IEEE PROJECTS JAVA 2016

1 CPJ1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
Cloud Computing
2 CPJ1602 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Cloud Computing
3 CPJ1603 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
Cloud Computing
4 CPJ1604 An Efficient Privacy-Preserving Ranked Keyword Search Method
Cloud Computing
5 CPJ1605 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
Cloud Computing
6 CPJ1606 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
Cloud Computing
7 CPJ1607 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
Cloud Computing
8 CPJ1608 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Cloud Computing
9 CPJ1609 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
Cloud Computing
10 CPJ1610 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
Cloud Computing
11 CPJ1611 Dual-Server Public-Key Encryption With Keyword Search for
Cloud Computing
12 CPJ1612 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Cloud Computing
13 CPJ1613 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Cloud Computing
14 CPJ1614 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
Cloud Computing
15 CPJ1615 Geometric Range Search on Encrypted Spatial Data
Cloud Computing
16 CPJ1616 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Cloud Computing
17 CPJ1617 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
Cloud Computing
18 CPJ1618 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
Cloud Computing
19 CPJ1619 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
Cloud Computing
20 CPJ1620 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Cloud Computing
21 CPJ1621 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
Cloud Computing
22 CPJ1622 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
Cloud Computing
23 CPJ1623 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
Cloud Computing
24 CPJ1624 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Cloud Computing
25 CPJ1625 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Cloud Computing
26 CPJ1626 SecRBAC: Secure data in the Clouds
Cloud Computing
27 CPJ1627 A Novel Recommendation Model Regularized with User Trust and Item Ratings
CLOUD COMPUTING
28 CPJ1628 Automatically Mining Facets for Queries from Their Search Results
Data Mining
29 CPJ1629 Booster in High Dimensional Data Classification
Data Mining
30 CPJ1630 Building an intrusion detection system using a filter-based feature selection algorithm
Data Mining
31 CPJ1631 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
Data Mining
32 CPJ1632 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
Data Mining
33 CPJ1633 Crowdsourcing for Top-K Query Processing over Uncertain Data
Data Mining
34 CPJ1634 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
Data Mining
35 CPJ1635 Domain-Sensitive Recommendation with User-Item Subgroup Analysis
Data Mining
36 CPJ1636 Efficient Algorithms for Mining Top-K High Utility Itemsets
Data Mining
37 CPJ1637 Efficient Cache-Supported Path Planning on Roads
Data Mining
38 CPJ1638 Mining User-Aware Rare Sequential Topic Patterns in Document Streams
Data Mining
39 CPJ1639 Nearest Keyword Set Search in Multi-Dimensional Datasets
Data Mining
40 CPJ1640 Rating Prediction based on Social Sentiment from Textual Reviews
Data Mining
41 CPJ1641 Location Aware Keyword Query Suggestion Based on Document Proximity
Data Mining
42 CPJ1642 Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
Data Mining
43 CPJ1643 Quantifying Political Leaning from Tweets, Retweets, and Retweeters
Data Mining
44 CPJ1644 Relevance Feedback Algorithms Inspired By Quantum Detection
Data Mining
45 CPJ1645 Sentiment Embeddings with Applications to Sentiment Analysis
Data Mining
46 CPJ1646 Top-Down XML Keyword Query Processing
Data Mining
47 CPJ1647 TopicSketch: Real-time Bursty Topic Detection from Twitter
Data Mining
48 CPJ1648 Top-k Dominating Queries on Incomplete Data
Data Mining
49 CPJ1649 Understanding Short Texts through Semantic Enrichment and Hashing
Data Mining
50 CPJ1650 A Stable Approach for Routing Queries in Unstructured P2P Networks
Networking
51 CPJ1651 iPath: Path Inference in Wireless Sensor Networks
Networking
52 CPJ1652 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
Networking
53 CPJ1653 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
Networking
54 CPJ1654 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Networking
55 CPJ1655 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Mobile Computing
56 CPJ1656 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
Mobile Computing
57 CPJ1657 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
Mobile Computing
58 CPJ1658 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
Mobile Computing
59 CPJ1659 A Hop-by-Hop Routing Mechanism for Green Internet
PARALLEL
& DISTRIBUTED SYSTEMS
60 CPJ1660 Continuous Answering Holistic Queries over Sensor Networks
PARALLEL
& DISTRIBUTED SYSTEMS
61 CPJ1661 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
PARALLEL
& DISTRIBUTED SYSTEMS
62 CPJ1662 The Server Provisioning Problem for Continuous Distributed Interactive Applications
PARALLEL
& DISTRIBUTED SYSTEMS
63 CPJ1663 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Secure Computing
64 CPJ1664 Data Lineage in Malicious Environments
Secure Computing
65 CPJ1665 Detecting Malicious Facebook Applications
Secure Computing
66 CPJ1666 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing