Get Adobe Flash player

IEEE java Final Year Projects

email: modainnovations@gmail.com

For Detail Synopsis/BasePaper mailus :modainnovations@gmail.com

IEEE 2017-18 java project List: Download

IEEE 2017-18 bigdata project List: Download

Sl.No
IEEE JAVA Project Name
Domain
1
Privacy-Preserving Public Auditing for Secure Cloud Storage.
Cloud Computing
2
CloudMoV: Cloud-based Mobile Social TV
Cloud Computing
3
Winds of Change From Vendor Lock-In to the Meta Cloud.
Cloud Computing
4
Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Cloud Computing
5
A Load Balancing Model Based on Cloud Partitioning for the Public Cloud.
Cloud Computing
6
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
Cloud Computing
7
Dynamic Resource allocation using virtual machines for cloud computing environment
Cloud Computing
8
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Cloud Computing
9
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Cloud Computing
10
Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption.
Cloud Computing
11
Harnessing the Cloud for Securely Outsourcing Large
Cloud Computing
12
Prediction-Based Cloud Bandwidth and Cost Reduction System
Cloud Computing
13
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cloud Computing
14
Cloud computing for mobile users can offloading compution save energy.
Cloud Computing
15
Collaboration in Multicloud Computing Environments Framework and Security Issues
Cloud Computing
16
AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
Cloud Computing
17
Adaptive Mobile Cloud Computing to Enable Rich Mobile Multimedia Applications
Cloud Computing
18
A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
Cloud Computing
19
A Hierarchical Approach for the Resource Management of Very Large Cloud Platforms
Cloud Computing
20
Cloud-Based Networked Visual Servo Control
Cloud Computing
21
Simple and Effective Dynamic Provisioning for Power-Proportional Data Centers
Cloud Computing
22
On Data Staging Algorithms for Shared Data Accesses in Clouds
Cloud Computing
23
A survey of mobile cloud computing for rich media applications
Cloud Computing
24
Anchor: A Versatile and Efficient Framework for Resource Management in the Cloud
Cloud Computing
25
Visualization framework for inter-domain access control policy integration
Cloud Computing
26
Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services
Cloud Computing
27
Security and Privacy-Enhancing Multicloud Architectures
Cloud Computing
28
On Data Staging Algorithms for Shared Data Accesses in Clouds
Cloud Computing
29
Complex and Concurrent Negotiations for Multiple Interrelated e-Markets
Cloud Computing
30
Exploring blind online scheduling for mobile cloud multimedia services
Cloud Computing
31
Intelligent server management framework over extensible messaging and presence protocol
Cloud Computing
32
TST: Threshold based similarity transitivity method in collaborative filtering with cloud computing
Cloud Computing
33
Cloud computing-based forensic analysis for collaborative network security management system
Cloud Computing
34
Challenges on wireless heterogeneous networks for mobile cloud computing
Cloud Computing
35
Cloud-assisted adaptive video streaming and social-aware video prefetching for mobile users
Cloud Computing
36
Load Rebalancing for Distributed File Systems in Clouds
Cloud Computing
37
A Privacy Leakage Upper Bound constraint Based Approach for Cost Effective
Cloud Computing
38
On the Optimal Allocation of Virtual Resources in Cloud Computing Networks
Cloud Computing
39
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
Cloud Computing
40
Optimal Multi server Configuration for Profit Maximization in Cloud Computing
CloudComputing
41
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
DataMining
42

Access Policy Consolidation for Event Processing Systems

DataMining
43
Facilitating Document Annotation Using Content And Querying Value
DataMining
44
m-Privacy for Collaborative Data Publishing
DataMining
45
Protecting Sensitive Labels in Social Network Data Anonymization
DataMining
46
Tweet Analysis for Real-Time Event Detection and Earthquake
DataMining
47

Robust Module-based Data Management

DataMining
48
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
DataMining
49
Spatial Approximate String Search
DataMining
50
Crowdsourcing Predictors of Behavioral Outcomes
DataMining
51
Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
DataMining
52
Relationships between Diversity of Classification Ensembles and Single-Class Performance Measures
DataMining
53
Optimal Route Queries with Arbitrary Order Constraints
DataMining
54
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks
DataMining
55
AML Efficient Approximate Membership Localization within a Web-Based Join Framework
DataMining
56
Maximum Likelihood Estimation from Uncertain Data in the Belief Function Framework
DataMining
57
Secure Mining of Association Rules in Horizontally Distributed Databases
DataMining
58
TrustedDB: A Trusted Hardware based Database with Privacy and Data Confidentiality
DataMining
59
Mining User Queries with Markov Chains: Application to Online Image Retrieval
DataMining
60
Dynamic Personalized Recommendation on Sparse Data
DataMining
61
A New Algorithm for Inferring User Search Goals with Feedback Sessions
DataMining
62
Ranking on Data Manifold with Sink Points
DataMining
63
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments
DataMining
64
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
DataMining
65
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
DataMining
66
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
DataMining
67
Evaluating Data Reliability An Evidential Answer with Application to a Web-Enabled Data Warehouse
DataMining
68
Distributed Web Systems Performance Forecasting Using Turning Bands Method
DataMining
69
Optimizing Cloud Resources for Delivering IPTV Services through Virtualization.
Networking
70
Participatory Privacy Enabling Privacy in Participatory Sensing.
Networking
71
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
Networking
72
Delay-Based Network Utility Maximization
Networking
73
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
Networking
74
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream
Secure Computing
75
Super-Resolution-based Inpainting
Secure Computing
76
Spatial Approximate String Search
Secure Computing
77

Securing Class Initialization in Java-like Languages

Secure Computing
78
Privacy Preserving Data Sharing With Anonymous ID Assignment
Secure Computing
79
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Secure Computing
80

Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links

Secure Computing
81
Identity-Based Secure Distributed Data Storage Schemes
Secure Computing
82

EAACK—A Secure Intrusion-Detection System for MANETs

Secure Computing
83
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Secure Computing
84
Secure Encounter-based Mobile Social Networks Requirements Designs and Tradeoffs.
Secure Computing
85
Two tales of privacy in online social networks.
Secure Computing
86
Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
Mobile Computing
87
Vampire attacks:Draining life from wireless ad-hoc sensor networks.
Mobile Computing
88
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Mobile Computing
89
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
Mobile Computing
90
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Mobile Computing
91
IP-Geolocation Mapping for Moderately Connected Internet Regions
Parallel and Distributor System
92
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Parallel and Distributor System
93
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Parallel and Distributor System
94
Optimal Client-Server Assignment for Internet Distributed Systems
Parallel and Distributor System
95
Harnessing the Cloud for Securely Outsourcing Large
Parallel and Distributor System
96
Mining Contracts for Business Events and Temporal Constraints in Service Engagements
Parallel and Distributor System
97
Non-Cooperative Location Privacy
Parallel and Distributor System
98
Detection and Localization of Multiple Spoofing Attackers in Wireless Networks
NetworkSecurity
99
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
NetworkSecurity
100
Modeling the Pair wise Key Pre distribution Scheme in the Presence of Unreliable Links
NetworkSecurity
101
Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
NetworkSecurity
102
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks
NetworkSecurity
103
Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks
NetworkSecurity
104
Identity-Based Secure Distributed Data Storage Schemes
NetworkSecurity
105
Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks.
NetworkSecurity