Get Adobe Flash player

IEEE java Final Year Projects

email: modainnovations@gmail.com

 

For Detail Synopsis/BasePaper mailus :modainnovations@gmail.com

Download New JAVA IEEE-2017-18 Project list: Download

Download New BIGDATA IEEE-2017-18 Project list: Download

Sl.No
IEEE 2017-18 JAVA Project Name
Domain
1
MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
Cloud Computing
2
SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
Cloud Computing
3
MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
Cloud Computing
4
Understanding the Performance and Potential of Cloud Computing for Scientific Applications
Cloud Computing
5
 Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
Cloud Computing
6
Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
Cloud Computing
7
 Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
Cloud Computing
8
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
Cloud Computing
9
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Cloud Computing
10
OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
Cloud Computing
11
Enabling Cloud Storage Auditing with Key-Exposure Resistance
Cloud Computing
12
CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
Cloud Computing
13
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
Cloud Computing
14
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
Cloud Computing
15
CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
Cloud Computing
16
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
Cloud Computing
17
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
Cloud Computing
18
 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Cloud Computing
19
 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Cloud Computing
20
Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
Cloud Computing
21
Secure Auditing and Deduplicating Data in Cloud
Cloud Computing
22
 Identity-based Encryption with Outsourced Revocation in Cloud Computing
Cloud Computing
23
CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
DataMining
24
Structured Learning from Heterogeneous Behavior for Social Identity Linkage
DataMining
25
Making Digital Artifacts on the Web Verifiable and Reliable
DataMining
26
Anonymizing Collections of Tree-Structured Data
DataMining
27
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DataMining
28
FOCS: Fast Overlapped Community Search
DataMining
29
Sparsity Learning Formulations for Mining Time-Varying Data
DataMining
30
The Impact of View Histories on Edit Recommendations
DataMining
31
Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
DataMining
32
Discovery of Ranking Fraud for Mobile Apps
DataMining
33
Towards Effective Bug Triage with Software Data Reduction Techniques
DataMining
34
Subgraph Matching with Set Similarity in a Large Graph Database
DataMining
35
FRAppE: Detecting Malicious Facebook Applications
Networking
36
The Impact of View Histories on Edit Recommendations
Software Engineering
37
YouTube Video Promotion by Cross-network
Image Processing
38
Semantic-Improved Color Imaging Applications: It Is All About Context
Image Processing
39
Geolocalized Modeling for Dish Recognition
Image Processing
40
Learning to Rank Image Tags with Limited Training Examples
Image Processing
41
Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
Image Processing
42
Multiview Alignment Hashing for Efficient Image Image Processing
43
Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
Mobile Computing
44
Tracking Temporal Community Strength in Dynamic Networks
Mobile Computing
45
Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
Mobile Computing
46
Towards Information Diffusion in Mobile Social Networks
Mobile Computing
47
User-Defined Privacy Grid System for Continuous Location-Based Services
Mobile Computing
48
 Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
Parallel and Distributor System
49
Dispersing Instant Social Video Service Across Multiple Clouds
Parallel and Distributor System
50
Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
Parallel and Distributor System
51
 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
Parallel and Distributor System
52
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
Parallel and Distributor System
53
A Computational Dynamic Trust Model for User Authorization
Parallel and Distributor System
54
Secure Distributed Deduplication Systems with Improved Reliability
Parallel and Distributor System
55
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
Parallel and Distributor System
56
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
Parallel and Distributor System
57
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Secure Computing
58
 Discovering Latent Semantics in Web Documents using Fuzzy Clustering
Secure Computing
59
On the Security of data access control for multiauthority cloud storage system
Secure Computing
60
Trust-based Service Management for Social Internet of Things Systems
Secure Computing
61
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
Secure Computing
62
Formalization and Verification of Group Behavior Interactions
Secure Computing
63
Group Key Agreement with Local Connectivity
Secure Computing
64
Data Lineage in Malicious Environments
Secure Computing
65
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Secure Computing
66
 Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
Secure Computing
67
Enabling Cloud Storage Auditing with Key-Exposure Resistance
Secure Computing
68
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
Secure Computing
69
 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
Secure Computing
70
 T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
Secure Computing
71
SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Service Computing
72
Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Systems, Man, And Cybernetics Systems