ABOUT JAVA PROJECT
IEEE Project Centre, a hub of technological exploration, where we proudly present our curated selection of 2015-2016 Java projects. As a pioneer in project-based education, we extend an enthusiastic invitation to students and professionals to immerse themselves in the dynamic world of Java programming within the 2015-2016 timeframe. Our projects are meticulously designed to provide more than theoretical knowledge; they offer a hands-on platform for learning and practical application.
Whether you’re a budding developer or an experienced programmer, our 2015-2016 Java projects offer a unique opportunity to refine your skills, learn industry best practices, and create impactful solutions. Collaborate with our team of experts and industry professionals to unlock the full potential of Java programming. At IEEE Project Centre, we’re dedicated to delivering a transformative learning experience through our Java projects. Join us in exploring the possibilities of Java in the context of 2015-2016, and unlock your potential in the ever-evolving world of programming innovation.
Java Platform, Enterprise Edition or Java Is a Broadly Utilized Figuring Stage for Advancement and Organization of Big Business Programming (System And Web Services). IEEE Provides 2015 2016 Java IEEE Projects Was Once in The Past Known as Java 2 Platform, Enterprise Edition or J2EE. The Stage Utilizes the Protest Arranged Java Programming Dialect. It is a Piece of the Java Programming Stage Family. Java EE Expands the Java Platform, Standard Edition (Java SE),Providing an API For Protest Social Mapping, Disseminated and Multitier Structures, And Web Administrations.
Extent With Respect To Measured Parts Running On An Application Server. Java Project Centers in Chennai The Stage Underscores Tradition Over Setup and Comments for Arrangement. Alternatively, XML can be Utilized To Abrogate Explanations Or To Digress From The Stage Defaults.
IEEE JAVA PROJECT LIST 2015-2016
SNO |
Projects List |
1 |
Identity Based Encryption with Outsourced Revocation in Cloud Computing |
2 |
Secure Distributed Deduplication Systems with Improved Reliability |
3 |
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems |
4 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
5 |
Secure Auditing and Deduplicating Data in Cloud |
7 |
User Anonymous Authentication Scheme for Decentralized Access Control in Clouds |
8 |
Cost Effective Authentic and Anonymous Data Sharing with Forward Security |
9 |
Audit Free Cloud Storage via deniable Attribute based Encryption |
10 |
Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud |
11 |
CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability |
12 |
Malware Propagation in Large Scale Networks |
13 |
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
14 |
A Cocktail Approach for Travel Package Recommendation |
15 |
Bridging the Vocabulary Gap between Health Seekers and Healthcare Knowledge |
16 |
Context-Based Diversification for Keyword Queries over XML Data |
17 |
A Computational Dynamic Trust Model for User Authorization |
18 |
m-Privacy for Collaborative Data Publishing |
19 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks |
20 |
A Distributed Three-Hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks |
21 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
22 |
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
23 |
Friendbook: A Semantic-based Friend Recommendation System for Social Networks |
24 |
A Case Based Recommendation Approach for Market Basket Data |
25 |
Secure and dynamic multi keyword ranked search over encrypted data |
26 |
A Proximity-Aware Interest-Clustered P2P File Sharing System |
27 |
A Hybrid Cloud Approach for Secure Authorized Deduplication |
28 |
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems |
29 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
30 |
A Social Compute Cloud Allocating and Sharing Infrastructure Resources via Social Networks |
31 |
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud |
CLOUD COMPUTING PROJECTS
1 |
Identity Based Encryption with Outsourced Revocation in Cloud Computing |
2 |
Secure Distributed Deduplication Systems with Improved Reliability |
3 |
A Scalable and Reliable Matching Service for Content-Based PublishSubscribe Systems |
4 |
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing |
5 |
Secure Auditing and Deduplicating Data in Cloud |
6 |
User Anonymous Authentication Scheme for Decentralized Access Control in Clouds |
7 |
Cost Effective Authentic and Anonymous Data Sharing with Forward Security |
8 |
Audit Free Cloud Storage via deniable Attribute based Encryption |
9 |
Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform |
10 |
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing |
11 |
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage |
12 |
Deleting Secret Data with Public Verifiability |
DATA MINING
1 |
Malware Propagation in Large Scale Networks |
2 |
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection |
3 |
Context-Based Diversification for Keyword Queries over XML Data |
4 |
Towards Effective Bug Triage with Software Data Reduction Techniques |
5 |
Best Keyword Cover Search |
6 |
Data Mining Based Crime Investigation Systems Taxonomy and Relevance |
7 |
Discovery of Ranking Fraud for Mobile Apps |
8 |
Efficient heart disease prediction system using decision tree |
9 |
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word |
10 |
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites |
11 |
Scalable Feature Selection in High-Dimensional Data Based on GRASP |
12 |
A Local Mining and Global Learning Approach for Bridging the Vocabulary Gap |
13 |
Filtering Mechanism for Unwanted Messages on OSN User Wall Using CBMF |
14 |
Smart Crawler A Two stage Crawler for Efficiently Harvesting Deep Web Interfaces |
15 |
EMR A Scalable Graph based Ranking Model for Content based Image Retrieval |
16 |
Progressive Duplicate Detection |
17 |
On Summarization and Timeline Generation for Evolutionary Tweet Streams |
18 |
Route-Saver Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services |
19 |
Structured Learning from Heterogeneous Behavior for Social Identity Linkage |
20 |
Sparsity Learning Formulations for Mining Time-Varying Data |
21 |
Anonymizing Collections of Tree-Structured Data |
22 |
Rule-Based Method for Entity Resolution |
23 |
Security Evaluation of Pattern Classifiers under Attack |
24 |
Real-Time Detection of Traffic From Twitter Stream Analysis |
25 |
FOCS Fast Overlapped Community Search |
26 |
Tracking Temporal Community Strength in Dynamic Networks |
NETWORKING
1 |
Cloud cyber attack against Social Network |
2 |
Energy Efficient Fault Tolerant Data Storage And Processing In Mobile Cloud |
3 |
Detecting Malicious Facebook Applications |
4 |
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
DEPENDABLE AND SECURE COMPUTING
1 |
Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers |
2 |
A Computational Dynamic Trust Model for User Authorization |
3 |
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks |
4 |
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks |
5 |
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted |
6 |
Continuous and Transparent User Identity Verification for Secure Internet |
7 |
My Privacy My Decision Control of Photo Sharing on Online Social Networks |
8 |
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks |
MOBILE COMPUTING
1 |
User-Defined Privacy Grid System for Continuous Location-Based Services |
2 |
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks |
3 |
Friendbook A Semantic-based Friend Recommendation System for Social Networks |
IMAGE PROCESSING
1 |
An Attribute-Assisted Reranking Model for Web Image Search |
2 |
Learning to Rank Image Tags With Limited Training Examples |
3 |
Friendbook A Semantic-based Friend Recommendation System for Social Networks |
INFORMATION FORENSICS AND SECURITY
1 |
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption |
2 |
Passive IP Traceback Disclosing the Locations of IP Spoofers from Path Backscatter |
3 |
Key Updating for Leakage Resiliency with Application to AES Modes of Operation |
4 |
Software Puzzle A Countermeasure to Resource-Inflated Denial-of-Service Attacks |
5 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
6 |
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations |
7 |
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integration |
IMAGE PROCESSING
1 |
An Attribute-Assisted Reranking Model for Web Image Search |
2 |
Learning to Rank Image Tags With Limited Training Examples |
3 |
Friendbook A Semantic-based Friend Recommendation System for Social Networks |
PARALLEL & DISTRIBUTED SYSTEMS
1 |
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud |
2 |
CloudArmor Supporting Reputation-based Trust Management for Cloud Services |
3 |
Shared Authority Based Privacy preserving Authentication Protocol in Cloud Computing |
4 |
Parallel processing of dynamic continuous queries over streaming data flows |
5 |
Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds |
6 |
A Hybrid Cloud Approach for Secure Authorized Deduplication |
7 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
8 |
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud |
SOFTWARE APPLICATION
1 |
Towards Secure Cryptographic Software Implementation Against Side Channel Power |
SERVICES COMPUTING
1 |
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
2 |
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System |
INTELLIGENT SYSTEMS
c