Você está na página 1de 12

JAVA IEEE PROJECT TITLES 2016 2017

S.No Title Domain

KNOWLEDGE AND DATA ENGINEERING


1 Bridging Music and Image via Cross-Modal Ranking Data Mining, June
Analysis 2016
2 Data Mining, July
Privacy-Preserving Outsourced Media Search 2016
3 Knowledge and Data
Engineering, June
Online Learning from Trapezoidal Data Streams 2016
4 Knowledge and Data
Engineering, June
Adapting to User Interest Drift for POI Recommendation 2016
5 Knowledge and Data
Engineering, June
Proxies for Shortest Path and Distance Queries 2016
6 Knowledge and Data

A Novel Recommendation Model Regularized with User Engineering, June


Trust and Item Ratings 2016
7 Entropy Optimized Feature-based Bag-of-Words Knowledge and Data

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
Representation for Information Retrieval Engineering, Feb 2016
8 Knowledge and Data

Inverted Linear Quadtree: Efficient Top K Spatial Keyword Engineering, May


Search 2016
9 Mining User-Aware Rare Sequential Topic Patterns in Knowledge and Data
Document Streams Engineering
10 Knowledge and Data
SEDEX: Scalable Entity Preserving Data Exchange Engineering
11 Cross-domain Sentiment Classification using Sentiment Knowledge and Data
Sensitive Embeddings Engineering
12 Connecting Social Media to E-Commerce:Cold-Start Knowledge and Data
Product Recommendation Using Microblogging Information Engineering
13 A Scalable Data Chunk Similarity based Compression Knowledge and Data
Approach for Efficient Big Sensing Data Processing on Engineering
Cloud
14 ATD Anomalous Topic Discovery in High Dimensional Knowledge and Data
Discrete Data Engineering
15 Automatic Clustering via Outward Statistical Testing on Knowledge and Data
Density Metrics Engineering
16 Conflict-Aware Event-Participant Arrangement and Its Knowledge and Data
Variant for Online Setting Engineering

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
17 Conflicts to Harmony a Framework for Resolving Conflicts Knowledge and Data
in Heterogeneous Data by Truth Discovery Engineering
18 Knowledge and Data
Contextual Operation for Recommender system Engineering
19 Correction to Inference of Regular Expressions for Text Knowledge and Data
Extraction from Examples Engineering
20 Knowledge and Data
Counting Triangles in Large Graphs by Random Sampling Engineering
21 Deep Learning of Transferable Representation for Scalable Knowledge and Data
Domain Adaptation Engineering
22 Discovering Anomalies on Mixed-Type Data using a Knowledge and Data
Generalized Student-t Based Approach Engineering
23 Discovering Team Structures in Soccer from Spatiotemporal Knowledge and Data
Data Engineering
24 Distributed Anomaly Detection using Minimum Volume Knowledge and Data
Elliptical Principal Component Analysis Engineering
25 D-Toss A Distributed Throwaway Spatial Index Structure Knowledge and Data
for Dynamic Location Data Engineering
26 Efficient Identification of Local Keyword Patterns in Knowledge and Data
Microblogging Platforms Engineering
27 Efficient Metric Indexing for Similarity Search and Knowledge and Data

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
Similarity Joins Engineering
28 Knowledge and Data
Explaining Missing Answers to Top-k SQL Queries Engineering
29 Aggregating Crowdsourced Quantitative Claims Additive Knowledge and Data
and Multiplicative Models Engineering
30 Incremental and Decremental Max-flow for Online Semi- Knowledge and Data
Supervised Learning Engineering
31 K-Subspaces Quantization for Approximate Nearest Knowledge and Data
Neighbor Search Engineering
32 Knowledge and Data
Label Distribution Learning Engineering
33 List wise Learning to Rank by Exploring Structure of Knowledge and Data
Objects Engineering
34 Knowledge and Data
MAVE Multilevel Wrapper Verification system Engineering
35 Knowledge and Data
MAVE Multilevel Wrapper Verification system Engineering
36 Microblogging Content Propagation Modeling Using Topic- Knowledge and Data
specific Behavioral Factors Engineering
37 Mining Health Examination Records A Graph-based Knowledge and Data

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
Approach Engineering
38 ML-FOREST A Multi-Label Tree Ensemble Method for Knowledge and Data
Multi-Label Classification Engineering
39 Knowledge and Data
OMASS One Memory Access Set Separation Engineering
40 Personalized Influential Topic Search via Social Network Knowledge and Data
Summarization Engineering
41 PINODMHIO Probabilistic Influence-based Location Knowledge and Data
Selection over Moving Objects Engineering
42 PRIGUARD A Semantic Approach to Detect Privacy Knowledge and Data
Violations in Online Social Networks Engineering
43 SPIRIT A Tree Kernel-based Method for Topic Person Knowledge and Data
Interaction Detection Engineering
44 Toward Optimal Feature Selection in Naive Bayes for Text Knowledge and Data
Categorization Engineering
45 Understand Short Texts by Harvesting and Analyzing Knowledge and Data
Semantic Knowledge Engineering
46 Efficient R-Tree Based Indexing Scheme for Server-Centric Knowledge and Data
Cloud Storage System Engineering

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
DEPENDABLE AND SECURE COMPUTING
47 Leveraging Data Deduplication to Improve the Performance Dependable and
of Primary Storage Systems in the Cloud Secure Computing,
June 2016
48 Enabling Fine-grained Multi-keyword Search Supporting Dependable and
Classified Sub-dictionaries over Encrypted Cloud Data Secure Computing,
June 2016
49 Towards Building Forensics Enabled Cloud Through Secure Dependable and
Logging-as-a-Service Secure Computing,
April 2016
50 Cryptanalysis of a Privacy-Preserving Aggregation Protocol Dependable and
Secure Computing,
Jan 2016
51 Achieving Flatness: Selecting the Honeywords from Existing Dependable and
User Passwords Secure Computing,
March 2016
52 Wireless Communications under Broadband Reactive Dependable and
Jamming Attacks Secure Computing,
June 2016
53 An Access Control Model for Online Social Networks Using Dependable and
User-to-User Relationships Secure Computing,

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
July 2016
54 FRoDO: Fraud Resilient Device for Off-line micro- Dependable and
payments Secure Computing,
April 2016
55 Leveraging Strategic Detection Techniques for Smart Home Dependable and
Pricing Cyber attacks Secure Computing,
April 2016
56 An Empirical Study of HTTP-based Financial Botnets Dependable and
Secure Computing,
April 2016
57 Dependable and
Data Lineage in Malicious Environments Secure Computing
58 Key Indistinguishability vs. Strong Key Indistinguishability Dependable and
for Hierarchical Key Assignment Schemes Secure Computing
Dependable and
Secure Computing

IMAGE PROCESSING
59 Con-Patch: When a Patch Meets its Context Image Processing
60 Undersampled Face Recognition via Robust Auxiliary Image Processing
Dictionary Learning
61 A DEEP SYMMETRY CONVNET FOR STROKE LESION Image Processing

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
SEGMENTATION

CLOUD COMPUTING
62 Cloud Computing,
CO2-aware Adaptation Strategies for Cloud Applications 2016
63 TMACS: A Robust and Verifiable Threshold Multi- Cloud Computing,
Authority Access Control System in Public Cloud Storage 2016
64 Designing Secure and Dependable Mobile Sensing Cloud Computing,
Mechanisms With Revenue Guarantees 2016
65 Leveraging Data Deduplication to Improve the Performance Cloud Computing,
of Primary Storage Systems in the Cloud 2016
66 Enabling Fine-grained Multi-keyword Search Supporting Cloud Computing,
Classified Sub-dictionaries over Encrypted Cloud Data 2016
67 Towards Building Forensics Enabled Cloud Through Secure Cloud Computing,
Logging-as-a-Service 2016
68 eCope: Workload-aware Elastic Customization for Power Cloud Computing,
Efficiency of High-End Servers 2016
69 On Achieving Energy Efficiency and Reducing CO2 Cloud Computing,
Footprint in Cloud Computing 2016
70 Energy-efficient virtual machines scheduling in multi-tenant Cloud Computing,

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
data centers 2016
71 ForenVisor: A Tool for Acquiring and Preserving Reliable Cloud Computing,
Data in Cloud Live Forensics 2016
72 CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Computing,
Cloud Storage via Convergent Dispersal 2016
73 Ensuring Cloud data reliability with minimum replication Cloud Computing,
by proactive replica checking 2016

INFORMATION FORENSICS & SECURITY


74 Detecting Facial Retouching Using Supervised Deep Information Forensics
Learning & Security, 2016
75 Designing Secure and Dependable Mobile Sensing Information Forensics
Mechanisms With Revenue Guarantees & Security, 2016
76 Cryptoleq: A Heterogeneous Abstract Machine for Information Forensics
Encrypted and Unencrypted Computation & Security, 2016
77 Temporal and Spatial Locality: an Abstraction for Information Forensics
Masquerade Detection & Security, 2016
78 Cryptographic Hierarchical Access Control for Dynamic Information Forensics
Structures & Security, 2016
79 A high-security EEG-based login system with RSVP stimuli Information Forensics

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
and dry electrodes & Security, 2016
80 Information Forensics
On the Fingerprinting of Software-defined Networks & Security, 2016
81 Exploiting Path Diversity for Thwarting Pollution Attacks Information Forensics
in Named Data Networking & Security, 2016
82 Discriminant Correlation Analysis: Real-Time Feature Information Forensics
Level Fusion for Multimodal Biometric Recognition & Security, 2016
83 PPM-HDA: Privacy-preserving and multifunctional health Information Forensics
data aggregation with fault tolerance & Security, 2016
84 Efficient and Anonymous Mobile User Authentication Information Forensics
Protocol Using Self-certified Public Key Cryptography for & Security, 2016
Multi-server Architectures
85 Cherry-Picking Reliable PUF Bits with Differential Information Forensics
Sequence Coding & Security, 2016
86 Scaling up Class-Specific Kernel Discriminant Analysis for Information Forensics
large-scale Face Verification & Security, 2016
87 From Clothing to Identity; Manual and Automatic Soft Information Forensics
Biometrics & Security, 2016
88 Personal Identification using Minor Knuckle Patterns from Information Forensics
Palm Dorsal Surface & Security, 2016
89 DDOA: A Dirichlet-based Detection Scheme for Information Forensics

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
Opportunistic Attacks in Smart Grid Cyber-Physical & Security, 2016
System
90 Efficient Deniably Authenticated Encryption and Its Information Forensics
Application to E-mail & Security, 2016
91 Privacy-Preserving and Regular Language Search over Information Forensics
Encrypted Cloud Data & Security, 2016
92 Information Forensics
Minutiae Extraction from Level 1 Features of Fingerprint & Security, 2016
93 A Reversible Data Hiding Scheme Based on Code Division Information Forensics
Multiplexing & Security, 2016
94 Information Forensics
An Exploration of Geographic Authentication Schemes & Security, 2016
95 On the Individual Secrecy Capacity Regions of the General, Information Forensics
Degraded and Gaussian Multi-Receiver Wiretap Broadcast & Security, 2016
Channel
96 2DCrypt: Image Scaling and Cropping in Encrypted Information Forensics
Domains & Security, 2016
97 Delay-Aware Optimization of Physical Layer Security in Information Forensics
Multi-Hop Wireless Body Area Networks & Security, 2016
98 Neural Markers of Cybersecurity: An fMRI Study of Information Forensics
Phishing, and Malware Warnings & Security, 2016

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com
99 Full Frame Encryption and Modulation Obfuscation Using Information Forensics
Channel-independent Preamble Identifier & Security, 2016
99 DW-AES: A Domain-wall Nanowire Based AES for High Information Forensics
Throughput and Energy-efficient Data Encryption in Non- & Security, 2016
volatile Memory
10 Iterative Copy-Move Forgery Detection Based on a New Information Forensics
0 Interest Point Detector & Security, 2016

VEHICULAR NETWORKS
10 An Efficient Anonymous Batch Authentication Scheme VEHICULAR
1 Based on HMAC for VANETs NETWORKS, 2016

PATTERN ANALYSIS AND MACHINE


INTELLIGNECE
10 Multi-Directional Multi-Level Dual-Cross Patterns for PAMI, 2016
2 Robust Face Recognition
10 Expanded Parts Model for Semantic Description of Humans PAMI, 2016
3 in Still Images

#227, Kutchery Road, Mylapore, Chennai 600 004

Ph: 044-24612144, +91-9884715673

Email: projects@eblisstechnologies.com, admn.bliss@gmail.com

Website: www.eblisstechnologies.com

Você também pode gostar