IEEE PROJECTS JAVA 2017

1 CPJ1701 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
Cloud Computing
2 CPJ1702 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Cloud Computing
3 CPJ1703 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
Cloud Computing
4 CPJ1704 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
Cloud Computing
5 CPJ1705 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
Cloud Computing
6 CPJ1706 A Robust Reputation Management Mechanism In The Federated Cloud
Cloud Computing
7 CPJ1707 Achieving Efficient and Secure Data Acquisition for Cloud- supported Internet of Things in Smart Grid
Cloud Computing
8 CPJ1708 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
Cloud Computing
9 CPJ1709 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
Cloud Computing
10 CPJ1710 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
Cloud Computing
11 CPJ1711 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
Cloud Computing
12 CPJ1712 Fast Phrase Search for Encrypted Cloud Storage
Cloud Computing
13 CPJ1713 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
Cloud Computing
14 CPJ1714 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Cloud Computing
15 CPJ1715 Identity-Based Private Matching over Outsourced Encrypted Datasets
Cloud Computing
16 CPJ1716 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
Cloud Computing
17 CPJ1717 On the Security of Data Access Control for Multi-authority Cloud Storage Systems
Cloud Computing
18 CPJ1718 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
Cloud Computing
19 CPJ1719 Privacy Protection based Access Control Scheme in Cloud-based Services
Cloud Computing
20 CPJ1720 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
Cloud Computing
21 CPJ1721 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
Cloud Computing
22 CPJ1722 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
Cloud Computing
23 CPJ1723 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Cloud Computing
24 CPJ1724 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Cloud Computing
25 CPJ1725 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Cloud Computing
26 CPJ1726 SecRBAC: Secure data in the Clouds
Cloud Computing
27 CPJ1727 A Novel Recommendation Model Regularized with User Trust and Item Ratings
CLOUD COMPUTING
28 CPJ1728 Automatically Mining Facets for Queries from Their Search Results
Data Mining
29 CPJ1729 Booster in High Dimensional Data Classification
Data Mining
30 CPJ1730 Building an intrusion detection system using a filter-based feature selection algorithm
Data Mining
31 CPJ1731 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
Data Mining
32 CPJ1732 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
Data Mining
33 CPJ1733 Crowdsourcing for Top-K Query Processing over Uncertain Data
Data Mining
34 CPJ1734 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
Data Mining
35 CPJ1735 Domain-Sensitive Recommendation with User-Item Subgroup Analysis
Data Mining
36 CPJ1736 Efficient Algorithms for Mining Top-K High Utility Itemsets
Data Mining
37 CPJ1737 Efficient Cache-Supported Path Planning on Roads
Data Mining
38 CPJ1738 Mining User-Aware Rare Sequential Topic Patterns in Document Streams
Data Mining
39 CPJ1739 Nearest Keyword Set Search in Multi-Dimensional Datasets
Data Mining
40 CPJ1740 Rating Prediction based on Social Sentiment from Textual Reviews
Data Mining
41 CPJ1741 Location Aware Keyword Query Suggestion Based on Document Proximity
Data Mining
42 CPJ1742 Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
Data Mining
43 CPJ1743 Quantifying Political Leaning from Tweets, Retweets, and Retweeters
Data Mining
44 CPJ1744 Relevance Feedback Algorithms Inspired By Quantum Detection
Data Mining
45 CPJ1745 Sentiment Embeddings with Applications to Sentiment Analysis
Data Mining
46 CPJ1746 Top-Down XML Keyword Query Processing
Data Mining
47 CPJ1747 TopicSketch: Real-time Bursty Topic Detection from Twitter
Data Mining
48 CPJ1748 Top-k Dominating Queries on Incomplete Data
Data Mining
49 CPJ1749 Understanding Short Texts through Semantic Enrichment and Hashing
Data Mining
50 CPJ1750 A Stable Approach for Routing Queries in Unstructured P2P Networks
Networking
51 CPJ1751 iPath: Path Inference in Wireless Sensor Networks
Networking
52 CPJ1752 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
Networking
53 CPJ1753 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
Networking
54 CPJ1754 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Networking
55 CPJ1755 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
Mobile Computing
56 CPJ1756 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
Mobile Computing
57 CPJ1757 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
Mobile Computing
58 CPJ1758 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
Mobile Computing
59 CPJ1759 A Hop-by-Hop Routing Mechanism for Green Internet
PARALLEL
& DISTRIBUTED SYSTEMS
60 CPJ1760 Continuous Answering Holistic Queries over Sensor Networks
PARALLEL
& DISTRIBUTED SYSTEMS
61 CPJ1761 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
PARALLEL
& DISTRIBUTED SYSTEMS
62 CPJ1762 The Server Provisioning Problem for Continuous Distributed Interactive Applications
PARALLEL
& DISTRIBUTED SYSTEMS
63 CPJ1763 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
Secure Computing
64 CPJ1764 Data Lineage in Malicious Environments
Secure Computing
65 CPJ1765 Detecting Malicious Facebook Applications
Secure Computing
66 CPJ1766 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
67 CPJ1767 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
68 CPJ1768 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
69 CPJ1769 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
70 CPJ1770 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
71 CPJ1771 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
72 CPJ1772 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
73 CPJ1773 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
74 CPJ1774 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
75 CPJ1775 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
76 CPJ1776 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
77 CPJ17677 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
78 CPJ1778 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
79 CPJ1779 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
80 CPJ1780 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
81 CPJ1781 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
82 CPJ1782 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
83 CPJ1783 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
84 CPJ1784 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
85 CPJ1785 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
86 CPJ1786 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
87 CPJ1787 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
88 CPJ1788 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
89 CPJ1789 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
90 CPJ1790 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing
91 CPJ1791 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
Secure Computing