J1588 Learning to Rank Image Tags With Limited Training Examples IMAGE PROCESSING
  • 6. JAVA IEEE PROJECTS LIST 2015 2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001. Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082. www.newzeninfotech.com , Ring on: +91 9030800005, +91 9052800005 89 J1589 EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval IMAGE PROCESSING 90 J1590 An Attribute-Assisted Reranking Model for Web Image Search IMAGE PROCESSING 91 J1591 Software Puzzle: A Countermeasure to Resource- Inflated Denial of- Service Attacks INFORMATION FORENSICS AND SECURITY 92 J1592 Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel PARALLEL & DISTRIBUTED SYSTEMS 93 J1593 Passive IP Trace back: Disclosing the Locations of IP Spoofers from Path Backscatter INFORMATION FORENSICS AND SECURITY 94 J1594 A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations INFORMATION FORENSICS AND SECURITY 95 J1595 Effective Key Management in Dynamic Wireless Sensor Networks INFORMATION FORENSICS AND SECURITY 96 J1596 Key Updating for Leakage Resiliency with Application to AES Modes of Operation INFORMATION FORENSICS AND SECURITY