You are on page 1of 3

IEEE 2016 PROJECTS LIST

S. Code IEEE 2016 Project Titles Domain Tech


No.
1 LSJ160 A Secure and Dynamic Multi-Keyword Ranked Search CLOUD JAVA
1 Scheme over Encrypted Cloud Data COMPUTING
2 LSJ160 A Secure Anti-Collusion Data Sharing Scheme for CLOUD JAVA
2 Dynamic Groups in the Cloud COMPUTING
3 LSJ160 An Efficient Privacy-Preserving Ranked Keyword Search CLOUD JAVA
4 Method COMPUTING
4 LSJ160 CDA Generation and Integration for Health Information CLOUD JAVA
5 Exchange Based on Cloud Computing System COMPUTING
5 LSJ160 Circuit Ciphertext-Policy Attribute-Based Hybrid CLOUD JAVA
6 Encryption with Verifiable Delegation in Cloud COMPUTING
Computing
6 LSJ160 CloudArmor: Supporting Reputation-Based Trust CLOUD JAVA
7 Management for Cloud Services COMPUTING

7 LSJ160 Conjunctive Keyword Search With Designated Tester CLOUD JAVA


9 and Timing Enabled Proxy Re-Encryption Function for COMPUTING
E-Health Clouds
8 LSJ160 Conditional Identity-Based Broadcast Proxy Re- CLOUD JAVA
8 Encryption and Its Application to Cloud Email COMPUTING
9 LSJ161 DiploCloud: Efficient and Scalable Management of RDF CLOUD JAVA
0 Data in the Cloud COMPUTING
10 LSJ161 Dual-Server Public-Key Encryption With Keyword CLOUD JAVA
1 Search for COMPUTING
11 LSJ161 Dynamic and Public Auditing with Fair Arbitration for CLOUD JAVA
2 Cloud Data COMPUTING
12 LSJ161 Enabling Cloud Storage Auditing With Verifiable CLOUD JAVA
3 Outsourcing of Key Updates COMPUTING
13 LSJ161 Fine-Grained Two-Factor Access Control for Web-Based CLOUD JAVA
4 Cloud Computing Services COMPUTING
14 LSJ1615 Geometric Range Search on Encrypted Spatial Data CLOUD JAVA
COMPUTING
15 LSJ1616 Identity-Based Encryption with Cloud Revocation CLOUD JAVA
Authority and Its Applications COMPUTING
16 LSJ1617 Identity-Based Proxy-Oriented Data Uploading and CLOUD JAVA
Remote Data Integrity Checking in Public Cloud COMPUTING
17 LSJ1620 Secure Data Sharing in Cloud Computing Using CLOUD JAVA
Revocable-Storage Identity-Based Encryption COMPUTING
18 LSJ1621 Secure Optimization Computation Outsourcing in Cloud CLOUD JAVA
Computing: A Case Study of Linear Programming COMPUTING
19 LSJ1622 TMACS: A Robust and Verifiable Threshold Multi- CLOUD JAVA
Authority Access Control System in Public Cloud Storage COMPUTING
20 LSJ1624 DeyPoS: Deduplicatable Dynamic Proof of Storage for CLOUD JAVA
Multi-User Environments COMPUTING
21 LSJ1625 Flexible and Fine-Grained Attribute-Based Data Storage CLOUD JAVA
in Cloud Computing COMPUTING

CONTACT: ARUNKUMAR (040-40274843, 9030211322)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in
IEEE 2016 PROJECTS LIST
22 LSJ1628 Automatically Mining Facets for Queries from Their DATA MINING JAVA
Search Results
23 LSJ1629 Booster in High Dimensional Data Classification DATA MINING JAVA
24 LSJ1630 Building an intrusion detection system using a filter- DATA MINING JAVA
based feature selection algorithm
25 LSJ1631 Connecting Social Media to E-Commerce: Cold-Start DATA MINING JAVA
Product Recommendation Using Microblogging
Information
26 LSJ1633 Crowdsourcing for Top-K Query Processing over DATA MINING JAVA
Uncertain Data
27 LSJ1634 Cyberbullying Detection based on Semantic-Enhanced DATA MINING JAVA
Marginalized Denoising Auto-Encoder
28 LSJ1635 Domain-Sensitive Recommendation with User-Item DATA MINING JAVA
Subgroup Analysis
29 LSJ1636 Efficient Algorithms for Mining Top-K High Utility DATA MINING JAVA
Itemsets
30 LSJ1639 Nearest Keyword Set Search in Multi-Dimensional DATA MINING JAVA
Datasets
31 LSJ1640 Rating Prediction based on Social Sentiment from DATA MINING JAVA
Textual Reviews
32 LSJ1641 Location Aware Keyword Query Suggestion Based on DATA MINING JAVA
Document Proximity
33 LSJ1642 Using Hashtag Graph-based Topic Model to Connect DATA MINING JAVA
Semantically-related Words without Co-occurrence in
Microblogs
34 LSJ1643 Quantifying Political Leaning from Tweets, Retweets, and DATA MINING JAVA
Retweeters
35 LSJ1644 Relevance Feedback Algorithms Inspired By Quantum DATA MINING JAVA
Detection
36 LSJ1645 Sentiment Embeddings with Applications to Sentiment DATA MINING JAVA
Analysis
37 LSJ1648 Top-k Dominating Queries on Incomplete Data DATA MINING JAVA
38 LSJ1650 A Stable Approach for Routing Queries in Unstructured NETWORKING JAVA
P2P Networks
39 LSJ1651 iPath: Path Inference in Wireless Sensor Networks NETWORKING JAVA
40 LSJ1652 Opportunistic Routing With Congestion Diversity in NETWORKING JAVA
Wireless Ad Hoc Networks
41 LSJ1653 Spatial Reusability-Aware Routing in Multi-Hop Wireless NETWORKING JAVA
Networks
42 LSJ1654 STAMP: Enabling Privacy-Preserving Location Proofs for NETWORKING JAVA
Mobile Users
43 LSJ1655 Energy and Memory Efficient Clone Detection in MOBILE JAVA
Wireless Sensor Networks COMPUTING
44 LSJ1656 EPLQ: Efficient Privacy-Preserving Location-Based Query MOBILE JAVA
Over Outsourced Encrypted Data COMPUTING
45 LSJ1658 Detecting Node Failures in Mobile Wireless Networks: A MOBILE JAVA
Probabilistic Approach COMPUTING

CONTACT: ARUNKUMAR (040-40274843, 9030211322)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in
IEEE 2016 PROJECTS LIST
46 LSJ1661 Dictionary Based Secure Provenance Compression for PARALLEL & JAVA
Wireless Sensor Networks DISTRIBUTED
SYSTEMS
47 LSJ1663 Contributory Broadcast Encryption with Efficient SECURE JAVA
Encryption and Short Ciphertexts COMPUTING
48 LSJ1664 Data Lineage in Malicious Environments SECURE JAVA
COMPUTING
49 LSJ1665 Detecting Malicious Facebook Applications SECURE JAVA
COMPUTING
50 LSJ1666 FRoDO: Fraud Resilient Device for Off-Line Micro- SECURE JAVA
Payments COMPUTING
51 LSJ1668 Resolving Multi-party Privacy Conflicts in Social Media SECURE JAVA
COMPUTING
52 LSJ1673 A Locality Sensitive Low-Rank Model for Image Tag IMAGE JAVA
Completion PROCESSING
53 LSJ1674 A Scalable Approach for Content-Based Image Retrieval IMAGE JAVA
in Peer- to-Peer Networks PROCESSING
54 LSJ1676 Online Multi-Modal Distance Metric Learning with IMAGE JAVA
Application to Image Retrieval PROCESSING
55 LSJ1677 Tag Based Image Search by Social Re-ranking IMAGE JAVA
PROCESSING
56 LSJ1680 Mapping Bug Reports to Relevant Files: A Ranking SOFTWARE JAVA
Model, a Fine- Grained Benchmark, and Feature ENGINEERING
Evaluation
57 LSJ1684 Malware Detection in Cloud Computing Secure JAVA
Infrastructures Computing
58 LSJ1685 Two-Factor Data Security Protection Mechanism Cloud JAVA
for Cloud Storage System Computing
59 LSJ1686 Attribute Based Data Sharing Scheme Revisited in Cloud Cloud JAVA
Computing Computing
60 LSJ1659 A Hop-by-Hop Routing Mechanism for Green Internet PARALLEL & JAVA
DISTRIBUTED
SYSTEMS
61 LSJ1687 Leveraging Data Deduplication to Improve the Cloud JAVA
Performance of Primary Storage Systems in the Cloud Computing
62 LSJ1688 Encrypted Data Management with Deduplication in Cloud JAVA
Cloud Computing Computing
63 LSJ1689 ID2S Password-Authenticated Key Exchange Protocols Secure JAVA
Computing

CONTACT: ARUNKUMAR (040-40274843, 9030211322)


MAIL ID: logicsystemsprojects@gmail.com

WEBSITE: www.logicsystems.org.in

You might also like