Java IEEE 2015 titles

5
SMART PRO TECHNOLOGIES IEEE Java projects list S.No Project title Vertical Year SPJ 001 Co-extracting opinion targets and opinion words from online reviews based on the word alignment model Data mining 2015 SPJ 002 A profit maximization scheme with guaranteed quality of service in cloud computing Cloud computing 2015 SPJ 003 Context-based diversification for keyword queries over xml data Data mining 2015 SPJ 004 A scalable and reliable matching service for content-based publish/subscribe systems Cloud computing 2015 SPJ 005 A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data Cloud computing 2015 SPJ 006 Stealthy denial of service strategy in cloud computing Cloud computing 2015 SPJ 007 Context-based diversification for keyword queries over xml data Data mining 2015 SPJ 008 Dynamic routing for data integrity and delay differentiated services in wireless sensor networks Mobile computing 2015 SPJ 009 A distortion-resistant routing framework for video traffic in wireless multihop networks Networking 2015 SPJ 010 Discovery of ranking fraud for mobile apps Data mining 2015 SPJ 011 A proximity-aware interest-clustered p2p file sharing system Networking 2015 SPJ 012 A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor network Secure computing 2015 # 2/495, 1st Floor, Nagarajupet, Kadapa. Ph: 9885652333 email: [email protected] www.smartprotech.in

Transcript of Java IEEE 2015 titles

Page 1: Java IEEE 2015 titles

SMART PRO TECHNOLOGIESIEEE Java projects list

S.No Project title Vertical Year

SPJ 001 Co-extracting opinion targets and opinion words from online reviews based on the word alignment model

Data mining 20

15

SPJ 002 A profit maximization scheme with guaranteed quality of service in cloud computing

Cloud computing

2015

SPJ 003 Context-based diversification for keyword queries over xml data

Data mining 20

15

SPJ 004 A scalable and reliable matching service for content-based publish/subscribe systems

Cloud computing

2015

SPJ 005 A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data

Cloud computing

2015

SPJ 006Stealthy denial of service strategy in cloud computing

Cloud computing

2015

SPJ 007 Context-based diversification for keyword queries over xml data

Data mining 20

15

SPJ 008 Dynamic routing for data integrity and delay differentiated services in wireless sensor networks

Mobile computing

2015

SPJ 009 A distortion-resistant routing framework for video traffic in wireless multihop networks

Networking 20

15

SPJ 010Discovery of ranking fraud for mobile apps Data mining

2015

SPJ 011 A proximity-aware interest-clustered p2p file sharing system Networking 2015

SPJ 012 A lightweight secure scheme for detecting provenance forgery and packet drop attacks in wireless sensor network

Secure computing

2015

SPJ 013 Privacy-preserving and truthful detection of packet dropping attacks in wireless ad hoc networks

Mobile computing

2015

SPJ 014 Maximizing p2p file access availability in mobile ad hoc networks though replication for efficient file sharing

Networking 2015

SPJ 015 On summarization and timeline generation for evolutionary tweet streams

Data mining2015

SPJ 016 A secure anti-collusion data sharing scheme for dynamic groups in the cloud

Cloud computing

2015

SPJ 017 T-closeness through micro aggregation: strict privacy with enhanced utility preservation

Data mining 2015

SPJ 018 User-defined privacy grid system for continuous location- Mobile 2015

# 2/495, 1st Floor, Nagarajupet, Kadapa. Ph: 9885652333 email: [email protected]

Page 2: Java IEEE 2015 titles

SMART PRO TECHNOLOGIESIEEE Java projects list

based services computing

SPJ 019Asymmetric social proximity based private matching protocols for online social networks

Parallel & distributed

systems

2015

SPJ 020 An authenticated trust and reputation calculation and management system for cloud and sensor networks integrati

Cloud computing

2015

SPJ 021 Privacy policy inference of user-uploaded images on content sharing sites

Data mining2015

SPJ 022 Reverse nearest neighbors in unsupervised distance-based outlier detection

Data mining2015

SPJ 023A computational dynamic trust model for user authorization

Mobile computing

2015

SPJ 024 Audit-free cloud storage via deniable attribute-based encryption

Cloud computing

2015

SPJ 025Cost-effective authentic and anonymous data sharing with forward security

Parallel & distributed

systems

2015

SPJ 026 Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing

Cloud computing

2015

SPJ 027 Designing high performance web-based computing services to promote telemedicine database management system

Service computing

2015

SPJ 028 Route-saver: leveraging route apis for accurate and efficient query processing at location-based services

Data mining2015

SPJ 029 Cloudarmor: supporting reputation-based trust management for cloud services

Cloud computing

2015

SPJ 030 Contributory broadcast encryption with efficient encryption and short ciphertexts

Secure computing

2015

SPJ 031Secure distributed deduplication systems with improved reliability

Parallel & distributed

systems

2015

SPJ 032 Control cloud data access privilege and anonymity with fully anonymous attribute-based encryptiona

Cloud computing

2015

SPJ 033 Detecting malicious facebook applications Networking 2015

SPJ 034 Location-aware and personalized collaborative filtering for web service recommendation

Service computing

2015

SPJ 035 Tweet segmentation and its application to named entity recognition

Data mining2015

SPJ 036A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendat

Information forensics and security

2015

SPJ 037 Towards effective bug triage with software data reduction Data mining 2015

# 2/495, 1st Floor, Nagarajupet, Kadapa. Ph: 9885652333 email: [email protected]

Page 3: Java IEEE 2015 titles

SMART PRO TECHNOLOGIESIEEE Java projects list

techniquesSPJ 038

An attribute-assisted reranking model for web image searchImage processing

2015

SPJ 039 Emr: a scalable graph-based ranking model for content-based image retrieval

Image processing

2015

SPJ 040 Ddsga: a data-driven semi-global alignment approach for detecting masquerade attacks

Secure computing

2015

SPJ 041 Real-time detection of traffic from twitter stream analysis Data mining 2015

SPJ 042Learning to rank image tags with limited training examples

Image processing

2015

SPJ 043 Malware propagation in large-scale networks Data mining 2015

SPJ 044 Privacy-preserving public auditing for regenerating-code-based cloud storage

Cloud computing

2015

SPJ 045 Improved privacy-preserving p2p multimedia distribution based on recombined fingerprints

Secure computing

2015

SPJ 046 Progressive duplicate detection Data mining 2015

SPJ 047 Secure spatial top-k query processing via un trusted location-based service providers

Secure computing

2015

SPJ 048Key updating for leakage resiliency with application to aes modes of operation

Information forensics and security

2015

# 2/495, 1st Floor, Nagarajupet, Kadapa. Ph: 9885652333 email: [email protected]