S.NO |
IEEE
2020-21 JAVA Project Titles |
Domain |
Lang |
1 |
Secure Password-Protected Encryption Key for Deduplicated Cloud
Storage Systems |
CLOUD COMPUTING |
JAVA |
2 |
A Lightweight Policy Update Scheme
for Outsourced Personal Health
Records Sharing |
CLOUD COMPUTING |
JAVA |
3 |
Policy-based Broadcast Access Authorization
for Flexible Data Sharing in Clouds |
CLOUD COMPUTING |
JAVA |
4 |
A Verifiable and Fair Attribute-based Proxy Re- encryption Scheme
for Data Sharing
in Clouds |
CLOUD COMPUTING |
JAVA |
5 |
Online Performance Modeling and Prediction for Single-VM Applications in Multi-Tenant
Clouds |
CLOUD COMPUTING |
JAVA |
6 |
Hierarchical Scheduling Mechanisms in Multi-Level Fog |
CLOUD COMPUTING |
JAVA |
7 |
A Cloud
Secure Storage Mechanism Based on Data Dispersion and Encryption |
CLOUD COMPUTING |
JAVA |
8 |
Computing Computation Migration Oriented Resource Allocation in Mobile Social
Clouds |
CLOUD COMPUTING |
JAVA |
9 |
An Optimal
Approach for E-Commerce Application Service on to the Public Cloud Environment |
CLOUD COMPUTING |
JAVA |
10 |
Negotiation Based
Resource Allocation in Cloud Computing Scenarios |
CLOUD COMPUTING |
JAVA |
11 |
Evaluating an
Application Aware Distributed Dijkstra
Shortest Path Algorithm in Hybrid Cloud/Edge Environments |
CLOUD COMPUTING |
JAVA |
12 |
Energy-Aware
Real-time Tasks Processing for FPGA Based Heterogeneous Cloud |
CLOUD COMPUTING |
JAVA |
13 |
Integrity Auditing for Multi-Copy in
Cloud Storage Based on Red-Black Tree |
CLOUD COMPUTING |
JAVA |
14 |
DropStore: A Secure Backup
System Using Multi-Cloud and Fog Computing |
CLOUD COMPUTING |
JAVA |
15 |
RADAR: Data
Protection in Cloud-Based Computer Systems at Run Time |
CLOUD COMPUTING |
JAVA |
16 |
Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage
Image |
CLOUD COMPUTING |
JAVA |
17 |
A Predictive Priority-Based Dynamic Resource Provisioning Scheme
With Load Balancing in Heterogeneous Cloud
Computing |
CLOUD COMPUTING |
JAVA |
18 |
DRALBA: Dynamic and Resource Aware
Load Balanced Scheduling Approach for Cloud Computing |
CLOUD COMPUTING |
JAVA |
19 |
Enabling Simultaneous Content Regulation and Privacy Protection for Cloud
Storage Image |
CLOUD COMPUTING |
JAVA |
20 |
Cryptanalysis of an Anonymous and Traceable Group Data Sharing in Cloud Computing |
CLOUD COMPUTING |
JAVA |
21 |
A Novel
Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme
With Ciphertext Evolution for Secure Cloud
Data Sharing |
CLOUD COMPUTING |
JAVA |
22 |
A Statistical Inference Attack on Privacy-Preserving
Biometric Identification Scheme |
CLOUD COMPUTING |
JAVA |
23 |
Fog-to-MultiCloud
Cooperative eHealth Data Management with
Application-Aware Secure Deduplication |
CLOUD COMPUTING |
JAVA |
24 |
A Resource Allocation Model Based on Trust Evaluation in Multi-Cloud Environments |
CLOUD COMPUTING |
JAVA |
25 |
Optimized Composition for Multiple User
Service Requests Based
on Edge Cloud Collaboration |
CLOUD COMPUTING |
JAVA |
26 |
Fog Based
Architecture and Load Balancing Methodology for Health Monitoring Systems |
CLOUD COMPUTING |
JAVA |
27 |
Proactive
Failure-Aware Task Scheduling Framework for Cloud
Computing |
CLOUD COMPUTING |
JAVA |
28 |
Frequent Subgraph Mining Algorithms
in Static and Temporal Graph-Transaction Settings: A Survey |
DATA MINING |
JAVA |
29 |
Big Data Management
in Smart Grids: Technologies and Challenges |
DATA MINING |
JAVA |
30 |
A Survey
on Opinion Reason
Mining and Interpreting Sentiment Variations |
DATA MINING |
JAVA |
31 |
Reversible Data
Hiding Based on Dual
Pairwise Prediction-Error Expansion |
DATA MINING |
JAVA |
32 |
A survey
on algorithms for intelligent computing and smart city applications |
DATA MINING |
JAVA |
33 |
Comments on “An Adaptive Terrain-Dependent Method for SRTM DEM Correction Over Mountainous Areas” |
DATA MINING |
JAVA |
34 |
ConNet: Deep
Semi-Supervised Anomaly Detection Based on Sparse Positive Samples |
DATA MINING |
JAVA |
35 |
Multi-Level Health
Knowledge Mining Process
in P2P Edge Network |
DATA MINING |
JAVA |
36 |
Detecting Associations Based on the Multi-Variable
Maximum Information Coefficient |
DATA MINING |
JAVA |
37 |
A Review
of Rule Learning-Based Intrusion Detection Systems and Their
Prospects in Smart Grids |
DATA MINING |
JAVA |
38 |
Big Data Platform for
Educational Analytics |
DATA MINING |
JAVA |
39 |
Extracting Arguments Based on User
Decisions in App Reviews |
DATA MINING |
JAVA |
40 |
Context-Aware Recommender Systems for Social Networks: Review, Challenges and Opportunities |
DATA MINING |
JAVA |
41 |
A Spam
Transformer Model for SMS Spam
Detection |
DATA MINING |
JAVA |
42 |
Efficient and
Secure Cancelable Biometric Authentication Framework Based on Genetic Encryption Algorithm |
DATA MINING |
JAVA |
43 |
Secure Efficient
Revocable Large Universe Multi-Authority Attribute-Based Encryption for Cloud-Aided IoT |
SECURE COMPUTING |
JAVA |
44 |
Blockchain based
Multi-Authority Fine-Grained
Access Control System
with Flexible Revocation |
SECURE COMPUTING |
JAVA |
45 |
RFC: A feature selection algorithm for software
defect prediction |
BIG DATA |
JAVA |
46 |
A multitask multiview neural
network for end-to-end aspect-based sentiment analysis |
BIG DATA |
JAVA |
47 |
Effective density-based clustering algorithms for incomplete data |
BIG DATA |
JAVA |
48 |
An Efficient Data
Auditing Protocol With A Novel Sampling Verification Algorithm |
BIG DATA |
JAVA |
49 |
QoS-Aware Task
Scheduling in Cloud-Edge Environment |
Parallel distributed computing |
JAVA |
50 |
Rings for Privacy: An Architecture for Large Scale Privacy-Preserving Data
Mining |
Parallel distributed computing |
JAVA |
51 |
Gradient-Based Feature Extraction From Raw Bayer
Pattern Images |
IMAGE PROCESSING |
JAVA |
52 |
Adaptive Linear
Span Network for
Object Skeleton Detection |
IMAGE PROCESSING |
JAVA |
0 Comments