1 2 3 4 5

IEEE Based 2016 - 2017 Java Projects

Scroll To Top

    IEEE Transaction On Cloud Computing

  1. A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing
  2. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
  3. Efficient R-Tree Based Indexing Scheme for Server-Centric Cloud Storage System
  4. Encrypted Data Management with De-duplication in Cloud Computing
  5. Hybrid Tree-rule Firewall for High Speed Data Transmission
  6. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
  7. Knowledge-Based Resource Allocation for Collaborative Simulation Development in a Multi-tenant Cloud Computing Environment
  8. Multi-agent-Based Resource Allocation for Energy Minimization in Cloud Computing Systems
  9. KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
  10. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
  11. Providing User Security Guarantees in Public Infrastructure Clouds
  12. Stochastic Modeling and Optimization of Stragglers
  13. IEEE Transaction On Knowledge Of Data Engineering

  14. A Novel Recommendation Model Regularized with User Trust and Item Ratings
  15. A Simple Message-Optimal Algorithm for Random Sampling from a Distributed Stream
  16. Aspect-level In?uence Discovery from Graphs
  17. Clustering Data Streams Based on Shared Density between Micro-Clusters
  18. Declarative Framework for Specification, Simulation and Analysis of Distributed Applications
  19. Exploit Every Bit: Effective Caching for High-Dimensional Nearest Neighbor Search
  20. Interactive Visualization of Large Data Sets
  21. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
  22. Methodologies, techniques and tools for OLAP design: A Systematic Mapping Study
  23. Mining Health Examination Records - A Graph-based Approach
  24. Novelty-based Spatiotemporal Saliency Detection for Prediction of Gaze in Egocentric Video
  25. Practical Approximate k nearest Neighbor Queries with Location and Query Privacy
  26. PRIGUARD: A Semantic Approach to Detect Privacy Violations in Online Social Networks
  27. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
  28. Top-Down XML Keyword Query Processing
  29. IEEE Transaction On Mobile Computing

  30. A Downlink Scheduler for Multicasting Wireless Video-on-Demand
  31. A Novel Graph-based Descriptor for the Detection of Billing-related Anomalies in Cellular Mobile Networks
  32. An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks
  33. SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud
  34. Dynamic Frequency Resource Allocation in Heterogeneous Cellular Networks
  35. Monitoring Moving Objects Using Aerial Mobile Sensors
  36. Route or Carry: Motion-driven Packet Forwarding in Micro Aerial Vehicle Networks
  37. IEEE Transaction On Networking

  38. Adaptive Prefetching in Wireless Computing
  39. Algorithms to Find Two-Hop Routing Policies in Multi-Class Delay Tolerant Networks
  40. Energy Minimization For Multi-resolution Multi-relay Multicast Networks
  41. Modeling, Analysis, and Implementation of Universal Acceleration Platform Across Online Video Sharing Sites
  42. Queue-Aware Energy-Efficient Joint Remote Radio Head Activation and Beamforming in Cloud Radio Access Networks
  43. Towards Optimal Adaptive Wireless Communications in Unknown Environments
  44. IEEE Transaction On Network Security

  45. Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization
  46. Jammer-Assisted Resource Allocation in Secure OFDMA with Untrusted Users
  47. A Reliable Group Key Management Scheme for Broadcast Encryption
  48. Ant-based distributed denial of service detection technique using roaming virtual honey pots
  49. Structural Vulnerability Assessment of Community-based Routing in Opportunistic Networks
  50. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
  51. IEEE Transaction On Image Processing

  52. An Empirical Study into Annotator Agreement, Ground Truth Estimation, and Algorithm Evaluation
  53. Text-Attentional Convolutional Neural Network for Scene Text Detection
  54. Multi-view Object Extraction with Fractional Boundaries
  55. Robust Point Set Matching for Partial Face Recognition
  56. Lossless Compression of JPEG Coded Photo Collections
  57. IEEE Transaction On Information Forensics And Security

  58. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
  59. Artificial-Noise-Aided Message Authentication Codes with Information-Theoretic Security
  60. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
  61. Resource Allocation for a Massive MIMO Relay Aided Secure Communication
  62. Steganalysis Features for Content-Adaptive JPEG Steganography
  63. Vulnerability Analysis Of A Circuit Layout To Hardware Trojan Insertion
  64. A Forward Regridding Method With Minimal Oversampling for Accurate and Efficient Iterative Tomographic Algorithms
  65. Analyzing the Effect of JPEG Compression on Local Variance of Image Intensity
  66. IEEE Transaction On Web Mining

  67. Optimal Web Page Download Scheduling Policies for Green Web Crawling
  68. Personalized Influential Topic Search via Social Network Summarization
  69. PRISM: Privacy-Aware Interest Sharing and Matching in Mobile Social Networks
  70. Resolving Multi-party Privacy Conflicts in Social Media
  71. Privacy-Preserving Outsourced Media Search
  72. Tag Based Image Search by Social Re-ranking
  73. IEEE Transaction On Parallel And Distributed System

  74. Cost-Effective Data Transfer for Mobile Health Care
  75. A Dynamic Load Balancing Method of Cloud-Center Based on SDN
  76. Minimum Dependencies Energy-Efficient Scheduling in Data Centers
  77. Optimizing Live Migration of Multiple Virtual Machines
  78. Parallel and Streaming Truth Discovery in Large-Scale Quantitative Crowdsourcing
  79. Using Empirical Estimates of Effective Bandwidth in Network-Aware Placement of Virtual Machines in Datacenters
  80. Mitigating the IPTV Zap time in enhanced EPON systems
  81. On Acceleration and Scalability of Number Theoretic Private Information Retrieval
  82. A Semantic Publish-Subscribe Architecture for the Internet of Things
  83. IEEE Transaction On Big Data

  84. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
  85. Service Rating Prediction by Exploring Social Mobile Users' Geographical Locations
  86. USTF: A Uni?ed System of Team Formation
  87. IEEE Transaction On Web Services

  88. FUNNEL: Assessing Software Changes in Web-based Services
  89. Privacy-Preserving Location Sharing Services for Social Networks
  90. Collaborative Web Service Quality Prediction via Exploiting Matrix Factorization and Network Map
  91. SecRBAC: Secure data in the Clouds
  92. Full Solution Indexing for top-K Web Service Composition
  93. IEEE Transaction On E-Commerce

  94. Conflict-Aware Weighted Bipartite B-Matching and Its Application to E-Commerce
  95. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
  96. IEEE Transaction On Software Engineering

  97. Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools
  98. Metamorphic Testing for Cyber security
  99. Dependence Guided Symbolic Execution
  100. IEEE Transaction On E-Learning

  101. Advanced LMS Integration of SCORM Web Laboratories
  102. Decision Learning : Data analytic learning with strategic decision making
  103. Scope and Limitations of Open Assessment: An ICT-Based Case Study
  104. Application And Database

  105. Safe Distribution and Parallel Execution of Data-centric Workflows over the Publish/Subscribe Abstraction.
  106. A Decentralized Self-Adaptation Mechanism for Service-Based Applications in the Cloud
  107. Time-Delayed Broadcasting for Defeating Inside Jammers
  108. Neighbor Similarity Trust Against Sybil Attack in P2P E-Commerce
  109. A System for Denial-of-Service Attack Detection based on Multivariate Correlation Analysis
  110. Efficient and Cost-Effective Hybrid Congestion Control for HPC Interconnection Networks
  111. Supporting Privacy Protection in Personalized Web Search
  112. Prioritizing Web Links based on Web usage and Content Data
  113. CACC A Cooperative Approach to Cache Consistency in WMNs
  114. Reliable Cooperative Communications based on Random Network Coding in Multi-Hop Relay WSNs
  115. Train Rescheduling With Stochastic Recovery Time
  116. Reversible Data Hiding in Encrypted JPEG Bit stream
  117. Effective Key Generation Video Content Embedding with Encryption Techniques
  118. Audio And Video File Hiding Using Stenography Technique
  119. Eigen Face Identification System using Eigen Face approach
  120. An Efficient Two Server Password only Authenticated Key Exchange
  121. Double Fingerprint Verification System using Minute Approach
  122. Secure Multi-signature Group Key Generation for Communicating in Multi-group
  123. Intrusion Detection System in Mobile Ad-hoc Network
  124. Web based Logistics Supply Management System
  125. Aadhaar Card Secure Travel Identification System
  126. Web based Project Planning and Management System
  127. Teachers Performance Prediction using K-Means Clustering Algorithm
  128. Credit Card Fraud Detection Using K-Means Algorithm
  129. Similarity Measure for Text Classification and Clustering
  130. Spatial Approximate Query Retrieval System.
  131. URL extraction and Content Validation for Various Web Forums
  132. Carrier Development Cell Monitoring System for Engineering Colleges
  133. Enterprise Scheme Planner and Monitoring System
  134. Bus Scheduling and Management system
  135. Mobility Intruder identifications and Management approach and for Mobile IP Networks
  136. A Database Synchronization Approach for Mobile Devices
  137. Energy Billing System
  138. Optimal Bandwidth Assignment for Multiple Descriptions in Video Content Streaming
  139. Enabling Public Auditability and Data Dynamics for Content Storage Security in Cloud
  140. Cloud Content Protection from masking Attacks
  141. Load-Balancing Multipath Switching System with Flow Slice
  142. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
  143. Improving Application Placement for Cluster-Based Web Application
  144. Crime File Management System
  145. Government Scheme Management System for All Panchayat
  146. Flexible Rollback System During Data Transmission in Client/Server Model
  147. A Simple Model for Chunk-Scheduling Strategies in P2P Streaming
  148. Media Rate Allocation for Video Transmission in JMF Application
  149. Fuzzy C-Means Clustering Process for Image Processing
  150. Randomized Protocols for Duplicate Elimination In Peer-to-Peer Storage Systems
  151. Files Sharing Process Over Peer to Peer Network
  152. Online Airlines Reservation System
  153. Efficient Data Transfer Control Protocol for Packet Transmission in Wireless Network
  154. Controlling IP Spoofing through Inter Domain Packet Filters
  155. Iris Recognition Based Hamming Distance Concept
  156. Advocate Management System using Swing Application
  157. Hospital Management System
  158. Web Based Issue Tracking System
  159. Pay Roll Management System using Windows Application
  160. Location Based Services of Accidents Reporting
  161. Online Advertising Agency Management
  162. Fault Tolerant Detection Approach in Distributed Computing
  163. Online Ad-Server Website Management System
  164. E- Shopping
  165. RSA Implementation for Secure Data Transmission in Web Application
  166. Energy-Efficient Broadcast Routing Algorithms for Wireless Ad-Hoc Networks
  167. Minimizing File Downloading System in Client Server Systems
  168. Band Width Utilization Using Route Reservation Technique for Reliable Network
  169. Co-Clustering Based Image Retrieval System
  170. Hand Written Word Recognition using Tagged - Image File Format
  171. A Collaborative Workflow Composition in Social Network
  172. Fuzzy Based Keyword Query Processing in XML Database
  173. An Ontology based Project Selection using Text Mining
  174. Discovering Fraud Ranked Website


About Us

Vee Eee Academic is an institution of higher learning with a mission that incorporates teaching, research, creative activity and service. Vee Eee Academic has state-of-the-art facilities for Embedded systems, Digital signal processing, high-end VLSI, JAVA, .NET, Programmable Logic and system design training.