+(91) 8494904045
support@finalyearstudentprojects.com

IEEE 2016 PROJECTS TITLES JAVA TITLES

SL NO Enquiry Number Project Title With Description Domain Year/2016
1 CEGJAV1601 A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data CLOUD COMPUTING JAVA/2016
2 CEGJAV1602 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud CLOUD COMPUTING JAVA/2016
3 CEGJAV1603 An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing CLOUD COMPUTING JAVA/2016
4 CEGJAV1604 An Efficient Privacy-Preserving Ranked Keyword Search Method CLOUD COMPUTING JAVA/2016
5 CEGJAV1605 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System CLOUD COMPUTING JAVA/2016
6 CEGJAV1606 Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing CLOUD COMPUTING JAVA/2016
7 CEGJAV1607 CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services CLOUD COMPUTING JAVA/2016
8 CEGJAV1608 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email CLOUD COMPUTING JAVA/2016
9 CEGJAV1609 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds CLOUD COMPUTING JAVA/2016
10 CEGJAV1610 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud CLOUD COMPUTING JAVA/2016
11 CEGJAV1611 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage CLOUD COMPUTING JAVA/2016
12 CEGJAV1612 Dynamic and Public Auditing with Fair Arbitration for Cloud Data CLOUD COMPUTING JAVA/2016
13 CEGJAV1613 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates CLOUD COMPUTING JAVA/2016
14 CEGJAV1614 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services CLOUD COMPUTING JAVA/2016
15 CEGJAV1615 Geometric Range Search on Encrypted Spatial Data CLOUD COMPUTING JAVA/2016
16 CEGJAV1616 Identity-Based Encryption with Cloud Revocation Authority and Its Applications CLOUD COMPUTING JAVA/2016
17 CEGJAV1617 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud CLOUD COMPUTING JAVA/2016
18 CEGJAV1618 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud CLOUD COMPUTING JAVA/2016
19 CEGJAV1619 Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems CLOUD COMPUTING JAVA/2016
20 CEGJAV1620 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption CLOUD COMPUTING JAVA/2016
21 CEGJAV1621 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming CLOUD COMPUTING JAVA/2016
22 CEGJAV1622 TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage CLOUD COMPUTING JAVA/2016
23 CEGJAV1623 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing CLOUD COMPUTING JAVA/2016
24 CEGJAV1624 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments CLOUD COMPUTING JAVA/2016
25 CEGJAV1625 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing CLOUD COMPUTING JAVA/2016
26 CEGJAV1626 SecRBAC: Secure data in the Clouds CLOUD COMPUTING JAVA/2016
27 CEGJAV1627 Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage System CLOUD COMPUTING JAVA/2016
28 CEGJAV1628 Probabilistic Static Load-Balancing of Parallel Mining of Frequent Sequences CLOUD COMPUTING JAVA/2016
29 CEGJAV1629 RSkNN: kNN Search on Road Networks by Incorporating Social Influence CLOUD COMPUTING JAVA/2016
30 CEGJAV1630 Exploit Every Bit: Effective Caching for High-Dimensional Nearest Neighbor Search CLOUD COMPUTING JAVA/2016
31 CEGJAV1631 Efficient and Exact Local Search for Random Walk Based Top-K Proximity Query in Large Graphs CLOUD COMPUTING JAVA/2016
32 CEGJAV1632 A Novel Recommendation Model Regularized with User Trust and Item Ratings DATA MINING JAVA/2016
33 CEGJAV1633 Automatically Mining Facets for Queries from Their Search Results DATA MINING JAVA/2016
34 CEGJAV1634 Booster in High Dimensional Data Classification DATA MINING JAVA/2016
35 CEGJAV1635 Building an intrusion detection system using a filter-based feature selection algorithm DATA MINING JAVA/2016
36 CEGJAV1636 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information DATA MINING JAVA/2016
37 CEGJAV1637 Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings DATA MINING JAVA/2016
38 CEGJAV1638 Crowdsourcing for Top-K Query Processing over Uncertain Data DATA MINING JAVA/2016
39 CEGJAV1639 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder DATA MINING JAVA/2016
40 CEGJAV1640 Domain-Sensitive Recommendation with User-Item Subgroup Analysis DATA MINING JAVA/2016
41 CEGJAV1641 Efficient Algorithms for Mining Top-K High Utility Itemsets DATA MINING JAVA/2016
42 CEGJAV1642 Efficient Cache-Supported Path Planning on Roads DATA MINING JAVA/2016
43 CEGJAV1643 Mining User-Aware Rare Sequential Topic Patterns in Document Streams DATA MINING JAVA/2016
44 CEGJAV1644 Nearest Keyword Set Search in Multi-Dimensional Datasets DATA MINING JAVA/2016
45 CEGJAV1645 Rating Prediction based on Social Sentiment from Textual Reviews DATA MINING JAVA/2016
46 CEGJAV1646 Location Aware Keyword Query Suggestion Based on Document Proximity DATA MINING JAVA/2016
47 CEGJAV1647 Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs DATA MINING JAVA/2016
48 CEGJAV1648 Quantifying Political Leaning from Tweets, Retweets, and Retweeters DATA MINING JAVA/2016
49 CEGJAV1649 Relevance Feedback Algorithms Inspired By Quantum Detection DATA MINING JAVA/2016
50 CEGJAV1650 Sentiment Embeddings with Applications to Sentiment Analysis DATA MINING JAVA/2016
51 CEGJAV1651 Top-Down XML Keyword Query Processing DATA MINING JAVA/2016
52 CEGJAV1652 Topic Sketch: Real-time Bursty Topic Detection from Twitter DATA MINING JAVA/2016
53 CEGJAV1653 Top-k Dominating Queries on Incomplete Data DATA MINING JAVA/2016
54 CEGJAV1654 Understanding Short Texts through Semantic Enrichment and Hashing DATA MINING JAVA/2016
55 CEGJAV1655 A Stable Approach for Routing Queries in Unstructured P2P Networks NETWORKING JAVA/2016
56 CEGJAV1656 iPath: Path Inference in Wireless Sensor Networks NETWORKING JAVA/2016
57 CEGJAV1657 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks NETWORKING JAVA/2016
58 CEGJAV1658 Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks NETWORKING JAVA/2016
59 CEGJAV1659 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users NETWORKING JAVA/2016
60 CEGJAV1660 Distributed Resource Management for Cognitive Ad Hoc Networks With Cooperative Relays Networking JAVA/2016
61 CEGJAV1661 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks MOBILE COMPUTING JAVA/2016
62 CEGJAV1662 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data MOBILE COMPUTING JAVA/2016
63 CEGJAV1663 Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach MOBILE COMPUTING JAVA/2016
64 CEGJAV1664 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach MOBILE COMPUTING JAVA/2016
65 CEGJAV1665 Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks MOBILE COMPUTING JAVA/2016
66 CEGJAV1666 Optimizing Video Request Routing in Mobile Networks with Built-in Content Caching MOBILE COMPUTING JAVA/2016
67 CEGJAV1667 A Hop-by-Hop Routing Mechanism for Green Internet PARALLEL & DISTRIBUTED SYSTEMS JAVA/2016
68 CEGJAV1668 Continuous Answering Holistic Queries over Sensor Networks PARALLEL & DISTRIBUTED SYSTEMS JAVA/2016
69 CEGJAV1669 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks PARALLEL & DISTRIBUTED SYSTEMS JAVA/2016
70 CEGJAV1670 Dictionary Based Secure Provenance Compression for Wireless Sensor Networks PARALLEL & DISTRIBUTED SYSTEMS JAVA/2016
71 CEGJAV1671 The Server Provisioning Problem for Continuous Distributed Interactive Applications PARALLEL & DISTRIBUTED SYSTEMS JAVA/2016
72 CEGJAV1672 Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts SECURE COMPUTING JAVA/2016
73 CEGJAV1673 Data Lineage in Malicious Environments SECURE COMPUTING JAVA/2016
74 CEGJAV1674 Detecting Malicious Facebook Applications SECURE COMPUTING JAVA/2016
75 CEGJAV1675 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments SECURE COMPUTING JAVA/2016
76 CEGJAV1676 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata SECURE COMPUTING JAVA/2016
77 CEGJAV1677 Resolving Multi-party Privacy Conflicts in Social Media SECURE COMPUTING JAVA/2016
78 CEGJAV1678 Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions INFORMATION FORENSICS & SECURITY JAVA/2016
79 CEGJAV1679 Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data INFORMATION FORENSICS & SECURITY JAVA/2016
80 CEGJAV1680 Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms INFORMATION FORENSICS & SECURITY JAVA/2016
81 CEGJAV1681 Profiling Online Social Behaviors for Compromised Account Detection INFORMATION FORENSICS & SECURITY JAVA/2016
82 CEGJAV1682 A Locality Sensitive Low-Rank Model for Image Tag Completion IMAGE PROCESSING JAVA/2016
83 CEGJAV1683 A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks IMAGE PROCESSING JAVA/2016
84 CEGJAV1684 Learning of Multimodal Representations with Random Walks on the Click Graph IMAGE PROCESSING JAVA/2016
85 CEGJAV1685 Online Multi-Modal Distance Metric Learning with Application to Image Retrieval IMAGE PROCESSING JAVA/2016
86 CEGJAV1686 Tag Based Image Search by Social Re-ranking IMAGE PROCESSING JAVA/2016
87 CEGJAV1687 Social Friend Recommendation Based on Multiple Network Correlation MULTIMEDIA(Social Networking) JAVA/2016
88 CEGJAV1688 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors MULTIMEDIA (Social Networking) JAVA/2016
89 CEGJAV1689 Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation SOFTWARE ENGINEERING JAVA/2016
90 CEGJAV1690 Metamorphic Testing for Software Quality Assessment: A Study of Search Engines SOFTWARE ENGINEERING JAVA/2016
91 CEGJAV1691 SITAR: GUI Test Script Repair SOFTWARE ENGINEERING JAVA/2016
92 CEGJAV1692 Answering Approximate Queries over XML Data FUZZY SYSTEMS JAVA/2016
93 CEGJAV1693 Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data Dependable and Secure Computing, JAVA/2016
94 CEGJAV1694 Group Key Agreement with Local Connectivity Dependable and Secure Computing, JAVA/2016
95 CEGJAV1695 PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Dependable and Secure Computing JAVA/2016
96 CEGJAV1696 GeTrust: A guarantee-based trust model in Chord-based P2P networks Dependable and Secure Computing, JAVA/2016
97 CEGJAV1697 E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks System Journal, Jun 2016 JAVA/2016
98 CEGJAV1698 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data IOT Journal, June 2016 JAVA/2016
99 CEGJAV1699 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data IOT, Apr 2016 JAVA/2016
100 CEGJAV1700 Optimizing Cloud-Based Video Crowdsensing IOT Journal, June 2016 JAVA/2016
101 CEGJAV1701 Optimizing Cloud-Based Video Crowd sensing IOT 2016 JAVA/2016
102 CEGJAV1702 BLITHE: Behavior Rule Based Insider Threat Detection for Smart Grid IOT 2016 JAVA/2016
103 CEGJAV1703 Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era IOT 2016 JAVA/2016
104 CEGJAV1704 Robust Relay Selection for Large-Scale Energy-Harvesting IoT Networks IOT 2016 JAVA/2016
105 CEGJAV1705 A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks IOT 2016 JAVA/2016
106 CEGJAV1706 Security, Privacy & Incentive Provision for Mobile Crowd Sensing Systems IOT 2016 JAVA/2016
107 CEGJAV1707 Reversible Data Hiding in Encrypted Images With IOT 2016 JAVA/2016
108 CEGJAV1708 Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage System Data Mining  

 

June 2016

109 CEGJAV1709 Probabilistic Static Load-Balancing of Parallel Mining of Frequent Sequences Data Mining, May  2016
110 CEGJAV1710 RSkNN: kNN Search on Road Networks by Incorporating Social Influence Data Mining, June 2016
111 CEGJAV1711 Exploit Every Bit: Effective Caching for High-Dimensional Nearest Neighbor Search Data Mining, May  2016
112 CEGJAV1712 Efficient and Exact Local Search for Random Walk Based Top-K Proximity Query in Large Graphs Data Mining, May 2016
113 CEGJAV1713 Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data Dependable and Secure Computing, May-Jun 2016
114 CEGJAV1714 Group Key Agreement with Local Connectivity Dependable and Secure Computing May-Jun 2016
115 CEGJAV1715 PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Dependable and Secure Computing May-Jun 2016
116 CEGJAV1716 GeTrust: A guarantee-based trust model in Chord-based P2P networks Dependable and Secure Computing, Pre-print 2016
117 CEGJAV1717 Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks Mobile Computing, June 2016
118 CEGJAV1718 Optimizing Video Request Routing in Mobile Networks with Built-in Content Caching Mobile Computing, July 2016
119 CEGJAV1719 E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks System Journal, Jun 2016
120 CEGJAV1720 Distributed Resource Management for Cognitive Ad Hoc Networks With Cooperative Relays Networking, June 2016
121 CEGJAV1721 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data IOT, Apr 2016
122 CEGJAV1722 Optimizing Cloud-Based Video Crowd sensing IOT Journal, June 2016
123 CEGJAV1723 BLITHE: Behavior Rule Based Insider Threat Detection for Smart Grid IOT Journal, April 2016
124 CEGJAV1724 Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era IOT 2016 IOT 2016
125 CEGJAV1725 Robust Relay Selection for Large-Scale Energy-Harvesting IoT Networks IOT 2016 IOT 2016
126 CEGJAV1726 A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks IOT 2016 IOT 2016
127 CEGJAV1727 Security, Privacy Incentive Provision for Mobile Crowd Sensing Systems IOT 2016 IOT 2016
128 CEGJAV1728 Reversible Data Hiding in Encrypted Images With Distributed Source Encoding Circuits and Systems for Video Tech IOT 2016