Contact: +91 9791938249, 0413-2211159 Mail: praveen@nexgenproject.com

IEEE JAVA 2018-19 PROJECTS

1. Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment 
2. Aggregation-Based Co- location Datacenter Energy Management in Wholesale Markets
3. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
4. Secured outsourcing towards a cloud computing environment based on DNA cryptography
5. CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
6. Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing
7. Data security in cloud computing using AES
8. Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage
9. An Efficient Multi-User Searchable Encryption Scheme without Query Transformation Over Outsourced
10. Efficient Traceable Authorization Search system cloud storage
11. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
12. Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
13. Efficient Algorithm for Secure Outsourcing of Modular Exponentiation with Single Server
14. Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage
15. SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud
16. Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
17. Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets
18. Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment
19. Disaggregated Cloud Memory with Elastic Block Management
20. A New Lightweight Symmetric Searchable Encryption Scheme for String Identification
21. Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols
22. Hierarchical Cloud Computing Architecture for Context-Aware IoT Services
23. Data security in cloud computing using AES under HEROKU cloud
24. Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
25. Ensemble learning methods for power system cyber-attack detection
26. Secure and Efficient Privacy-Preserving Cipher text Retrieval in Connected Vehicular Cloud Computing
27. Security and QoS guarantee-based resource allocation within cloud computing environment
28. Designing and evaluating hybrid storage for high performance cloud computing
29. Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing
30. Reliability Enhancement in Cloud Computing Via Optimized Job Scheduling Implementing Reinforcement Learning Algorithm and Queuing Theory
31. A VHO scheme for supporting healthcare services in 5G vehicular cloud computing systems
32. TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone
33. An Efficient Parallel Implicit Solver for LOD-FDTD Algorithm in Cloud Computing Environment
34. Design and implementation of vsStor: A large-scale video surveillance storage system/a>
35. DwarfGC: A Space-Efficient and Crash-Consistent Garbage Collector in NVM for Cloud Computing
36. A Novel Forwarding Policy under Cloud Radio Access Network with Mobile Edge Computing Architecture
37. Prediction Based Mobile Data Offloading in Mobile Cloud Computing
38. Transparency service model for data security in cloud computing
39. Secured outsourcing towards a cloud computing environment based on DNA cryptography
40. Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing
41. Intelligent Health Vessel ABC-DE: An Electrocardiogram Cloud Computing Service
42. Reducing Energy Consumption With Cost Budget Using Available Budget Preassignment in Heterogeneous Cloud Computing Systems
43. Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
44. Competitions Among Service Providers in Cloud Computing: A New Economic Model
45. Provably Secure Fine-Grained Data Access Control over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications
46. Context-aware reinforcement learning-based mobile cloud computing for Telemonitoring
47. Scene text detection based on enhanced multi-channels MSER and a fast text grouping process
48. SMDP-Based Coordinated Virtual Machine Allocations in Cloud-Fog Computing Systems
49. Component Importance Analysis of Mobile Cloud Computing System in the Presence of Common-Cause Failures
50. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
51. Impacts of public transportation fare reduction policy on urban public transport sharing rate based on big data analysis
52. System design for predictive road-traffic information delivery using edge-cloud computing
53. Secure and Efficient Product Information Retrieval in Cloud Computing
54. A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing
55. Semantic-Aware Searching Over Encrypted Data for Cloud Computing
56. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
57. An Offloading Strategy in Mobile Cloud Computing Considering Energy and Delay Constraints
58. Security analysis of homomorphic encryption scheme for cloud computing: Known-plaintext attack
59. Providing Healthcare-as-a-Service Using Fuzzy Rule-Based Big Data Analytics in Cloud Computing
60. Empirical analysis on key influential factors on cultural hegemony construction based on big data
61. Box office forecasting for a cinema with movie and cinema attributes
62. Text sentiment analysis based on multi-granularity joint solution
63. Community detection based on unified Bayesian nonnegative matrix factorization
64. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
65. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
66. Fair Resource Allocation for Data-Intensive Computing in the Cloud
67. Towards Privacy-Preserving Content-Based Image Retrieval in Cloud Computing
68. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
69. MapReduce Scheduling for Deadline-Constrained Jobs in Heterogeneous Cloud Computing Systems
70. Data Transfer Scheduling for Maximizing Throughput of Big-Data Computing in Cloud Systems
71. Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
72. Privacy-Preserving Image Processing in the Cloud
73. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage
74. Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment
75. Message integration and optimization based on substation monitoring information source-side maintenance
76. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
77. Automatic Segmentation of Dynamic Network Sequences with Node Labels
78. Complementary Aspect-Based Opinion Mining
79. Frog Asynchronous Graph Processing on GPU with Hybrid Coloring Model
80. Local and Global Structure Preservation for Robust Unsupervised Spectral Feature Selection
81. Mining Precise Positioning Episode Rules from Event Sequences
82. THINKER Entity Linking System for the Turkish Language
83. Topic Models for Unsupervised Cluster Matching
84. UniWalk Unidirectional Random Walk Based Scalable SimRank Computation over Large Graph
85. Weakly Supervised Deep Embedding for Product Review Sentiment Analysis
86. Provably secure and lightweight identity based authenticated data sharing protocol for the cyber-physical cloud environment
87.
Combining web data extraction and data mining techniques to discover knowledge
88.
Data stream mining in fog computing environment with feature selection using ensemble of swarm search algorithms
89. A brief analysis of the key technologies and applications of educational data mining on online learning platform
90.
Association rules mining analysis of app usage based on mobile traffic flow data
91. Using data mining technique to improve billing system performance in semiconductor industry
92. A technique to aggregate classes of analog fault diagnostic data based on association rule mining
93. Data mining technique with cluster anaysis use K-means algorithm for LQ45 index on Indonesia stock exchange
94. Algorithm Optimization of Anomaly Detection Based on Data Mining
95. Corporate Communication Network and Stock Price Movements: Insights From Data Mining
96. Evaluation of predictive data mining algorithms in soil data classification for optimized crop recommendation
97. Using Data Mining to Predict Hospital Admissions From the Emergency Department
98. Privacy preserving big data mining: association rule hiding using fuzzy logic approach
99. Event detection and identification of influential spreaders in social media data streams
100. Online Internet traffic monitoring system using spark streaming
101. Location prediction on trajectory data: A review
102. Get To The Point: Summarization with Pointer-Generator Networks
103. Security Using Image Processing And Deep Convolutional Neural Networks
104. Research of Image Processing Methods in Publishing Output Systems
105. Privacy-preserving Image Processing in the Cloud
106. Measuring Scour Level using Image Processing
107. Image Processing Based Proposed Drone for Detecting and Controlling Street Crimes
108. Efficient image steganography using graph signal processing
109. A Design Tool for High Performance Image Processing on Multi core Platforms
110. Separable and Reversible Data Hiding in Encrypted Images using Parametric Binary Tree Labeling
111. Spatial and Motion Saliency Prediction Method Using Eye Tracker Data for Video Summarization
112. Robust Foreground Estimation via Structured Gaussian Scale Mixture Modeling
113. Robust Coverless Image Steganography Based on DCT and LDA Topic Classification
114. Robust and Fast Decoding of High Capacity Color QR Codes for Mobile Applications
115. A service migration strategy based on multiple attribute decision in mobile edge computing
116. SaW: Video Analysis in Social Media with Web-Based Mobile Grid Computing
117. MAGA: A Mobility-Aware Computation Offloading Decision for Distributed Mobile Cloud Computing
118. Fair Resource Allocation for System Throughput Maximization in Mobile Edge Computing
119. Classification and Mapping of Adaptive Security for Mobile Computing
120. COAST: A Cooperative Storage Framework for Mobile Transparent Computing Using Device-to-Device Data Sharing
121. Energy Efficient and Deadline Satisfied Task Scheduling in Mobile Cloud Computing
122. A framework for efficient and secured mobility of IoT devices in mobile edge computing
123. Task offloading and resource allocation in mobile-edge computing system
124. Decentralized and Optimal Resource Cooperation in Geo-Distributed Mobile Cloud Computing
125. Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing
126. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing
127. On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services
128. Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services
129. Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology
130. Efficiency network construction of advanced metering infrastructure using Zigbee
131. Differentially Private Mechanisms for Budget Limited Mobile Crowdsourcing
132. Reward or Penalty: Aligning Incentives of Stakeholders in Crowdsourcing
133. Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing
134. A Distributed Truthful Auction Mechanism for Task Allocation in Mobile Cloud Computing
135. Joint latent dirichlet allocation for social tags
136. Mobile multimedia health applications and their potential impacton the human population