2018-2019 IEEE Java Projects | 2018 2019 IEEE Java Project centers in Chennai

IEEE Java Projects 2018 - 2019

IEEE Java Projects 2018 - 2019


Java is that the object familiarized, nearly like c++ high-stage programing language and design impartial evolved by using sun microsystems. java became at first known as oak. object familiarized this means that the potential to make use of code. java 2018 2019 ieee initiatives secondly, it is platform freelance i.e. we do not need to be compelled to develop separate applications for numerous systems. it's achievable to increase one software which may run on more than one platforms like windows, unix, and macintosh structures. java become designed for hand-held devices and set-top containers. ascii text report (files with a .java extension) of the java task projects centers in chennai software is regenerate to bytecode (files with a .magnificence extension) by using the java compiler that successively is regenerate to code by way of java interpreter.java interpreters and runtime environments, called java virtual machines (vms). bytecode also may be regenerate without delay into machine language instructions through a just-in-time compiler (jit).


1.A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

2.A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

3.An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

4.An Efficient Privacy-Preserving Ranked Keyword Search Method

5.CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

6.Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

7.CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services

8.Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

9.Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

10.DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

11.Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

12.Dynamic and Public Auditing with Fair Arbitration for Cloud Data

13.Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

14.Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

15.Geometric Range Search on Encrypted Spatial Data

16.Identity-Based Encryption with Cloud Revocation Authority and Its Applications

17.Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

18.Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

19.Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

20.Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

21.Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

22.TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage


1.A Novel Recommendation Model Regularized with User Trust and Item Ratings

2.Adaptive Processing for Distributed Skyline Queries over Uncertain Data

3.Automatically Mining Facets for Queries from Their Search Results

4.Booster in High Dimensional Data Classification

5.Building an intrusion detection system using a filter-based feature selection algorithm

6.Cluster-Driven Navigation of the Query Space

7.Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information

8.Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings

9.Crowdsourcing for Top-K Query Processing over Uncertain Data

10.Domain-Sensitive Recommendation with User-Item Subgroup Analysis

11.Efficient Algorithms for Mining Top-K High Utility Itemsets

12.Efficient Cache-Supported Path Planning on Roads

13.Incremental Semi-Supervised Clustering Ensemble for High Dimensional Data Clustering

14.kNNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering

15.Location Aware Keyword Query Suggestion Based on Document Proximity

16.Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data

17.Pattern Based Sequence Classification

18.Quantifying Political Leaning from Tweets, Retweets, and Retweeters

19.Relevance Feedback Algorithms Inspired By Quantum Detection

20.Robust Ensemble Clustering Using Probability Trajectories

21.Semantic-Aware Blocking for Entity Resolution

22.Sentiment Embeddings with Applications to Sentiment Analysis

23.Top-Down XML Keyword Query Processing

24.TopicSketch: Real-time Bursty Topic Detection from Twitter

25.Top-k Dominating Queries on Incomplete Data

26.Understanding Short Texts through Semantic Enrichment and Hashing


1.A Stable Approach for Routing Queries in Unstructured P2P Networks

2.iPath: Path Inference in Wireless Sensor Networks

3.Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

4.Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

5.STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users


1. Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

2. EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

3. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach


1. A Hop-by-Hop Routing Mechanism for Green Internet

2. Continuous Answering Holistic Queries over Sensor Networks

3. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

4. The Server Provisioning Problem for Continuous Distributed Interactive Applications


1. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

2. Data Lineage in Malicious Environments

3. Detecting Malicious Facebook Applications

4. FRODO: Fraud Resilient Device for Off-Line Micro-Payments


1. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

2. Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data

3. Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms

4. Profiling Online Social Behaviors for Compromised Account Detection


1. A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks

2. Learning of Multimodal Representations with Random Walks on the Click Graph

3. inline Multi-Modal Distance Metric Learning with Application to Image Retrieval


1. Social Friend Recommendation Based on Multiple Network Correlation

2. User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors


1. Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation

2. Metamorphic Testing for Software Quality Assessment: A Study of Search Engines

3. SITAR: GUI Test Script Repair


1.Answering Approximate Queries over XML Data

Contact Us