Get Adobe Flash player

CSE IEEE Java Projects

CALL US: 8884445228/+91-9538304161

For Detail Synopsis/BasePaper call:8884445228 /9538304161 or mailus :modainnovations@gmail.com or CLICK HERE

IEEE 2017-18 java project List: Download

IEEE 2017-18 bigdata project List: Download

 

Sl.No CSE ieee java Project Name Domain
1
Cloud Computing Security From Single to Multi-Clouds.
Cloud Computing
2
Reliable Re-encryption in Unreliable Clouds.
Cloud Computing
3
Cloud Data Production for Masses
Cloud Computing
4
Costing of Cloud Computing Services A Total Cost of Ownership Approach.
Cloud Computing
5
Ensuring Distributed Accountability for Data Sharing in the Cloud.
Cloud Computing
6
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
Cloud Computing
7
Gossip-based Resource Management for Cloud Environments
Cloud Computing
8
Towards Secure and Dependable Storage Services in Cloud Computing.
Cloud Computing
9
Efficient Audit Service Outsourcing for Data Integrity in Clouds.
Cloud Computing
10
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.
Cloud Computing
11
Preserving Integrity of Data and Public Auditing for Data Storage in Cloud Computing.
Cloud Computing
12
Secure Overlay Cloud Storage with Access Control and Assured Deletion
Cloud Computing
13
Automatic Protocol Blocker for Privacy Preserving
Cloud Computing
14
Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
Cloud Computing
15
Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
Cloud Computing
16
Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
Cloud Computing
17
Direct and Indirect Discrimination Prevention Methods
DataMining
18
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
DataMining
19
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
DataMining
20
Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection.
DataMining
21
Enabling cross-site interactions in social networks
DataMining
22
DDD: A New Ensemble Approach for Dealing with Concept Drift
DataMining
23
Creating Evolving User Behavior Profiles Automatically
DataMining
24
Toward Private Joins on Outsourced Data
DataMining
25
Resilient Identity Crime Detection
DataMining
26
Credibility Ranking of Tweets during High Impact Events
DataMining
27
How do Facebookers use Friendlists
DataMining
28
Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
DataMining
29
Enabling Multilevel Trust in Privacy Preserving Data Mining
DataMining
30
Anomaly Detection for Discrete Sequences:A Survey
DataMining
31
Slicing A New Approach to Privacy Preserving Data Publishing
DataMining
32
Efficient Extended Boolean Retrieval.
DataMining
33
Ranking Model Adaptation for Domain-Specific Search
DataMining
34
Advance Mining of Temporal High Utility Itemset.
DataMining
35
Organizing User Search Histories
DataMining
36
Multiparty Access Control for Online Social Networks Model and Mechanisms
DataMining
37
Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
DataMining
38
Efficient Similarity Search over Encrypted Data 
DataMining
39
Statistical Entity Extraction from Web. 
DataMining
40
Efficient Computation of Range Aggregates against Uncertain Location Based Queries
DataMining
41 A Framework for Personal Mobile Commerce Pattern Mining and Prediction.
DataMining
42 On the Spectral Characterization and Scalable Mining of Network Communities
DataMining
43 Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
DataMining
44 Effective Pattern Discovery for Text Mining
DataMining
45 Efficient Anonymous Message Submission.
DataMining
46 Fast and accurate annotation of short texts with Wikipedia pages.
DataMining
47 Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines.
DataMining
48 Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
DataMining
49 Scalable Learning of Collective Behavior.
DataMining
50 Outsourced Similarity Search on Metric Data Assets
DataMining
51 Bridging Social and Data Networks.
DataMining
52 An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks.
Wireless Communication
53 Cut Detection in Wireless Sensor Networks.
Wireless Communication
54 PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems.
Wireless Communication
55 Topology Control in Mobile Ad Hoc Networks with Cooperative Communications.
Wireless Communication
56 AMPLE An Adaptive Traffic Engineering System Based on Virtual Routing Topologies.
Wireless Communication
57 Cooperative Data Dissemination via Roadside WLANs.
Wireless Communication
58 The Devils Behind Web Application Vulnerabilities
Secure Computing
59 Detecting Anomalous Insiders in Collaborative Information Systems
Secure Computing
60 Data-Provenance Verification For Secure Hosts
Secure Computing
61 pCloud: A Distributed System for Practical PIR
Secure Computing
62 Privacy-preserving Enforcement of Spatially Aware RBAC
Secure Computing
63 SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
Secure Computing
64 Remote Attestation with Domain-Based Integrity Model and Policy Analysis
Secure Computing
65 Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
Secure Computing
66 Risk-Aware Mitigation for MANET Routing Attacks.
Secure Computing
67 Packet-Hiding Methods for Preventing Selective Jamming Attacks.
Secure Computing
68 Online Modeling of Proactive Moderation System for Auction Fraud Detection .
Secure Computing
69 DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
Secure Computing
70 Ensuring Distributed Accountability for Data Sharing in the Cloud.
Secure Computing
71 FADE: Secure Overlay Cloud Storage with File Assured Deletion.
Secure Computing
72 Learn to Personalized Image Search from the Photo Sharing Websites.
Multimedia
73 Trust modeling in social tagging of multimedia content.
Multimedia
74 Privacy- and Integrity-Preserving Range Queries in Sensor Networks.
Multimedia
75 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.
Networking
76 Auditing for Network Coding Storage
Networking
77 Independent Directed Acyclic Graphs for Resilient Multipath Routing.
Networking
78 An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System.
Networking
79 Game-Theoretic Pricing for Video Streaming in Mobile Networks.
Networking
80 Packet Loss Control Using Tokens at the Network Edge.
Networking
81 Security Architecture for Cloud Networking
Networking
82 Policy-by-Example for Online Social Networks.
Networking
83 Exploiting Jamming-Caused Neighbor Changes for Jammer Localization
Networking
84 Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage .
Networking
85 A Novel Video Stegonography based on Non Uniform Rectangular Partition
Image Processing
86 Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
Image Processing
87 Defenses Against Large Scale Online Password Guessing Attacks by using Persuasive click Points
Image Processing
88 Exploring The Design Space Of Social Network-Based Sybil Defenses
Image Processing
89 Learn to Personalized Image Search from the Photo Sharing  Websites
Image Processing
90 Robust Face-Name Graph Matching for Movie Character Identify
Image Processing
91 Design and Implementation of TARF
Sensor Networks
92 The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
Sensor Networks
93 Privacy- and Integrity-Preserving Range Queries in Sensor Networks
Sensor Networks
94 Energy Efficient Routing Mechanism in Wireless Sensor Network
Sensor Networks
95 Capacity of Data Collection in Arbitrary Wireless Sensor Networks
Parallel and Distributor System
96 Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
Parallel and Distributor System
97 A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
Parallel and Distributor System
98 SPOC A Secure and Privacy-preserving Opportunistic Computing
Parallel and Distributor System
99 Balancing the Tradeoffs between Query Delay
Parallel and Distributor System
100 A secure intrusion detection system against DDOS
Parallel and Distributor System
101 TAM A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
Adhoc Networks
102 Throughput and Energy Efficiency in Wireless Ad Hoc Networks with Gaussian Channels
Adhoc Networks
103 BibPro: A Citation Parser Based on Sequence Alignment Techniques
Adhoc Networks
104 Privacy Preserving Cloud Data Access With Multi-Authorities
Adhoc Networks
105 DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
Adhoc Networks
106 Movie Rating and Review Summarization in Mobile Environment
Adhoc Networks
107 A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication Networking
108 Answering General Time-Sensitive Queries Networking
109 Decentralized Probabilistic Text Clustering Networking
110 Discovering Informative Knowledge in Complex Datas Networking
111 Intent Search Networking
112 Separable Reversible Data Hiding in Encrypted Image Networking
113 User-aware Image Tag Refinement Image Processing
114 Fast Release Capture Sampling in large scale in sensor networks Image Processing
115 J2ee Online Video retriving system design and implementation Image Processing
116 Latency equalization as a new network service primitive Networking
117 Automated security test generation with formal threat models Networking
118 A Refined RABC model for cloud computing Networking
119 Altered Fingerprints Analysis and Detection Networking
120 Efficient Data Mining for XML Queries Answering Support Networking
121 Generative Models for Item Adoptions Networking
122 Hop-by-Hop Routing in Wireless Mesh Networking
123

Steganography – Bit Plane Complexity Segmentation (BPCS) Technique

Networking
124 Access control for online social networks third party application Networking
125 Assessing the Veracity of Identity Assertions via OSNs Networking
126 On Privacy of Encrypted Speech Communication Networking
127 ROAuth Recommendation Based Open Authorization Networking
128 BloomCast Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks Networking
129 Improving Color Constancy by Photometric Edge Weighting Networking
130 A NOVEL ANTI PHISHING FRAMEWORK Networking