You are on page 1of 6

29,South Usman Road,, TNagar

,
Chennai-17. Ph : 044-43556664
Mobile : +91-8680802110
www.temasolution.com
temasolutions@gmail.com

IEEE JAVA /DOTNET TITLE 2016-2017

S.NO

1.

Cloud Computing
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over

CODE

JDC1

Encrypted Cloud Data
2.

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in

JDC2

the Cloud
3.

An Efficient File Hierarchy Attribute-Based Encryption Scheme in

JDC3

Cloud Computing
4.

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with

JDC4

Verifiable Delegation in Cloud Computing
5.

CloudArmor: Supporting Reputation-Based Trust Management for

JDC5

Cloud Services
6.

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its

JDC6

Application to Cloud Email
7.

Dual-Server Public-Key Encryption With Keyword Search for Secure

JDC7

Cloud Storage
8.

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key

JDC8

Updates
9.

Fine-Grained Two-Factor Access Control for Web-Based Cloud

JDC9

Computing Services
10. Identity-Based Encryption with Cloud Revocation Authority and Its

JDC10

Applications
11. Real-Time Semantic Search Using Approximate Methodology for

JDC11

Large-Scale Storage Systems
12. Flexible and Fine-Grained Attribute-Based Data Storage in Cloud
Computing

JDC12

29,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43556664
Mobile : +91-8680802110
www.temasolution.com
temasolutions@gmail.com

13. A secured resource access management in educational cloud

JDC13

computing environment
14. Dynamic virtualized network function allocation in a multi-cloud

JDC14

environment
15. Efficient SQL adaptive query processing in cloud databases systems

JDC15

16. Goal-based security components for cloud storage security framework

JDC16

17. Parallel Execution of Space-Aware Applications in a Cloud

JDC17

Environment
DATA MINING PROJECT TITLES
18. A Novel Recommendation Model Regularized with User Trust and

JDD1

Item Ratings
19. Automatically Mining Facets for Queries from Their Search Results

JDD2

20. Building an intrusion detection system using a filter-based feature

JDD3

selection algorithm
21. Connecting Social Media to E-Commerce: Cold-Start Product

JDD4

Recommendation Using Microblogging Information
22. Cross-Domain Sentiment Classification Using Sentiment Sensitive

JDD5

Embeddings
23. Crowdsourcing for Top-K Query Processing over Uncertain Data

JDD6

24. Domain-Sensitive Recommendation with User-Item Subgroup

JDD7

Analysis
25. Efficient Algorithms for Mining Top-K High Utility Itemsets

JDD8

26. Efficient Cache-Supported Path Planning on Roads

JDD9

27. Rating Prediction based on Social Sentiment from Textual Reviews

JDD10

28. Location Aware Keyword Query Suggestion Based on Document

JDD11

Proximity
29. Quantifying Political Leaning from Tweets, Retweets, and Retweeters

JDD12

29,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43556664
Mobile : +91-8680802110
www.temasolution.com
temasolutions@gmail.com

30. Sentiment Embeddings with Applications to Sentiment Analysis

JDD13

31. TopicSketch: Real-time Bursty Topic Detection from Twitter

JDD14

32. Network intrusion detection system model based on data mining

JDD15

33. Opinion mining from student feedback data using supervised learning

JDD16

algorithms
34. Privacy-Preserving-Outsourced Association Rule Mining on Vertically

JDD17

Partitioned Databases
NETWORKING PROJECT TITLES
35. A Stable Approach for Routing Queries in Unstructured P2P Networks

JDN1

36. iPath: Path Inference in Wireless Sensor Networks

JDN2

37. Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc

JDN3

Networks
38. Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

JDN4

39. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile

JDN5

Users
40. A dynamic forward error control scheme for video streaming over

JDN6

wireless networks
41. A practical approach for network fault detection

JDN7

42. Energy-Efficient Image Compressive Transmission for Wireless

JDN8

Camera Networks
43. A new approach for detecting and monitoring of selective forwarding

JDN9

attack in wireless sensor networks
44. A wireless intrusion Alerts Clustering Method for mobile internet

JDN10

45. BehavioR Based Adaptive Intrusion Detection in Networks

JDN11

46. Hybrid Tree-rule Firewall for High Speed Data Transmission

JDN12

47. Insecure by Design Protocols for Encrypted Phone Calls

JDN13

MOBILE COMPUTING PROJECT TITLES

29,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43556664
Mobile : +91-8680802110
www.temasolution.com
temasolutions@gmail.com

48. Energy and Memory Efficient Clone Detection in Wireless Sensor

JDM1

Networks
49. EPLQ: Efficient Privacy-Preserving Location-Based Query Over

JDM2

Outsourced Encrypted Data
50. Secure Overlay Routing Using Key Pre-Distribution: A Linear

JDM3

Distance Optimization Approach
51. Detecting Node Failures in Mobile Wireless Networks: A Probabilistic

JDM4

Approach
PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES
52. A Hop-by-Hop Routing Mechanism for Green Internet

JDS1

53. Continuous Answering Holistic Queries over Sensor Networks

JDS2

54. Dictionary Based Secure Provenance Compression for Wireless Sensor JDS3
Networks
55. The Server Provisioning Problem for Continuous Distributed

JDS4

Interactive Applications
SECURE COMPUTING PROJECT TITLES
56. Contributory Broadcast Encryption with Efficient Encryption and

JSC1

Short Ciphertexts
57. Data Lineage in Malicious Environments

JSC2

58. Detecting Malicious Facebook Applications

JSC3

59. FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

JSC4

60. Inference Attack on Browsing History of Twitter Users using Public

JSC5

Click Analytics and Twitter Metadata
61. Resolving Multi-party Privacy Conflicts in Social Media

JSC6

INFORMATION FORENSICS AND SECURITY PROJECT TITLES
62. Hidden Ciphertext Policy Attribute-Based Encryption Under Standard
Assumptions

JSC1

29,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43556664
Mobile : +91-8680802110
www.temasolution.com
temasolutions@gmail.com

63. Optimized Search-and-Compute Circuits and Their Application to

JSC2

Query Evaluation on Encrypted Data
64. Privacy-Preserving Utility Verification of the Data Published by Non-

JSC3

interactive Differentially Private Mechanisms
65. Profiling Online Social Behaviors for Compromised Account

JSC4

Detection
IMAGE PROCESSING PROJECT TITLES
66. A Locality Sensitive Low-Rank Model for Image Tag Completion

JIP1

67. A Scalable Approach for Content-Based Image Retrieval in Peer-to-

JIP2

Peer Networks
68. Learning of Multimodal Representations with Random Walks on the

JIP3

Click Graph
69. Online Multi-Modal Distance Metric Learning with Application to

JIP4

Image Retrieval
70. A novel steganography method based on matrix pattern and LSB

JIP5

algorithms in RGB images
71. Image segmentation for determinations of object descriptions

JIP6

72. Towards building a distributed file system for remote sensing image

JIP7

process
MULTIMEDIA PROJECT TITLES
73. Social Friend Recommendation Based on Multiple Network

JMM1

Correlation
74. User-Service Rating Prediction by Exploring Social Users’ Rating

JMM2

Behaviors
SOFTWARE ENGINEERING PROJECT TITLES
75. Mapping Bug Reports to Relevant Files: A Ranking Model, a FineGrained Benchmark, and Feature Evaluation

JSE1

29,South Usman Road,, TNagar,
Chennai-17. Ph : 044-43556664
Mobile : +91-8680802110
www.temasolution.com
temasolutions@gmail.com

76. Metamorphic Testing for Software Quality Assessment: A Study of

JSE2

Search Engines
FUZZY SYSTEMS PROJECT TITLES
77. Answering Approximate Queries over XML Data

JFS1