Monday, 15 August 2016

IEEE 2016 - 2017 JAVA PROJECT TITLES

TITLES
EPAS: A Sampling Based Similarity Identification Algorithm for the Cloud
Model-Driven Development Patterns for Mobile Services in Cloud of Things
Follow-Me Cloud: When Cloud Services Follow Mobile Users
Stochastic Load Balancing for Virtual Resource Management in  Datacenters
Providing User Security Guarantees in Public Infrastructure Clouds
Dynamic and Public Auditing with Fair Arbitration for Cloud Data
Crowd sourcing based Description of Urban Emergency Events using Social Media Big Data
Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics
Using Socio-Spatial Context in Mobile Cloud Offload Process for Energy Conservation in Wireless Devices
Using Crowd sourcing to Provide QoS for Mobile Cloud Computing
A  Novel Statistical Cost Model and an Algorithm for Efficient Application Offloading to Clouds
A Modified Hierarchical Attribute-based Encryption Access Control Method for Mobile Cloud Computing
A Data and Task  Co-scheduling Algorithm for Scientific Cloud Workflows
Achieving Energy Efficiency in Data Centers Using an Artificial Intelligence Abstraction Model
Assurance of Security and Privacy Requirements for Cloud Deployment Model
 On the Performance Impact of Data Access Middleware for Data Stores
Identity-Based Private Matching over Outsourced Encrypted Datasets
ADON: Application-Driven Overlay Network-as-a-Service for Data-Intensive Science
Chaotic Searchable Encryption for Mobile Cloud Storage
Cypher DB: A Novel Architecture for Outsourcing Secure Database Processing
Architectural Protection of Application Privacy Against Software and Physical Attacks in Un trusted Cloud Environment
A Context-aware Service Evaluation Approach over Big Data for  Cloud Applications
A Decision-Theoretic Rough Set Approach for Dynamic Data Mining
TelCoVis: Visual Exploration of Co-occurrence in Urban Human Mobility Based on Telco Data
Interactive Visual Discovering of Movement Patterns from Sparsely Sampled Geo-tagged Social Media Data
ecoSense: Minimize Participants' Total 3G Data Cost in Mobile Crowdsensing Using Opportunistic Relays
A Kind of Novel ITS Based on Space-Air-Ground Big-Data
Recent Development in Big Data Analytics for Business Operations and Risk Management
Online Ensemble Learning of Data Streams with Gradually Evolved Classes
Diplo Cloud: Efficient and Scalable Management of RDF Data in the  Cloud
Graph Regularized Feature Selection with Data Reconstruction
NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
Nearest Keyword Set Search in Multi-Dimensional Datasets
Online Mode Switch Algorithms for Maintaining Data Freshness in Dynamic Cyber-Physical Systems
Data-driven Soft  Decoding of Compressed Images in Dual Transform-Pixel Domain
Double-Tip Artefact Removal from Atomic Force Microscopy Images
Weakly Supervised Fine-Grained Categorization with Part-Based Image Representation
Robust Visual Tracking via Convolutional Networks without Training
Learning Invariant Color Features for Person Re-Indentification
A Diffusion and Clustering-based Approach for Finding Coherent Motions and Understanding Crowd Scenes
Automatic Design of Color Filter Arrays in The Frequency Domain
Learning Iteration-wise Generalized Shrinkage-Thre sholding  Operators for Blind Deconvolution
Image Segmentation Using Parametric Contours With Free Endpoints
CASAIR: Content and Shape-Aware Image Retargeting and Its  Applications
Texture classification using Dense Micro-block Difference
Statistical performance analysis of a fast super-resolution technique using noisy translations
Internet-based Indoor Navigation Services
Tools Enabling Online Contributions by Older Adults
Social media interaction and analytics for enhanced educational experiences
Crowdsourcing processes: a survey of approaches and opportunities
GWMEP: Task-Manager-as-a-Service in Apache CloudStack
Service Provisioning in Content-Centric Networking: Challenges, Opportunities, and Promising Directions
Distributed Data Management Service for VPH Applications
Ensembling Classifiers for Detecting User's Intentions behind Web Queries
Techniques for Defending from Buffer Overflow Vulnerability Security Exploits
Separating Operational and Control Behaviors: A New Approach to Web Services Modeling
Incentive Mechanisms in P2P Media Streaming Systems
An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks
An Optimization Framework for Mobile Data Collection in Energy- Harvesting Wireless Sensor Networks
Distributed and Fair Beaconing Rate Adaptation for Congestion  Control in Vehicular Networks
Minimizing Radio Resource Usage for Machine-to-Machine Communications through Data-Centric Clustering
Unlicensed Spectra Fusion and Interference Coordination for LTE  Systems
On the vulnerabilities of Voronoi-based approaches to mobile sensor deployment
A Super process With Upper Confidence Bounds for Cooperative  Spectrum Sharing
Mitigating Cross-Site Scripting Attacks with a Content Security Policy
ID2S Password-Authenticated Key Exchange Protocols
Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
A Shoulder Surfing Resistant Graphical Authentication System
A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Mining User-Aware Rare Sequential Topic Patterns in Document Streams
OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
SecRBAC: Secure data in the Clouds
Trust Agent-Based Behavior Induction in Social Networks
Tag Based Image Search by Social Re-ranking
Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
A Locality Sensitive Low-Rank Model for Image Tag Completion
A Locality Sensitive Low-Rank Model for Image Tag Completion
A Shoulder Surfing Resistant Graphical Authentication System
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
 KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
Mining User-Aware Rare Sequential Topic Patterns in Document Streams
Mitigating Cross-Site Scripting Attacks with a Content Security Policy
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
SecRBAC: Secure data in the Clouds
Tag Based Image Search by Social Re-ranking

No comments:

Post a Comment