You are on page 1of 12

JAVA IEEE PROJECT TITLES 2015 2016

S.No

Title

Domain

KNOWLEDGE AND DATA ENGINEERING


1

Efficient

Filtering

Algorithms

for

Location-Aware Data

Publish/Subscribe
2

April

2015

Dual Sentiment Analysis: Considering Two Sides of One Data Mining, August
Review

Mining,

CrowdOp:

2015
Query

Optimization

for

Declarative Knowledge and Data

Crowdsourcing Systems

Engineering, Aug. 1
2015

Disease Inference from Health-Related Questions via Sparse Knowledge and Data
Deep Learning

Engineering, Aug. 1
2015

Efficient Enforcement of Action-aware Purpose-based Knowledge and Data


Access Control within Relational
Database Management Systems

Engineering,

August

2015

Mining Partially-Ordered Sequential Rules Common to Knowledge and Data


Multiple Sequences

Engineering,

August

2015
7

Practical Data Prediction for Real-World Wireless Sensor Knowledge and Data
#227, Kutchery Road, Mylapore, Chennai 600 004
Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

Networks

Engineering,

August

2015
8

Query

Analytics

over

Probabilistic

Databases

with Knowledge and Data

Unmerged Duplicates

Engineering,

August

2015
9

10

Differentially

Private

Frequent

Itemset

Mining

via Knowledge and Data

Transaction Splitting

Engineering, July 2015

Translating Relational Queries into Spreadsheets

Knowledge and Data


Engineering,

August

2015
11

A General Geographical Probabilistic Factor Model for Knowledge and Data


Point of Interest Recommendation

Engineering,

May

2015
12

Aggregate Estimation in Hidden Databases with Checkbox Knowledge and Data


Interfaces

Engineering,

May

2015
13

14

15

Bridging the Vocabulary Gap between Health Seekers and


Healthcare Knowledge

Knowledge and Data

Co-Extracting Opinion Targets and Opinion Words from


Online Reviews Based on the Word Alignment Model

Knowledge and Data

Context-Based Diversification for Keyword Queries Over

Knowledge and Data

Engineering, 2015

Engineering, 2015

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

16

XML Data

Engineering, 2015

Privacy Policy Inference of User-Uploaded Images on


Content Sharing Sites

Knowledge and Data

17

18

19

Engineering, 2015
Knowledge and Data

Progressive Duplicate Detection

Engineering, 2015

Towards Effective Bug Triage with Software Data


Reduction Techniques

Knowledge and Data


Engineering, 2015

EMR: A Scalable Graph-based Ranking Model for Content- Knowledge and Data
based Image Retrieval
Engineering, 2015
Knowledge and Data
Engineering, 2015

DEPENDABLE AND SECURE COMPUTING


20

Anonymous Two-Factor Authentication in Distributed Dependable


Systems: Certain Goals Are Beyond Attainment

Secure

and

Computing,

July-Aug. 1 2015
21

Secure Spatial Top-k Query Processing via Untrusted Dependable


Location-Based Service Providers

Secure
Feb 2015

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

and

Computing,

22

A Lightweight Secure Scheme for Detecting Provenance Dependable


Forgery and Packet Drop Attacks in Wireless Sensor Secure
Networks

23

and

Computing,

May-June 2015

Enabling Fine-grained Multi-keyword Search Supporting Dependable


Classified Sub-dictionaries over Encrypted Cloud Data

Secure

and

Computing,

Jan Feb 2015


24

Dependable
A Computational Dynamic Trust Model for User
Authorization

25

Computing,

2015
Dependable

Continuous and Transparent User Identity Verification for


Secure Internet Services
26

Secure

A Lightweight Secure Scheme for Detecting Provenance


Forgery and Packet Drop Attacks in Wireless Sensor
Networks

27

Secure

28

2015
Dependable
Secure
2015

Secure

and

Computing,

2015

Secure
2015

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

and

Computing,

Dependable
Secure Data Aggregation Technique for Wireless Sensor
Networks in the Presence of Collusion Attacks

and

Computing,

Dependable
Secure Spatial Top-k Query Processing via Untrusted
Location-Based Service Providers

and

and

Computing,

29

Dependable
Improved Privacy-Preserving P2P Multimedia Distribution
Based on Recombined Fingerprints

30

Secure

Computing,

2015
Dependable

DDSGA: A Data-Driven Semi-Global Alignment Approach


for Detecting Masquerade Attacks
31

Secure

and

Computing,

2015
Dependable

Enabling Fine-grained Multi-keyword Search Supporting


Classified Sub-dictionaries over Encrypted Cloud Data

and

Secure

and

Computing,

2015

PARALLEL AND DISTRIBUTED SYSTEMS


32

Neighbor Similarity Trust against Sybil Attack in P2P E- Parallel


Commerce

Distributed

And
Systems,

March 2015
33

Neighbor Discovery in Wireless Networks with Multipacket Parallel


Reception

Distributed

and
Systems,

Preprint
34

Truthful Greedy Mechanisms for Dynamic Virtual Machine Parallel


Provisioning and Allocation in Clouds

Distributed

And
Systems,

July 2015
35

Hybrid

Cloud

Approach

for

Secure

Authorized Parallel

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

And

Deduplication

Distributed

Systems,

May 2015
36

Parallel
Asymmetric Social Proximity Based Private Matching
Protocols for Online Social Networks

37

Distributed

38

Distributed

39

Distributed

40

Distributed

41

Distributed

Distributed
2015

MOBILE COMPUTING
#227, Kutchery Road, Mylapore, Chennai 600 004
Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

Systems,

And
Systems,

And
Systems,

2015
Parallel

Cloud Armor: Supporting Reputation-based Trust


Management for Cloud Services

And

2015
Parallel

Circuit Ciphertext-policy Attribute-based Hybrid


Encryption with Verifiable Delegation in Cloud Computing

Systems,

2015
Parallel

A Secure Anti-Collusion Data Sharing Scheme for Dynamic


Groups in the Cloud

And

2015
Parallel

A Secure and Dynamic Multi-keyword Ranked Search


Scheme over Encrypted Cloud Data

Systems,

2015
Parallel

A Hybrid Cloud Approach for Secure Authorized


Deduplication

And

And
Systems,

42

Privacy-Preserving and Truthful Detection of Packet Mobile


Dropping Attacks in Wireless Ad Hoc Networks

43

April 2015

Tracking Message Spread in Mobile Delay Tolerant Mobile


Networks

Computing,

Computing,

Aug 2015

44

User-Defined Privacy Grid System for Continuous Location- Mobile


Based Services
2015

Computing,

45

Friendbook: A Semantic-Based Friend Recommendation


System for Social Networks

Mobile

Computing,

Dynamic Routing for Data Integrity and Delay


Differentiated Services in Wireless Sensor Networks

Mobile

46

47

SemanticSLAM: Using Environment Landmarks


for Unsupervised Indoor Localization

48

Energy Consumption Analysis and Minimization


in Multi-Layer Heterogeneous Wireless Systems

49

Forwarding Redundancy in Opportunistic Mobile


Networks: Investigation, Elimination
and Exploitation

2015
Computing,

2015

IMAGE PROCESSING
50

Towards Large-Scale Histopathological Image Analysis: Image Processing, Feb


#227, Kutchery Road, Mylapore, Chennai 600 004
Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

Hashing-Based Image Retrieval


51

Symmetric Smoothing Filters from Global Consistency Image


Constraints

52

Minimum Risk Wavelet Shrinakge Operator For Poisson Image

55

56

Processing,

May 2015

Perceptual Quality Assessment for Multi-Exposure Image Image Processing, Nov


Fusion

54

Processing,

May 2015

Image Denoising
53

2015

2015

Beyond Perspective Dual Photography with Illumination Image Processing, July


Masks

2015

Learning to Rank Image Tags With Limited Training


Examples

Image

An Attribute-Assisted Reranking Model for Web Image


Search

Image

Processing,

2015
Processing,

2015

CLOUD COMPUTING
57

OPoR: Enabling Proof of Retrievability in

Cloud

Cloud Computing with Resource-Constrained

June 2015

Computing,

Devices
58

59

Cross-Layer Multi-Cloud Real-Time Application QoS

Cloud

Monitoring and Benchmarking As-a-Service Framework

June 2015

Aggressive Resource Provisioning for Ensuring

Cloud

QoS in Virtualized Environments


#227, Kutchery Road, Mylapore, Chennai 600 004
Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

Computing,

Computing,

June 2015
60

61

62

63

64

65

End-to-end Delay Minimization for Scientific Workflows in

Cloud

Clouds under Budget Constraint

June 2015

Reactive Resource Provisioning Heuristics for

Cloud

Dynamic Dataflows on Cloud Infrastructure

June 2015

Deploying Large-Scale Data Sets on-Demand in the Cloud:

Cloud

Treats and Tricks on Data Distribution

June 2015

An Efficient Green Control Algorithm in

Cloud

Cloud Computing for Cost Optimization

June 2015

CHive: Bandwidth Optimized Continuous

Cloud

Querying in Distributed Clouds

June 2015

A Scalable and Reliable Matching Service for ContentBased Publish/Subscribe Systems

Cloud

66

67

Computing,

Computing,

Computing,

Computing,

Computing,

Computing,

2015
Cloud

Audit-Free Cloud Storage via Deniable Attribute-based

2015

Stealthy Denial of Service Strategy in Cloud Computing

Cloud

Computing,

Computing,

2015
68

Cloud
Secure Auditing and Deduplicating Data in Cloud

2015

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

Computing,

INFORMATION FORENSICS & SECURITY


69

70

71

Low Complexity Features for JPEG Steganalysis

Information Forensics

Using Undecimated DCT

& Security, Feb 2015

A Framework for Secure Computations With Two

Information Forensics

Non-Colluding Servers and Multiple Clients,

&

Applied to Recommendations

2015

Linear Round Bit-Decomposition of Secret-Shared Values

Information Forensics
&

Security,

Security,

March

March

2015
72

73

74

75

76

77

Forensic detection of processing operator chains:

Information Forensics

recovering the history of filtered JPEG images

& Security, April 2015

Software Puzzle: A Countermeasure to Resource-Inflated


Denial-of-Service Attacks

Information Forensics

Passive IP Traceback: Disclosing the Locations of IP


Spoofers from Path Backscatter

Information Forensics

Key Updating for Leakage Resiliency with Application to


AES Modes of Operation

Information Forensics

Software Puzzle: A Countermeasure to Resource-Inflated


Denial-of-Service Attacks

Information Forensics

Effective Key Management in Dynamic Wireless Sensor

Information Forensics

& Security, 2015

& Security, 2015

& Security, 2015

& Security, 2015

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

78

79

80

81

82

83

Networks

& Security, 2015

Framework for Secure Computations with Two NonColluding Servers and Multiple Clients, Applied to
Recommendations

Information Forensics

An Authenticated Trust and Reputation Calculation and


Management System for Cloud and Sensor Networks

Information Forensics

Control Cloud Data Access Privilege and Anonymity with


Fully Anonymous Attribute-Based Encryption

Information Forensics

Enabling Cloud Storage Auditing With Key-Exposure


Resistance

Information Forensics

Control Cloud Data Access Privilege and Anonymity With


Fully Anonymous Attribute-Based Encryption

Information Forensics

Enabling Cloud Storage Auditing With Key-Exposure


Resistance Key-Exposure Resistance

Information Forensics

& Security, 2015

& Security, 2015

& Security, 2015

& Security, 2015

& Security, 2015

& Security, 2015

COMPUTERS
84

Contributory Broadcast Encryption with Efficient


Encryption and Short Ciphertexts

Computers, 2015

85

Secure Distributed Deduplication Systems with Improved


Reliability

Computers, 2015

86

Cost-Effective Authentic and Anonymous Data Sharing with Computers, 2015


Forward Security

87

A Profit Maximization Scheme with Guaranteed Quality of

Computers, 2015

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com

Service in Cloud Computing


88

Identity-Based Encryption with Outsourced Revocation in


Cloud Computing

Computers, 2015

89

Privacy Preserving Ranked Multi-Keyword Search for


Multiple Data Owners in Cloud Computing

Computers, 2015

90

Public Integrity Auditing for Shared Dynamic Cloud Data


with Group User Revocation

Computers, 2015

SERVICES COMPUTING

Computers, 2015

91

Prediction of Atomic Web Services Reliability for QoSAware Recommendation

Computers, 2015

92

Location-Aware and Personalized Collaborative Filtering


for Web Service Recommendation

Computers, 2015

93

Designing High Performance Web-Based Computing


Services to Promote Telemedicine Database Management
System

Computers, 2015

FUZZY SYSTEMS
94

A Fuzzy Preference Tree-Based Recommender System for


Personalized Business-to-Business E-Services

Fuzzy Systems

#227, Kutchery Road, Mylapore, Chennai 600 004


Ph: 044-24612144, +91-9884715673
Email: projects@eblisstechnologies.com, admn.bliss@gmail.com
Website: www.eblisstechnologies.com