Java IEEE Projects 2015-2016

Java IEEE Projects 2015-2016

Java IEEE Projects 2015-2016 We are offering ieee projects 2015-2016 in latest technology like Java, dot net, android, embedded, matlab, vlsi, hadoop, power elctronics,  power system, mechanical, civil projects. IEEE Master is a unit of LeMeniz Technologies. We guide all final year M.E/M.Tech, B.E/B.Tech, MPhil, MCA, BCA, M.Sc, B.Sc, and Diploma students for their Academic Projects to get best results

Why Us?

Account Detail of LeMeniz Infotech

IEEE Project Technology

JAVA IEEE Projects

S.NOCodeTitleDomainYear
1LM_J015_01Efficient Filtering Algorithms for Location-Aware Publish/SubscribeData MiningApril 2015
2LM_J015_02Probabilistic Range Query over Uncertain Moving Objects in Constrained Two-Dimensional SpaceData MiningMarch 2015
3LM_J015_03CrowdOp: Query Optimization for Declarative Crowdsourcing SystemsKnowledge and Data EngineeringFeb 2015
4LM_J015_04Disease Inference from Health-Related Questions via Sparse Deep LearningKnowledge and Data EngineeringMarch 2015
5LM_J015_05Real-Time City-Scale Taxi RidesharingKnowledge and Data EngineeringMay 2015
6LM_J015_06t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility PreservationKnowledge and Data EngineeringJuly 2015
7LM_J015_07A Proximity-aware Interest-clustered P2P File Sharing SystemParallel and Distributed SystemsJun 2015
8LM_J015_08Neighbor Similarity Trust against Sybil Attack in P2P E-CommerceParallel and Distributed SystemsMarch 2015
9LM_J015_09Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the CloudParallel Distributed SystemsPreprint
10LM_J015_10Neighbor Discovery in Wireless Networks with Multipacket ReceptionParallel Distributed SystemsJuly 2015
11LM_J015_11Truthful Greedy Mechanisms for Dynamic Virtual Machine Provisioning and Allocation in CloudsParallel Distributed SystemsFeb 2015
12LM_J015_12VMbuddies: Coordinating Live Migration of Multi-Tier Applications in Cloud EnvironmentsParallel Distributed SystemsApril 2015
13LM_J015_13A Hybrid Cloud Approach for Secure Authorized DeduplicationParallel Distributed SystemsMay 2015
14LM_J015_14Secure and Distributed Data Discovery and Dissemination in Wireless Sensor NetworksParallel Distributed SystemsApril 2015
15LM_J015_15Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond AttainmentDependable and Secure ComputingAug 2015
16LM_J015_16A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor NetworksDependable and Secure ComputingJun 2015
17LM_J015_17Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion AttacksDependable Secure ComputingFeb 2015
18LM_J015_18Secure Spatial Top-k Query Processing via Untrusted Location-Based Service ProvidersDependable Secure ComputingFeb 2015
19LM_J015_19Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection SystemDependable Secure ComputingJune 2015
20LM_J015_20Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive SensingNetworkingPreprint
21LM_J015_21Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File SharingComputersApril 2015
22LM_J015_22Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud StorageComputersPreprint
23LM_J015_23Cost-Effective Authentic and Anonymous Data Sharing with Forward SecurityComputersPreprint
24LM_J015_24Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc NetworksMobile ComputingApril 2015
25LM_J015_25Tracking Message Spread in Mobile Delay Tolerant NetworksMobile ComputingAug 2015
26LM_J015_26A privacy-preserving framework for managing mobile ad requests and billing informationMobile ComputingAug 2015
27LM_J015_27Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor NetworksMobile ComputingFeb 2015
28LM_J015_28Towards Large-Scale Histopathological Image Analysis: Hashing-Based Image RetrievalImage ProcessingFeb 2015
29LM_J015_29Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data StorageInformation Forensics and SecurityFeb 2015
30LM_J015_30Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based EncryptionInformation Forensics and SecurityJan 2015

Java Review Material

+91 9566355386 | +91 9962588976 | projects@lemenizinfotech.com