java ieee projects 2015-2016
java ieee projects 2015-2016
Java IEEE Projects 2015-2016
Java IEEE Projects 2015-2016 We are offering ieee projects 2015-2016 in latest technology like Java, dot net, android, embedded, matlab, vlsi, hadoop, power elctronics, power system, mechanical, civil projects. We guide all final year M.E/M.Tech, B.E/B.Tech, MPhil, MCA, BCA, M.Sc, B.Sc, and Diploma students for their Academic Projects to get best results. We are offering java ieee projects in pondicherry. LeMeniz Technologies is a new class of software concern committed to catalyzing the competence and competitiveness of its clients by helping them succeed through the power of information technology. Driven by the credo that solutions are effective only when organizational needs are accurately ascertained and aptly addressed; LeMeniz Technologies looks upon itself as an integral part of its client’s organization. We have varied and extensive expertise in software development, web portal development, application software development, e-commerce website development, mobile application development, search engine optimization, bulk sms services, social media marketing, ieee projects guidance and more.
S.NO |
TITLE |
CODE |
|
KNOWLEDGE AND DATA ENGINEERING / DATA MINING |
|||
1 | Efficient Filtering Algorithms for Location-Aware Publish/Subscribe | LM_J015_01 | |
2 | Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-Dimensional Space | LM_J015_02 | |
3 | CrowdOp: Query Optimization for Declarative Crowdsourcing Systems | LM_J015_03 | |
4 | Disease Inference from Health-Related Questions via Sparse Deep Learning | LM_J015_04 | |
5 | Real-Time City-Scale Taxi Ridesharing | LM_J015_05 | |
6 | t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation | LM_J015_06 | |
PARALLEL DISTRIBUTED SYSTEM |
|||
7 | A Proximity-aware Interest-clustered P2P File Sharing System | LM_J015_07 | |
8 | Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce | LM_J015_08 | |
9 | Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud | LM_J015_09 | |
10 | Neighbor Discovery in Wireless Networks with Multipacket Reception | LM_J015_10 | |
11 | Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in Clouds | LM_J015_11 | |
12 | VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud Environments | LM_J015_12 | |
13 | A Hybrid Cloud Approach for Secure Authorized Deduplication | LM_J015_13 | |
14 | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | LM_J015_14 | |
Dependable and Secure Computing |
|||
15 | Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment | LM_J015_15 | |
16 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | LM_J015_16 | |
17 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | LM_J015_17 | |
18 | Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers | LM_J015_18 | |
19 | Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System | LM_J015_19 | |
NETWORKING |
|||
20 | Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing | LM_J015_20 | |
COMPUTERS |
|||
21 | Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing | LM_J015_21 | |
22 | Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage | LM_J015_22 | |
23 | Cost-Effective Authentic and Anonymous Data Sharing with Forward Security | LM_J015_23 | |
MOBILE COMPUTING |
|||
24 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | LM_J015_24 | |
25 | Tracking Message Spread in Mobile Delay Tolerant Networks | LM_J015_25 | |
26 | Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks | LM_J015_26 | |
27 | A privacy-preserving framework for managing mobile ad requests and billing information | LM_J015_27 | |
INFORMATION FORENSICS AND SECURITY |
|||
28 | Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage | LM_J015_28 | |
29 | Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption | LM_J015_29 | |
Image Processing |
|||
30 | Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image Retrieval | LM_J015_30 |