ABOUT JAVA PROJECT
Java Platform, Enterprise Edition or Java Is a Broadly Utilized Figuring Stage for Advancement and Organization of Big Business Programming (System And Web Services). IEEE Provides 2016 2017 Java IEEE Projects Was Once in the Past Known as Java 2 Platform, Enterprise Edition or J2EE. The Stage Utilizes the Protest Arranged Java Programming Dialect. It is a Piece of the Java Programming Stage Family. Java EE Expands The Java Platform, Standard Edition (Java SE), Providing an API for Protest Social Mapping, Disseminated and Multitier Structures, and Web Administrations.
The Stage Consolidates a Plan Construct to a Great Extent With Respect to Measured Parts Running on an Application Server. Java Project Centers in Chennai the Stage Underscores Tradition over Setup and Comments For Arrangement. Alternatively, XML can Be Utilized to Abrogate Explanations or to Digress from the Stage Defaults.
Apparatuses and Web Servers Apparatuses are Net Beans and Eclipse. At That Point Web Servers, for Example, Tomcat and Glass Fish and My-SQL 5.5 Is Utilized as Backend for Java.
Whether you’re an aspiring programmer or an experienced developer, our 2016-2017 Java projects offer a unique opportunity to refine your skills, learn industry best practices, and create impactful solutions. Collaborate with our team of experts and industry professionals to unlock the full potential of Java programming. At IEEE Project Centre, we are dedicated to providing a transformative learning experience through our Java projects. Join us in exploring the possibilities of Java in the context of 2016-2017, and unlock your potential in the ever-evolving world of programming innovation.
IEEE JAVA PROJECT LIST 2016-2017
SNO | Projects List |
1 | An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
2 | Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
3 | Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
4 | Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
5 | Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
6 | Hidden Cipher text Policy Attribute Based Encryption under Standard Assumptions |
7 | Fine-grained Two-factor Access Control for Web-based Cloud Computing Services |
8 | Profiling Online Social Behaviors for Compromised Account Detection |
9 | Cyberbullying Detection based on Semantic-Enhanced Marginalized DE noising Auto-Encoder |
10 | Detection of Super points Using a Vector Bloom Filter |
11 | Server-Aided Public Key Encryption with Keyword Search |
CLOUD COMPUTING PROJECTS
1 | Secure Optimization Computation Outsourcing in Cloud Computing A Case Study of Linear Programming |
2 | ID2S Password Authenticated Key Exchange Protocols |
3 | Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
4 | Secure Data Sharing in Cloud Computing Using Revocable Storage Identity Based Encryption |
5 | Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts |
6 | DeyPoS Deduplicatable Dynamic Proof of Storage for Multi User Environments |
7 | Secure Auditing and DE duplicating Data in Cloud |
8 | Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
9 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
PARALLEL AND DISTRIBUTED SYSTEMS PROJECTS
1 | Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
2 | CloudArmor Supporting Reputation based Trust Management for Cloud Services |
3 | An Efficient Privacy Preserving Ranked Keyword Search Method |
4 | Protecting Your Right Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
5 | Circuit Cipher text-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
6 | A Secure Anti Collusion Data Sharing Scheme for Dynamic Groups in Cloud |
7 | A Secure and Dynamic Multi keyword Ranked search scheme over Encrypted Cloud Data |
8 | Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
9 | TMACS A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
DATA MINING PROJECTS
1 | Booster in High Dimensional Data Classification |
2 | Relevance Feedback Algorithms Inspired By Quantum Detection |
3 | Top k Dominating Queries on Incomplete Data |
4 | Cross Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
5 | Crowdsourcing for Top-K Query Processing over Uncertain Data |
6 | Understanding Short Texts through Semantic Enrichment and Hashing |
7 | Sentiment Embeddings with Applications to Sentiment Analysis |
8 | A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
9 | RSkNN kNN Search on Road Networks by Incorporating Social Influence |
9 | RSkNN kNN Search on Road Networks by Incorporating Social Influence |
10 | A Novel Recommendation Model Regularized with User Trust and Item Ratings |
11 | TopicSketch Real-Time Bursty Topic Detection from Twitter |
12 | Top-Down XML Keyword Query Processing |
13 | Quantifying Political Leaning from Tweets, Re tweets, and Re tweeters |
14 | Inverted Linear Quadtree Efficient Top K Spatial Keyword Search |
15 | Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy |
16 | Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
17 | T-Closeness through micro aggregation Strict privacy with enhanced utility preservation |
18 | Connecting Social Media to Ecommerce Cold Start Product Recommendation |
19 | Efficient Cache-Supported Path Planning on Roads |
20 | Efficiently Estimating Statistics of Points of Interests on Maps |
21 | Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
22 | Mitigating Cross Site Scripting Attacks with a Content Security Policy |
23 | Online Multi Model Distance Metric Learning With Application to Image Retrieval |
24 | Personalized Health Care Cloud Services For Disease Risk Assessment |
24 | Resolving Multi-Party Privacy Conflicts in Social Media |
25 | Tell Me What You Eat, and I Will Tell You Where You Come From A Data Science Approach for Global Recipe Data on the Web |
SECURE COMPUTING PROJECTS
1 | FRoDO Fraud Resilient Device for Off-Line Micro-Payments |
2 | Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data |
3 | An enhanced system to identify mischievous social malwares on Facebook applications |
NETWORKING PROJECTS
1 | STAMP Enabling Privacy Preserving Location Proofs for Mobile Users |
2 | Detecting Malicious Facebook Applications |
3 | Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks |
4 | On Denial of Service Attacks in Software Defined Networks |
5 | Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks |
6 | Relay Selection Analysis for an Opportunistic Two-hop Multi-user System in a Poisson Field of Nodes |
FUZZY SYSTEMS
1 | Answering Approximate Queries over XML Data |
IMAGE PROCESSING
1 | Learning of Multi model Representations With Random Walks on the Click Graph |
2 | Hiding The Text And Image Message Of Variable Size Using Encryption And Compression Algorithms In Video Steganography |
DATA ANALYSIS AND NETWORKING
1 | Analysis of customer churn prediction in telecom industry using decision trees and logistic regression |
INTELLIGNET SYSTEM
1 | Trust Agent-Based Behavior Induction in Social Networks |
MOBILE COMPUTING
1 | Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
2 | Detecting Mobile Malicious Webpages in Real Time |
3 | Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach |
4 | Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
SERVICES COMPUTING
1 | CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
2 | KSF-OABE Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage |
3 | Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation |
4 | Privacy-Preserving Location Sharing Services for Social Networks |
5 | SecRBAC Secure data in the Clouds |
CYBERNETICS
1 | TTSA An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds |
BIG DATA
1 | Personalized Travel Sequence Recommendation on Multi-Source Big Social Media |
MULTIMEDIA PROJECTS
1 | Social Friend Recommendation Based on Multiple Network Correlation |
SOFTWARE ENGINEERING PROJECTS
1 | Mapping Bug Reports to Relevant Files A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation |
INTERNET OF THINGS
1 | EPLQ Efficient Privacy-Preserving Location Based Query Over Outsourced Encrypted Data |