• +91 90322 81 883 +91 96186 03 155
  • info@acprojectsupport.in
IEEE 2016 JAVA PROJECTS LISTDownload Project List

S. No.

Code

IEEE 2016 Project Titles

Domain

Tech

Download Abstract

Download BasePaper

1

ASJ1601

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

CLOUD COMPUTING

JAVA

2

ASJ1602

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

CLOUD COMPUTING

JAVA

3

ASJ1603

An Efficient File Hierarchy Attribute-Based

Encryption Scheme in Cloud Computing

CLOUD COMPUTING

JAVA

4

ASJ1604

An Efficient Privacy-Preserving Ranked Keyword Search Method

CLOUD COMPUTING

JAVA

5

ASJ1605

CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

CLOUD COMPUTING

JAVA

6

ASJ1606

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

CLOUD COMPUTING

JAVA

7

ASJ1607

 

CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services

CLOUD COMPUTING

JAVA

8

ASJ1608

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

CLOUD COMPUTING

JAVA

9

ASJ1609

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

CLOUD COMPUTING

JAVA

10

ASJ1610

DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

CLOUD COMPUTING

JAVA

11

ASJ1611

Dual-Server Public-Key Encryption With Keyword Search for

CLOUD COMPUTING

JAVA

12

ASJ1612

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

CLOUD COMPUTING

JAVA

13

ASJ1613

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

CLOUD COMPUTING

JAVA

14

ASJ1614

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

CLOUD COMPUTING

JAVA

15

ASJ1615

Geometric Range Search on Encrypted Spatial Data

CLOUD COMPUTING

JAVA

16

ASJ1616

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

CLOUD COMPUTING

JAVA

17

ASJ1617

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

CLOUD COMPUTING

JAVA

18

ASJ1618

Protecting Your Right: Verifiable Attribute-Based

Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Parallel & Distributed Systems

JAVA

19

ASJ1619

Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

Cloud Computing

JAVA

20

ASJ1620

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

CLOUD COMPUTING

JAVA

21

ASJ1621

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

CLOUD COMPUTING

JAVA

22

ASJ1622

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

CLOUD COMPUTING

JAVA

23

ASJ1623

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

CLOUD COMPUTING

JAVA

24

ASJ1624

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

CLOUD COMPUTING

JAVA

25

ASJ1625

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

CLOUD COMPUTING

JAVA

26

ASJ1626

SecRBAC: Secure data in the Clouds

SERVICE COMPUTING

JAVA

27

ASJ1627

A Novel Recommendation Model Regularized

with User Trust and Item Ratings

 DATA MINING

JAVA

28

ASJ1628

Automatically Mining Facets for Queries from Their Search Results

DATA MINING

JAVA

29

ASJ1629

Booster in High Dimensional Data Classification

DATA MINING

JAVA

30

ASJ1630

Building an intrusion detection system using a filter-based feature selection algorithm

DATA MINING

JAVA

31

ASJ1631

Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information

DATA MINING

JAVA

32

ASJ1632

Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings

Data Mining

JAVA

33

ASJ1633

Crowdsourcing for Top-K Query Processing over Uncertain Data

DATA MINING

JAVA

34

ASJ1634

Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

DATA MINING

JAVA

35

ASJ1635

Domain-Sensitive Recommendation with User-Item Subgroup Analysis

DATA MINING

JAVA

36

ASJ1636

Efficient Algorithms for Mining Top-K High Utility Itemsets

DATA MINING

JAVA

37

ASJ1637

Efficient Cache-Supported Path Planning on Roads

DATA MINING

JAVA

38

ASJ1638

Mining User-Aware Rare Sequential Topic Patterns in Document Streams

DATA MINING

JAVA

39

ASJ1639

 

Nearest Keyword Set Search in Multi-Dimensional Datasets

DATA MINING

JAVA

40

ASJ1640

Rating Prediction based on Social Sentiment from Textual Reviews

DATA MINING

JAVA

41

ASJ1641

Location Aware Keyword Query Suggestion Based on Document Proximity

DATA MINING

JAVA

42

ASJ1642

Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs

DATA MINING

JAVA

43

ASJ1643

Quantifying Political Leaning from Tweets, Retweets, and Retweeters

DATA MINING

JAVA

44

ASJ1644

Relevance Feedback Algorithms Inspired By Quantum Detection

DATA MINING

JAVA

45

ASJ1645

Sentiment Embeddings with Applications to Sentiment Analysis

DATA MINING

JAVA

46

ASJ1646

Top-Down XML Keyword Query Processing

DATA MINING

JAVA

47

ASJ1648

Top-k Dominating Queries on Incomplete Data

DATA MINING

JAVA

48

ASJ1650

A Stable Approach for Routing Queries in Unstructured P2P Networks

NETWORKING

JAVA

49

ASJ1651

iPath: Path Inference in Wireless Sensor Networks

NETWORKING

JAVA

50

ASJ1652

Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

NETWORKING

JAVA

51

ASJ1653

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

NETWORKING

JAVA

52

ASJ1654

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

NETWORKING

JAVA

53

ASJ1655

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

MOBILE COMPUTING

JAVA

54

ASJ1656

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

MOBILE COMPUTING

JAVA

55

ASJ1657

Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach

Mobile Computing

JAVA

56

ASJ1658

Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

MOBILE COMPUTING

JAVA

57

ASJ1659

A Hop-by-Hop Routing Mechanism for Green Internet

Parallel & Distributed Systems

JAVA

58

ASJ1660

Continuous Answering Holistic Queries over Sensor Networks

Parallel & Distributed Systems

JAVA

59

ASJ1661

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

PARALLEL & DISTRIBUTED SYSTEMS

JAVA

60

ASJ1663

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

SECURE COMPUTING

JAVA

61

ASJ1664

Data Lineage in Malicious Environments

SECURE COMPUTING

JAVA

62

ASJ1665

Detecting Malicious Facebook Applications

SECURE COMPUTING

JAVA

63

ASJ1666

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

SECURE COMPUTING

JAVA

64

ASJ1667

Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata

SECURE COMPUTING

JAVA

65

ASJ1668

Resolving Multi-party Privacy Conflicts in Social Media

SECURE COMPUTING

JAVA

66

ASJ1669

Hidden Ciphertext Policy Attribute-Based

Encryption Under Standard Assumptions

SECURE COMPUTING

JAVA

67

ASJ1670

Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data

Information Forensics & Security

JAVA

68

ASJ1671

Privacy-Preserving Utility Verification of the Data

Published by Non-interactive Differentially Private Mechanisms

Information Forensics & Security

JAVA

69

ASJ1672

Profiling Online Social Behaviors for Compromised Account Detection

Information Forensics & Security

JAVA

70

ASJ1673

A Locality Sensitive Low-Rank Model for Image Tag Completion

IMAGE PROCESSING

JAVA

71

ASJ1674

A Scalable Approach for Content-Based Image Retrieval in Peer- to-Peer Networks

IMAGE PROCESSING

JAVA

72

ASJ1676

Online Multi-Modal Distance Metric Learning with Application to Image Retrieval

IMAGE PROCESSING

JAVA

73

ASJ1677

Tag Based Image Search by Social Re-ranking

IMAGE PROCESSING

JAVA

74

ASJ1680

Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation

SOFTWARE ENGINEERING

JAVA

75

ASJ1684

Malware Detection in Cloud Computing

Infrastructures

Secure Computing

JAVA

76

ASJ1685

Two-Factor Data Security Protection Mechanism

for Cloud Storage System

Cloud Computing

JAVA

77

ASJ1686

Attribute Based Data Sharing Scheme Revisited in Cloud Computing

Cloud Computing

JAVA

78

ASJ1683

Answering Approximate Queries Over XML Data

Fuzzy Systems

JAVA

79

ASJ1687

Leveraging Data Deduplication to Improve the Performance of Primary Storage Systems in the Cloud

Cloud Computing

JAVA

80

ASJ1688

Encrypted Data Management with Deduplication in Cloud Computing

Cloud Computing

JAVA

81

ASJ1689

ID2S Password-Authenticated Key Exchange Protocols

Secure Computing

JAVA

82

ASJ1690

Crawling Hidden Objects with kNN Queries

DATA MINING

JAVA

83

ASJ1691

Achieving Flatness: Selecting the Honeywords

from Existing User Passwords

Secure Computing

JAVA

84

ASJ1692

Merlin: Exploratory Analysis with Imprecise Queries

DAT MINING

JAVA

85

ASJ1693

Providing User Security Guarantees in Public

Infrastructure Clouds

Cloud Computing

JAVA

86

ASJ1694

Lifetime and Energy Hole Evolution Analysis

in Data-Gathering Wireless Sensor Networks

Industrial Informatics

JAVA

87

ASJ1695

Secure Reversible Image Data Hiding over

Encrypted Domain via Key Modulation

Video Technology

JAVA

88

ASJ1696

 

 ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks

Information Forensics

JAVA