SlideShare a Scribd company logo
1 of 10
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
2020-21 JAVA IEEE PROJECTS LIST
S.NO PROJECT TITLE DOMAIN
1 A Verifiable Semantic Searching Scheme by
Optimal Matching over Encrypted Data in Public
Cloud
CLOUD COMPUTING
2 Achieving Practical Symmetric Searchable
Encryption with SearchPatternPrivacy over Cloud
CLOUD COMPUTING
3 Achieving Searchable Encryption Scheme with
Search Pattern Hidden
CLOUD COMPUTING
4 Authentication and Key Agreement Based on
Anonymous Identity for Peer-to-Peer Cloud
CLOUD COMPUTING
5 CloudRaid Detecting Distributed Concurrency
Bugs via Log-Mining and Enhancement
CLOUD COMPUTING
6 Designing Secure and Efficient Biometric-Based
Secure Access Mechanism for Cloud Services
CLOUD COMPUTING
7 Lightweight Privacy-preserving Medical Diagnosis
in Edge Computing
CLOUD COMPUTING
8 Personality and Value-aware Scheduling of User
Requests in Cloud for Profit Maximization
CLOUD COMPUTING
9 Privacy-preserving Efficient Verifiable DeepPacket
Inspection for Cloud-assisted Middlebox
CLOUD COMPUTING
10 Privacy-preserving Medical Treatment System
through Nondeterministic Finite Automata
CLOUD COMPUTING
11 Privacy-Preserving Outsourced Inner Product
Computation on Encrypted Database
CLOUD COMPUTING
12 Proactive Fault-Tolerance Technique to Enhance
Reliability of Cloud Service in Cloud Federation
Environment
CLOUD COMPUTING
13 Publicly Verifiable Shared Dynamic Electronic
Health Record Databases
CLOUD COMPUTING
14 Revocable Attribute-based Data Storage in Mobile
Clouds
CLOUD COMPUTING
15 Secure Keyword Search and Data Sharing
Mechanism for Cloud Computing
CLOUD COMPUTING
16 Secure Similarity Search over Encrypted Non-
Uniform Datasets
CLOUD COMPUTING
17 Secure Storage Auditing with Efficient Key Updates CLOUD COMPUTING
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
for Cognitive Industrial IoT Environment
18 Semantics of Data Mining Services in Cloud
Computing
CLOUD COMPUTING
19 Similarity Search for Encrypted Images in Secure
Cloud Computing
CLOUD COMPUTING
20 Tag-based Verifiable Delegated Set Intersection
over Outsourced Private Datasets
CLOUD COMPUTING
21 Threshold Multi-keyword Search for Cloud-Based
Group Data Sharing
CLOUD COMPUTING
22 Towards Secure and Efficient Equality Conjunction
Search over Outsourced Databases
CLOUD COMPUTING
23 Verifiable Searchable Encryption Framework
against Insider Keyword-Guessing Attack in Cloud
Storage
CLOUD COMPUTING
24 A Secure Enhanced Key-Policy Attribute-Based
Temporary Keyword Search Scheme in the Cloud
CLOUD COMPUTING
25 Development and Examination of Fog Computing-
Based Encrypted Control System.
CLOUD COMPUTING
26 A Novel Feature Matching Ranked Search
Mechanism Over Encrypted Cloud Data
CLOUD COMPUTING
27 A Secure and Efficient Cloud-Centric Internet of
Medical Things-Enabled Smart Healthcare System
with Public Verifiability
CLOUD COMPUTING
28 Scalable and Secure Big Data IoT System Based on
Multifactor Authentication and Lightweight
Cryptography
CLOUD COMPUTING
29 Key Policy Attribute-Based Encryption with
Keyword Search in Virtualized Environments
CLOUD COMPUTING
30 Identity-Based Encryption Transformation for
Flexible Sharing of Encrypted Data in Public
Cloud.
CLOUD COMPUTING
31 Secure Data Transfer and Deletion from Counting
Bloom Filter in Cloud Computing.
CLOUD COMPUTING
32 Key-Escrow Free Attribute-Based Multi-Keyword
Search with Dynamic Policy Update in Cloud
Computing
CLOUD COMPUTING
33 Fast Secure and Anonymous Key Agreement
Against Bad Randomness for Cloud Computing
CLOUD COMPUTING
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
34 Achieving Practical Symmetric Searchable
Encryption with SearchPatternPrivacy over Cloud
CLOUD COMPUTING
35 Achieving Secure and Dynamic Range Queries
Over Encrypted Cloud Data
CLOUD COMPUTING
36 ECOGreenElectricityCost Optimization for Green
Datacenters in Emerging Power Markets
SERVICE
COMPUTING
37 Efficient Encrypted Data Search with Expressive
Queries and Flexible Update
SERVICE
COMPUTING
38 Energy-aware cloud workflow applications
scheduling with geo-distributed data
SERVICE
COMPUTING
39 KeySea Keyword-based Search with Receiver
Anonymity in Attribute-based Searchable
Encryption
SERVICE
COMPUTING
40 Lightweight Privacy-preserving Raw Data
Publishing Scheme
SERVICE
COMPUTING
41 Location-Aware Service Recommendations With
Privacy-Preservation in the Internet of Things
SERVICE
COMPUTING
42 Lucid A Practical, Lightweight Deep Learning
Solution for DDoS Attack Detection
SERVICE
COMPUTING
43 Minimizing FinancialCostof DDoS Attack Defense
in Clouds with Fine-Grained Resource
Management
SERVICE
COMPUTING
44 Personalized Recommendation System based on
Collaborative Filtering for IoT Scenarios
SERVICE
COMPUTING
45 Privacy Preserving QoS Forecasting in Mobile Edge
Environments
SERVICE
COMPUTING
46 Provably Efficient Resource Allocation for Edge
Service Entities Using Hermes
SERVICE
COMPUTING
47 Reverse Nearest Neighbor Search in Semantic
Trajectories for Location based Services
SERVICE
COMPUTING
48 Revocable Attribute-based Data Storage in Mobile
Clouds
SERVICE
COMPUTING
49 Semantics of Data Mining Services in Cloud
Computing
SERVICE
COMPUTING
50 Shed+ Optimal Dynamic Speculation to Meet
Application Deadlines in Cloud
SERVICE
COMPUTING
51 Scalable and efficient authentication scheme for
secure smart grid communication
SERVICE
COMPUTING
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
52 Sparse Mobile Crowdsensing With Differential and
Distortion Location Privacy
INFORMATION
FORENSICS AND
SECURITY
53 A Verifiable Semantic Searching Scheme by
Optimal Matching over Encrypted Data in Public
Cloud
INFORMATION
FORENSICS AND
SECURITY
54 Pay as You Decrypt Decryption Outsourcing for
Functional Encryption Using Blockchain
INFORMATION
FORENSICS AND
SECURITY
55 Securing Resourcesin Decentralized Cloud Storage INFORMATION
FORENSICS AND
SECURITY
56 Fake News, Disinformation,and Deepfakes:
Leveraging Distributed Ledger Technologies and
Blockchain to Combat Digital Deception and
Counterfeit Reality
INFORMATION
FORENSICS AND
SECURITY
57 Activity Minimization of Misinformation Influence
in Online Social Networks
COMPUTATIONAL
SOCIAL SYSTEMS
58 An Efficient Feedback Control Mechanism for
Positive or Negative Information Spread in Online
Social Networks
COMPUTATIONAL
SOCIAL SYSTEMS
59 ArvaNet Deep Recurrent Architecture for PPG-
Based Negative Mental-State Monitoring
COMPUTATIONAL
SOCIAL SYSTEMS
60 Characterizing the Propagation of Situational
Information in Social Media During COVID-19
Epidemic A Case Study on Weibo
COMPUTATIONAL
SOCIAL SYSTEMS
61 Continuous Activity Maximization in Online Social
Networks
COMPUTATIONAL
SOCIAL SYSTEMS
62 Detecting and Characterizing Extremist Reviewer
Groups in Online Product Reviews
COMPUTATIONAL
SOCIAL SYSTEMS
63 Detection of Malicious Social Bots Using Learning
Automata With URL Features in Twitter Network
COMPUTATIONAL
SOCIAL SYSTEMS
64 Information Dissemination From Social Network
for Extreme Weather Scenario
COMPUTATIONAL
SOCIAL SYSTEMS
65 Location-Aware Service Recommendations With
Privacy-Preservation in the Internet of Things
COMPUTATIONAL
SOCIAL SYSTEMS
66 Movie Recommendation System Using Sentiment
Analysis From Micro blogging Data
COMPUTATIONAL
SOCIAL SYSTEMS
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
67 On Utilizing Communities Detected From Social
Networks in Hashtag Recommendation
COMPUTATIONAL
SOCIAL SYSTEMS
68 Understanding the User Behavior of Foursquare A
Data-Driven Study on a Global Scale
COMPUTATIONAL
SOCIAL SYSTEMS
69 User Behavior Prediction of Social Hotspots Based
on Multi message Interaction and Neural Network
COMPUTATIONAL
SOCIAL SYSTEMS
70 Popular Matching for Security-Enhanced Resource
Allocation in Social Internet of Flying Things
COMPUTATIONAL
SOCIAL SYSTEMS
71 SciChallenge A Social Media Aware Platform for
Contest-Based STEM Education and Motivation of
Young Students
COMPUTATIONAL
SOCIAL SYSTEMS
72 A Hidden Markov Contour Tree Model for Spatial
Structured Prediction
DATA MINING
73 Adaptive Diffusion of Sensitive Information In
Online Social Networks
DATA MINING
74 Adaptive Similarity Embedding For Unsupervised
Multi-View Feature Selection
DATA MINING
75 Adaptively Secure and Fast Processing of
Conjunctive Queries over Encrypted Data
DATA MINING
76 BATCH A Scalable Asymmetric Discrete Cross-
Modal Hashing
DATA MINING
77 CashlessSociety Managing Privacy and Security in
the Technological Age
DATA MINING
78 DGDFS Dependence Guided Discriminative
Feature Selection for Predicting Adverse Drug-
Drug Interaction
DATA MINING
79 Discovering TemporalPatterns for Event Sequence
Clustering via Policy Mixture Model
DATA MINING
80 Effective Keyword Search over Weighted Graphs DATA MINING
81 Efficient Match-Based Candidate Network
Generation for Keyword Queries over Relational
Databases
DATA MINING
82 Efficient Processing of Group Planning Queries
Over Spatial-Social Networks
DATA MINING
83 Efficiently Processing Spatialand Keyword Queries
in Indoor Venues
DATA MINING
84 Evaluating Public Anxiety for Topic-based
Communities in Social Networks
DATA MINING
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
85 Fast Multi-view Semi-supervised Learning with
Learned Graph
DATA MINING
86 Fuzzy K-Means Clustering With Discriminative
Embedding
DATA MINING
87 Guarantee the Quality-of-Service of Control
Transactions in Real-Time Database Systems
DATA MINING
88 Hierarchical Prediction and Adversarial Learning
For Conditional Response Generation
DATA MINING
89 Land Use Classification with Point of Interests and
Structural Patterns
DATA MINING
90 Modeling Relation Paths for Knowledge Graph
Completion
DATA MINING
91 Multi-view Clustering with the Cooperation of
Visible and Hidden Views
DATA MINING
92 Online Pricing with Reserve Price Constraint for
Personal Data Markets
DATA MINING
93 Personalized Long and Short term Preference
Learning for Next POI Recommendation
DATA MINING
94 Predicting Hot Events in the Early Period through
Bayesian Model for Social Networks
DATA MINING
95 Predicting Student Performance in an Educational
Game Using a Hidden Markov Model
DATA MINING
96 Privacy Preserving Location Data Publishing A
Machine Learning Approach
DATA MINING
97 Product Quantized Collaborative Filtering DATA MINING
98 Publicly Verifiable Databases with All Efficient
Updating Operations
DATA MINING
99 Scalable and Adaptive Data Replica Placement for
Geo-Distributed Cloud Storages
DATA MINING
100 Social Boosted Recommendation with Folded
Bipartite Network Embedding
DATA MINING
101 Emotion Correlation Mining Through Deep
Learning Models on Natural Language Text
DATA MINING
102 AdSherlock Efficient and Deployable Click Fraud
Detection for Mobile Applications
MOBILE COMPUTING
103 Distributed Time-Sensitive Task Selectionin Mobile
Crowdsensing
MOBILE COMPUTING
104 Eclipse Preserving Differential Location Privacy MOBILE COMPUTING
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Against Long-Term Observation Attacks
105 Exploiting Multi-Dimensional Task Diversity in
Distributed Auctions for Mobile Crowd Sensing
MOBILE COMPUTING
106 Fine Grained User Profiling for Personalized Task
Matching in Mobile Crowd Sensing
MOBILE COMPUTING
107 KOLLECTOR Detecting Fraudulent Activities on
Mobile Devices Using Deep Learning
MOBILE COMPUTING
108 PACE Privacy-Preserving and Quality-Aware
Incentive Mechanism for Mobile Crowd Sensing
MOBILE COMPUTING
109 Predictability and Prediction of Human Mobility
Based on Application-collected Location Data
MOBILE COMPUTING
110 Privacy-Preserving Media Sharing with Scalable
Access Controland Secure De duplication in Mobile
Cloud Computing
MOBILE COMPUTING
111 Protecting Your Shopping Preference with
Differential Privacy
MOBILE COMPUTING
112 Proximity-Aware Location Based Collaborative
Sensing for Energy-Efficient Mobile Devices
MOBILE COMPUTING
113 SocialRecruiter Dynamic Incentive Mechanism for
Mobile Crowd Sourcing Worker Recruitment with
Social Networks
MOBILE COMPUTING
114 Towards Fine-Grained Access Control in
Enterprise-Scale Internet-of-Things
MOBILE COMPUTING
115 Towards Personalized Privacy-Preserving Incentive
for Truth Discovery in Mobile Crowd Sensing
Systems
MOBILE COMPUTING
116 Shielding Collaborative Learning Mitigating
Poisoning Attacks through Client Side Detection
DEPENDABLE
AND SECURE
COMPUTING
117 Scaling Camouflage Content Disguising Attack
Against Computer Vision Applications
DEPENDABLE
AND SECURE
COMPUTING
118 Representing Fine-Grained Co-Occurrences for
Behavior-BasedFraud Detectionin Online Payment
Services
DEPENDABLE
AND SECURE
COMPUTING
119 Privacy-Preserving Federated Deep Learning with
Irregular Users
DEPENDABLE
AND SECURE
COMPUTING
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
120 Optimal Filter Assignment Policy Against
Distributed Denial-of-Service Attack
DEPENDABLE
AND SECURE
COMPUTING
121 On-the-fly Privacy for Location Histograms DEPENDABLE
AND SECURE
COMPUTING
122 Multi-client Sub-Linear Boolean Keyword
Searching for Encrypted Cloud Storage with
Owner-enforced Authorization
DEPENDABLE
AND SECURE
COMPUTING
123 Match in My Way Fine-Grained Bilateral Access
Control for Secure Cloud-Fog Computing
DEPENDABLE
AND SECURE
COMPUTING
124 Geometric range search on encrypted data with
Forward or Backward security
DEPENDABLE
AND SECURE
COMPUTING
125 Efficient Server-Aided Secure Two-Party
Computation in Heterogeneous Mobile Cloud
Computing
DEPENDABLE
AND SECURE
COMPUTING
126 Efficient and Secure Attribute-based Access
Control with Identical Sub-Policies Frequently
Used in Cloud Storage1
DEPENDABLE
AND SECURE
COMPUTING
127 Detectionand Defense of Cache Pollution Based on
Popularity Prediction in Named Data Networking
DEPENDABLE
AND SECURE
COMPUTING
128 Adaptive Secure Nearest Neighbor Query
Processing over Encrypted Data
DEPENDABLE
AND SECURE
COMPUTING
129 Achieving Efficient Secure Deduplication with
User-Defined Access Control in Cloud
DEPENDABLE
AND SECURE
COMPUTING
130 Achieving Efficient and Privacy-Preserving Exact
Set Similarity Search over Encrypted Data
DEPENDABLE
AND SECURE
COMPUTING
131 A Traceable and Revocable Ciphertext-policy
Attribute-based Encryption Scheme Based on
Privacy Protection
DEPENDABLE
AND SECURE
COMPUTING
132 An Efficient Privacy Preserving Message
Authentication Scheme for Internet-of-Things
INDUSTRIAL
INFORMATICS
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
133 Detection and Mitigation of Cyber Attacks on
Voltage Stability Monitoring of Smart Grids
INDUSTRIAL
INFORMATICS
134 Enabling Privacy-assured Fog-based Data
Aggregation in E-healthcare Systems
INDUSTRIAL
INFORMATICS
135 Hidden Electricity Theft by Exploiting Multiple-
Pricing Scheme in Smart Grids
INDUSTRIAL
INFORMATICS
136 Social Image Sentiment Analysis by Exploiting
Multimodal Content and Heterogeneous Relations
INDUSTRIAL
INFORMATICS
137 FarSight Long-Term Disease Prediction Using
Unstructured Clinical Nursing Notes
EMERGING
TOPICS IN
COMPUTING
138 Human-in-the-Loop-Aided Privacy-Preserving
Scheme for Smart Healthcare
EMERGING
TOPICS IN
COMPUTING
139 Recommending Activities for Mental Health and
Well-being Insights from Two User Studies
EMERGING
TOPICS IN
COMPUTING
140 Semantic Access Control for Privacy Management
of Personal Sensing in Smart Cities
EMERGING
TOPICS IN
COMPUTING
141 Credit Card Transactions Data Adversarial
Augmentation in the Frequency Domain
BIG DATA
142 Building and Querying an Enterprise Knowledge
Graph
BIG DATA
143 Delegated Authorization Framework for EHR
Services using Attribute Based Encryption
BIG DATA
144 Secure Channel Free Certificate-Based Searchable
Encryption Withstanding Outside and Inside
Keyword Guessing Attacks
BIG DATA
145 A Trustworthy Privacy Preserving Framework for
Machine Learning in Industrial IoT Systems
INTERNET OF
THINGS (IOT)
146 An Efficient IoT-Based Platform for Remote Real-
Time Cardiac Activity Monitoring
INTERNET OF
THINGS (IOT)
147 An Efficient Privacy Preserving Message
Authentication Scheme for Internet-of-Things
INTERNET OF
THINGS (IOT)
148 An Efficient Spam Detection Technique for IoT
Devices using Machine Learning
INTERNET OF
THINGS (IOT)
149 Efficient IoT Management with Resilience to INTERNET OF
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Unauthorized Access to Cloud Storage THINGS (IOT)
150 Efficient Privacy Preserving Data Collection and
Computation Offloading for Fog-Assisted IoT
INTERNET OF
THINGS (IOT)
151 Secure Storage Auditing with Efficient Key Updates
for Cognitive Industrial IoT Environment
INTERNET OF
THINGS (IOT)
152 Benchmarking Image Retrieval Diversification
Techniques for Social Media
IMAGE
PROCESSING AND
MULTIMEDIA
153 Online Hashing with Bit Selection for Image
Retrieval
IMAGE
PROCESSING AND
MULTIMEDIA
154 Trust-Based Video Management Framework for
Social Multimedia Networks
IMAGE
PROCESSING AND
MULTIMEDIA
155 An Integrated Indexing and Search Service for
Distributed File Systems
PARALLEL AND
DISTRIBUTED
SYSTEMS
156 ESetStore An Erasure-Coded Storage System With
Fast Data Recovery
PARALLEL AND
DISTRIBUTED
SYSTEMS
157 Scalable and Adaptive Data Replica Placement for
Geo-Distributed Cloud Storages
PARALLEL AND
DISTRIBUTED
SYSTEMS
158 A Secure and Verifiable Data Sharing Scheme
Based on Blockchain in Vehicular Social Networks
VEHICULAR
TECHNOLOGY
159 Collaborative Content Delivery in Software-Defined
Heterogeneous Vehicular Networks
VEHICULAR
TECHNOLOGY
160 Dynamic Network Slicing and Resource Allocation
in Mobile Edge Computing Systems
VEHICULAR
TECHNOLOGY
161 Security Enhanced Content Sharing in Social IoT A
Directed Hypergraph-Based Learning Scheme
VEHICULAR
TECHNOLOGY

More Related Content

What's hot

IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALURIEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALURkrish madhi
Β 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final listManju Nath
Β 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project listMSR PROJECTS
Β 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14MSR PROJECTS
Β 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects listVenkat Projects
Β 
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIESDOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIESSHPINE TECHNOLOGIES
Β 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014Aishwarya Rajesh
Β 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project listVision Solutions
Β 

What's hot (11)

IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALURIEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
IEEE PROJECTS TRICHY-THANJAVUR-KARUR-PERAMBALUR
Β 
2014 and 2015 ieee final list
2014 and 2015 ieee  final list2014 and 2015 ieee  final list
2014 and 2015 ieee final list
Β 
Java 2015 project list
Java 2015 project listJava 2015 project list
Java 2015 project list
Β 
Java projects 2013 14
Java projects 2013 14Java projects 2013 14
Java projects 2013 14
Β 
Java ieee 2020 21 projects list
Java ieee 2020 21 projects listJava ieee 2020 21 projects list
Java ieee 2020 21 projects list
Β 
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIESDOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
DOTNET TITLES 2014 FROM SHPINE TECHNOLOGIES
Β 
2014 java ieee
2014 java ieee2014 java ieee
2014 java ieee
Β 
Ieee 2015 2016
Ieee 2015 2016Ieee 2015 2016
Ieee 2015 2016
Β 
best project centre in chennai titles 2014
best project centre in chennai titles 2014best project centre in chennai titles 2014
best project centre in chennai titles 2014
Β 
Ieee cse software 2018 project list
Ieee cse software 2018 project listIeee cse software 2018 project list
Ieee cse software 2018 project list
Β 
JAVA TITLES 2014
JAVA TITLES 2014JAVA TITLES 2014
JAVA TITLES 2014
Β 

Similar to Java ieee 2020 21 projects list

cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nelloreGreen Corner Tech,Nellore
Β 
CSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.NelloreCSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.NelloreGreen Corner Tech,Nellore
Β 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Nexgen Technology
Β 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieeextreamtechnologies
Β 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14projectsepark
Β 
JAVA PROJECTS TITLES 2022-23.pdf
JAVA PROJECTS  TITLES 2022-23.pdfJAVA PROJECTS  TITLES 2022-23.pdf
JAVA PROJECTS TITLES 2022-23.pdfGREEN CORNER TECH
Β 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015kishu0005
Β 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list Mumbai Academisc
Β 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list Mumbai Academisc
Β 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project listVision Solutions
Β 
2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projectsmanjunath205
Β 
2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projectsmanjunath205
Β 
2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computingmanjunath205
Β 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennaiAishwarya Rajesh
Β 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennaiAishwarya Rajesh
Β 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennaiAishwarya Rajesh
Β 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennaiAishwarya Rajesh
Β 

Similar to Java ieee 2020 21 projects list (20)

Java titles 2017 2018
Java titles 2017 2018Java titles 2017 2018
Java titles 2017 2018
Β 
cse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellorecse projects,Dot net ieee projects 2015,green corner tech,nellore
cse projects,Dot net ieee projects 2015,green corner tech,nellore
Β 
CSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.NelloreCSE Dot net ieee projects 2015.Nellore
CSE Dot net ieee projects 2015.Nellore
Β 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Β 
Dotnet application-non-ieee
Dotnet application-non-ieeeDotnet application-non-ieee
Dotnet application-non-ieee
Β 
Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14Final year IEEE projects for 2013-14
Final year IEEE projects for 2013-14
Β 
Java 2015
Java 2015Java 2015
Java 2015
Β 
JAVA PROJECTS TITLES 2022-23.pdf
JAVA PROJECTS  TITLES 2022-23.pdfJAVA PROJECTS  TITLES 2022-23.pdf
JAVA PROJECTS TITLES 2022-23.pdf
Β 
JAVA IEEE -2015
JAVA IEEE -2015JAVA IEEE -2015
JAVA IEEE -2015
Β 
Java ieee 2015
Java ieee  2015Java ieee  2015
Java ieee 2015
Β 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
Β 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
Β 
ieee 2016 Java project list
ieee 2016 Java project listieee 2016 Java project list
ieee 2016 Java project list
Β 
2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects2020 and 2021 Cloud Computing Projects
2020 and 2021 Cloud Computing Projects
Β 
2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects2020 and 2021 Data Mining Projects
2020 and 2021 Data Mining Projects
Β 
2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing2020 and 2021 java Cloud computing
2020 and 2021 java Cloud computing
Β 
final year ieee project centre in chennai
final year ieee project centre in chennaifinal year ieee project centre in chennai
final year ieee project centre in chennai
Β 
dotnet project centre in chennai
dotnet project centre in chennaidotnet project centre in chennai
dotnet project centre in chennai
Β 
ieee project centre in chennai
ieee project centre in chennaiieee project centre in chennai
ieee project centre in chennai
Β 
be project centre in chennai
be project centre in chennaibe project centre in chennai
be project centre in chennai
Β 

More from Venkat Projects

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docxVenkat Projects
Β 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...Venkat Projects
Β 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docxVenkat Projects
Β 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docxVenkat Projects
Β 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...Venkat Projects
Β 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxVenkat Projects
Β 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...Venkat Projects
Β 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGESVenkat Projects
Β 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...Venkat Projects
Β 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Venkat Projects
Β 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...Venkat Projects
Β 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docxVenkat Projects
Β 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docxVenkat Projects
Β 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docxVenkat Projects
Β 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docxVenkat Projects
Β 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects listVenkat Projects
Β 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
Β 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...Venkat Projects
Β 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning techniqueVenkat Projects
Β 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal clusterVenkat Projects
Β 

More from Venkat Projects (20)

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Β 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
Β 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
Β 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
Β 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
Β 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Β 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
Β 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGES
Β 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
Β 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Β 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
Β 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
Β 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
Β 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
Β 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
Β 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
Β 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
Β 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
Β 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
Β 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
Β 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ9953056974 Low Rate Call Girls In Saket, Delhi NCR
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
Β 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
Β 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Β 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
Β 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
Β 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
Β 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
Β 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Β 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Β 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Β 
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Β 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Β 
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈcall girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
call girls in Kamla Market (DELHI) πŸ” >ΰΌ’9953330565πŸ” genuine Escort Service πŸ”βœ”οΈβœ”οΈ
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Β 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Β 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Β 
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Β 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
Β 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
Β 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Β 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
Β 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
Β 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
Β 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Β 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Β 

Java ieee 2020 21 projects list

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 2020-21 JAVA IEEE PROJECTS LIST S.NO PROJECT TITLE DOMAIN 1 A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud CLOUD COMPUTING 2 Achieving Practical Symmetric Searchable Encryption with SearchPatternPrivacy over Cloud CLOUD COMPUTING 3 Achieving Searchable Encryption Scheme with Search Pattern Hidden CLOUD COMPUTING 4 Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud CLOUD COMPUTING 5 CloudRaid Detecting Distributed Concurrency Bugs via Log-Mining and Enhancement CLOUD COMPUTING 6 Designing Secure and Efficient Biometric-Based Secure Access Mechanism for Cloud Services CLOUD COMPUTING 7 Lightweight Privacy-preserving Medical Diagnosis in Edge Computing CLOUD COMPUTING 8 Personality and Value-aware Scheduling of User Requests in Cloud for Profit Maximization CLOUD COMPUTING 9 Privacy-preserving Efficient Verifiable DeepPacket Inspection for Cloud-assisted Middlebox CLOUD COMPUTING 10 Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata CLOUD COMPUTING 11 Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database CLOUD COMPUTING 12 Proactive Fault-Tolerance Technique to Enhance Reliability of Cloud Service in Cloud Federation Environment CLOUD COMPUTING 13 Publicly Verifiable Shared Dynamic Electronic Health Record Databases CLOUD COMPUTING 14 Revocable Attribute-based Data Storage in Mobile Clouds CLOUD COMPUTING 15 Secure Keyword Search and Data Sharing Mechanism for Cloud Computing CLOUD COMPUTING 16 Secure Similarity Search over Encrypted Non- Uniform Datasets CLOUD COMPUTING 17 Secure Storage Auditing with Efficient Key Updates CLOUD COMPUTING
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com for Cognitive Industrial IoT Environment 18 Semantics of Data Mining Services in Cloud Computing CLOUD COMPUTING 19 Similarity Search for Encrypted Images in Secure Cloud Computing CLOUD COMPUTING 20 Tag-based Verifiable Delegated Set Intersection over Outsourced Private Datasets CLOUD COMPUTING 21 Threshold Multi-keyword Search for Cloud-Based Group Data Sharing CLOUD COMPUTING 22 Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases CLOUD COMPUTING 23 Verifiable Searchable Encryption Framework against Insider Keyword-Guessing Attack in Cloud Storage CLOUD COMPUTING 24 A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud CLOUD COMPUTING 25 Development and Examination of Fog Computing- Based Encrypted Control System. CLOUD COMPUTING 26 A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data CLOUD COMPUTING 27 A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart Healthcare System with Public Verifiability CLOUD COMPUTING 28 Scalable and Secure Big Data IoT System Based on Multifactor Authentication and Lightweight Cryptography CLOUD COMPUTING 29 Key Policy Attribute-Based Encryption with Keyword Search in Virtualized Environments CLOUD COMPUTING 30 Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud. CLOUD COMPUTING 31 Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud Computing. CLOUD COMPUTING 32 Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing CLOUD COMPUTING 33 Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing CLOUD COMPUTING
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 34 Achieving Practical Symmetric Searchable Encryption with SearchPatternPrivacy over Cloud CLOUD COMPUTING 35 Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data CLOUD COMPUTING 36 ECOGreenElectricityCost Optimization for Green Datacenters in Emerging Power Markets SERVICE COMPUTING 37 Efficient Encrypted Data Search with Expressive Queries and Flexible Update SERVICE COMPUTING 38 Energy-aware cloud workflow applications scheduling with geo-distributed data SERVICE COMPUTING 39 KeySea Keyword-based Search with Receiver Anonymity in Attribute-based Searchable Encryption SERVICE COMPUTING 40 Lightweight Privacy-preserving Raw Data Publishing Scheme SERVICE COMPUTING 41 Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things SERVICE COMPUTING 42 Lucid A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection SERVICE COMPUTING 43 Minimizing FinancialCostof DDoS Attack Defense in Clouds with Fine-Grained Resource Management SERVICE COMPUTING 44 Personalized Recommendation System based on Collaborative Filtering for IoT Scenarios SERVICE COMPUTING 45 Privacy Preserving QoS Forecasting in Mobile Edge Environments SERVICE COMPUTING 46 Provably Efficient Resource Allocation for Edge Service Entities Using Hermes SERVICE COMPUTING 47 Reverse Nearest Neighbor Search in Semantic Trajectories for Location based Services SERVICE COMPUTING 48 Revocable Attribute-based Data Storage in Mobile Clouds SERVICE COMPUTING 49 Semantics of Data Mining Services in Cloud Computing SERVICE COMPUTING 50 Shed+ Optimal Dynamic Speculation to Meet Application Deadlines in Cloud SERVICE COMPUTING 51 Scalable and efficient authentication scheme for secure smart grid communication SERVICE COMPUTING
  • 4. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 52 Sparse Mobile Crowdsensing With Differential and Distortion Location Privacy INFORMATION FORENSICS AND SECURITY 53 A Verifiable Semantic Searching Scheme by Optimal Matching over Encrypted Data in Public Cloud INFORMATION FORENSICS AND SECURITY 54 Pay as You Decrypt Decryption Outsourcing for Functional Encryption Using Blockchain INFORMATION FORENSICS AND SECURITY 55 Securing Resourcesin Decentralized Cloud Storage INFORMATION FORENSICS AND SECURITY 56 Fake News, Disinformation,and Deepfakes: Leveraging Distributed Ledger Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality INFORMATION FORENSICS AND SECURITY 57 Activity Minimization of Misinformation Influence in Online Social Networks COMPUTATIONAL SOCIAL SYSTEMS 58 An Efficient Feedback Control Mechanism for Positive or Negative Information Spread in Online Social Networks COMPUTATIONAL SOCIAL SYSTEMS 59 ArvaNet Deep Recurrent Architecture for PPG- Based Negative Mental-State Monitoring COMPUTATIONAL SOCIAL SYSTEMS 60 Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic A Case Study on Weibo COMPUTATIONAL SOCIAL SYSTEMS 61 Continuous Activity Maximization in Online Social Networks COMPUTATIONAL SOCIAL SYSTEMS 62 Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews COMPUTATIONAL SOCIAL SYSTEMS 63 Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network COMPUTATIONAL SOCIAL SYSTEMS 64 Information Dissemination From Social Network for Extreme Weather Scenario COMPUTATIONAL SOCIAL SYSTEMS 65 Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things COMPUTATIONAL SOCIAL SYSTEMS 66 Movie Recommendation System Using Sentiment Analysis From Micro blogging Data COMPUTATIONAL SOCIAL SYSTEMS
  • 5. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 67 On Utilizing Communities Detected From Social Networks in Hashtag Recommendation COMPUTATIONAL SOCIAL SYSTEMS 68 Understanding the User Behavior of Foursquare A Data-Driven Study on a Global Scale COMPUTATIONAL SOCIAL SYSTEMS 69 User Behavior Prediction of Social Hotspots Based on Multi message Interaction and Neural Network COMPUTATIONAL SOCIAL SYSTEMS 70 Popular Matching for Security-Enhanced Resource Allocation in Social Internet of Flying Things COMPUTATIONAL SOCIAL SYSTEMS 71 SciChallenge A Social Media Aware Platform for Contest-Based STEM Education and Motivation of Young Students COMPUTATIONAL SOCIAL SYSTEMS 72 A Hidden Markov Contour Tree Model for Spatial Structured Prediction DATA MINING 73 Adaptive Diffusion of Sensitive Information In Online Social Networks DATA MINING 74 Adaptive Similarity Embedding For Unsupervised Multi-View Feature Selection DATA MINING 75 Adaptively Secure and Fast Processing of Conjunctive Queries over Encrypted Data DATA MINING 76 BATCH A Scalable Asymmetric Discrete Cross- Modal Hashing DATA MINING 77 CashlessSociety Managing Privacy and Security in the Technological Age DATA MINING 78 DGDFS Dependence Guided Discriminative Feature Selection for Predicting Adverse Drug- Drug Interaction DATA MINING 79 Discovering TemporalPatterns for Event Sequence Clustering via Policy Mixture Model DATA MINING 80 Effective Keyword Search over Weighted Graphs DATA MINING 81 Efficient Match-Based Candidate Network Generation for Keyword Queries over Relational Databases DATA MINING 82 Efficient Processing of Group Planning Queries Over Spatial-Social Networks DATA MINING 83 Efficiently Processing Spatialand Keyword Queries in Indoor Venues DATA MINING 84 Evaluating Public Anxiety for Topic-based Communities in Social Networks DATA MINING
  • 6. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 85 Fast Multi-view Semi-supervised Learning with Learned Graph DATA MINING 86 Fuzzy K-Means Clustering With Discriminative Embedding DATA MINING 87 Guarantee the Quality-of-Service of Control Transactions in Real-Time Database Systems DATA MINING 88 Hierarchical Prediction and Adversarial Learning For Conditional Response Generation DATA MINING 89 Land Use Classification with Point of Interests and Structural Patterns DATA MINING 90 Modeling Relation Paths for Knowledge Graph Completion DATA MINING 91 Multi-view Clustering with the Cooperation of Visible and Hidden Views DATA MINING 92 Online Pricing with Reserve Price Constraint for Personal Data Markets DATA MINING 93 Personalized Long and Short term Preference Learning for Next POI Recommendation DATA MINING 94 Predicting Hot Events in the Early Period through Bayesian Model for Social Networks DATA MINING 95 Predicting Student Performance in an Educational Game Using a Hidden Markov Model DATA MINING 96 Privacy Preserving Location Data Publishing A Machine Learning Approach DATA MINING 97 Product Quantized Collaborative Filtering DATA MINING 98 Publicly Verifiable Databases with All Efficient Updating Operations DATA MINING 99 Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages DATA MINING 100 Social Boosted Recommendation with Folded Bipartite Network Embedding DATA MINING 101 Emotion Correlation Mining Through Deep Learning Models on Natural Language Text DATA MINING 102 AdSherlock Efficient and Deployable Click Fraud Detection for Mobile Applications MOBILE COMPUTING 103 Distributed Time-Sensitive Task Selectionin Mobile Crowdsensing MOBILE COMPUTING 104 Eclipse Preserving Differential Location Privacy MOBILE COMPUTING
  • 7. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Against Long-Term Observation Attacks 105 Exploiting Multi-Dimensional Task Diversity in Distributed Auctions for Mobile Crowd Sensing MOBILE COMPUTING 106 Fine Grained User Profiling for Personalized Task Matching in Mobile Crowd Sensing MOBILE COMPUTING 107 KOLLECTOR Detecting Fraudulent Activities on Mobile Devices Using Deep Learning MOBILE COMPUTING 108 PACE Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowd Sensing MOBILE COMPUTING 109 Predictability and Prediction of Human Mobility Based on Application-collected Location Data MOBILE COMPUTING 110 Privacy-Preserving Media Sharing with Scalable Access Controland Secure De duplication in Mobile Cloud Computing MOBILE COMPUTING 111 Protecting Your Shopping Preference with Differential Privacy MOBILE COMPUTING 112 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices MOBILE COMPUTING 113 SocialRecruiter Dynamic Incentive Mechanism for Mobile Crowd Sourcing Worker Recruitment with Social Networks MOBILE COMPUTING 114 Towards Fine-Grained Access Control in Enterprise-Scale Internet-of-Things MOBILE COMPUTING 115 Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowd Sensing Systems MOBILE COMPUTING 116 Shielding Collaborative Learning Mitigating Poisoning Attacks through Client Side Detection DEPENDABLE AND SECURE COMPUTING 117 Scaling Camouflage Content Disguising Attack Against Computer Vision Applications DEPENDABLE AND SECURE COMPUTING 118 Representing Fine-Grained Co-Occurrences for Behavior-BasedFraud Detectionin Online Payment Services DEPENDABLE AND SECURE COMPUTING 119 Privacy-Preserving Federated Deep Learning with Irregular Users DEPENDABLE AND SECURE COMPUTING
  • 8. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 120 Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack DEPENDABLE AND SECURE COMPUTING 121 On-the-fly Privacy for Location Histograms DEPENDABLE AND SECURE COMPUTING 122 Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization DEPENDABLE AND SECURE COMPUTING 123 Match in My Way Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing DEPENDABLE AND SECURE COMPUTING 124 Geometric range search on encrypted data with Forward or Backward security DEPENDABLE AND SECURE COMPUTING 125 Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing DEPENDABLE AND SECURE COMPUTING 126 Efficient and Secure Attribute-based Access Control with Identical Sub-Policies Frequently Used in Cloud Storage1 DEPENDABLE AND SECURE COMPUTING 127 Detectionand Defense of Cache Pollution Based on Popularity Prediction in Named Data Networking DEPENDABLE AND SECURE COMPUTING 128 Adaptive Secure Nearest Neighbor Query Processing over Encrypted Data DEPENDABLE AND SECURE COMPUTING 129 Achieving Efficient Secure Deduplication with User-Defined Access Control in Cloud DEPENDABLE AND SECURE COMPUTING 130 Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data DEPENDABLE AND SECURE COMPUTING 131 A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection DEPENDABLE AND SECURE COMPUTING 132 An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things INDUSTRIAL INFORMATICS
  • 9. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com 133 Detection and Mitigation of Cyber Attacks on Voltage Stability Monitoring of Smart Grids INDUSTRIAL INFORMATICS 134 Enabling Privacy-assured Fog-based Data Aggregation in E-healthcare Systems INDUSTRIAL INFORMATICS 135 Hidden Electricity Theft by Exploiting Multiple- Pricing Scheme in Smart Grids INDUSTRIAL INFORMATICS 136 Social Image Sentiment Analysis by Exploiting Multimodal Content and Heterogeneous Relations INDUSTRIAL INFORMATICS 137 FarSight Long-Term Disease Prediction Using Unstructured Clinical Nursing Notes EMERGING TOPICS IN COMPUTING 138 Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare EMERGING TOPICS IN COMPUTING 139 Recommending Activities for Mental Health and Well-being Insights from Two User Studies EMERGING TOPICS IN COMPUTING 140 Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities EMERGING TOPICS IN COMPUTING 141 Credit Card Transactions Data Adversarial Augmentation in the Frequency Domain BIG DATA 142 Building and Querying an Enterprise Knowledge Graph BIG DATA 143 Delegated Authorization Framework for EHR Services using Attribute Based Encryption BIG DATA 144 Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks BIG DATA 145 A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems INTERNET OF THINGS (IOT) 146 An Efficient IoT-Based Platform for Remote Real- Time Cardiac Activity Monitoring INTERNET OF THINGS (IOT) 147 An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-Things INTERNET OF THINGS (IOT) 148 An Efficient Spam Detection Technique for IoT Devices using Machine Learning INTERNET OF THINGS (IOT) 149 Efficient IoT Management with Resilience to INTERNET OF
  • 10. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Unauthorized Access to Cloud Storage THINGS (IOT) 150 Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT INTERNET OF THINGS (IOT) 151 Secure Storage Auditing with Efficient Key Updates for Cognitive Industrial IoT Environment INTERNET OF THINGS (IOT) 152 Benchmarking Image Retrieval Diversification Techniques for Social Media IMAGE PROCESSING AND MULTIMEDIA 153 Online Hashing with Bit Selection for Image Retrieval IMAGE PROCESSING AND MULTIMEDIA 154 Trust-Based Video Management Framework for Social Multimedia Networks IMAGE PROCESSING AND MULTIMEDIA 155 An Integrated Indexing and Search Service for Distributed File Systems PARALLEL AND DISTRIBUTED SYSTEMS 156 ESetStore An Erasure-Coded Storage System With Fast Data Recovery PARALLEL AND DISTRIBUTED SYSTEMS 157 Scalable and Adaptive Data Replica Placement for Geo-Distributed Cloud Storages PARALLEL AND DISTRIBUTED SYSTEMS 158 A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks VEHICULAR TECHNOLOGY 159 Collaborative Content Delivery in Software-Defined Heterogeneous Vehicular Networks VEHICULAR TECHNOLOGY 160 Dynamic Network Slicing and Resource Allocation in Mobile Edge Computing Systems VEHICULAR TECHNOLOGY 161 Security Enhanced Content Sharing in Social IoT A Directed Hypergraph-Based Learning Scheme VEHICULAR TECHNOLOGY