You are on page 1of 3

OPTIMUS

TECHNOCRATES (INDIA) PVT.LTD


www.optimustechno.com

IEEE 2016 JAVA| .NET TITLES


CLOUD COMPUTING
1. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption JAVA
2. Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced
Search Authorization in the Cloud JAVA
3. SECRBAC: Secure data in the Clouds - .NET
4. CDstore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal JAVA
5. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing - .NET
MULTIMEDIA
6. A Locality Sensitive Low-Rank Model for Image Tag Completion JAVA
7. Tag based image search by social re-ranking JAVA
8. Rating prediction based on social sentiment from textual reviews JAVA
WIRELESS SENSOR NETWORKS
9. Activetrust: Secure and Trustable Routing in Wireless Sensor Networks JAVA
10. Efficient Certificateless Access Control for Wireless Body Area Networks- .NET
NETWORKING
11. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing - .NET
12. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing - .NET & JAVA
13. Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing - .NET
DEPENDABLE AND SECURE COMPUTING
14. A Shoulder Surfing Resistant Graphical Authentication System JAVA & .NET
INFORMATION FORENSICS AND SECURITY
15. 2DCRYPT: Image Scaling and Cropping in Encrypted Domains JAVA
16. Privacy preserving outsourced association rule mining on vertically partitioned databases - .NET
SECURITY COMPUTING
Third Floor , TNR Complex , Near A.T.C Bus Dippo, New Bus stand , Salem - 636004.
Mob: 9043308111, Ph : 0427-4041555 Email : optimus.projects2016@gmail.com

OPTIMUS
TECHNOCRATES (INDIA) PVT.LTD
www.optimustechno.com
17. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection - .NET
18. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud JAVA
19. Fast Detection of Transformed Data Leaks JAVA
20. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates JAVA
21. Server-Aided Public Key Encryption With Keyword Search .NET
22. Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services .NET
23. Server-Aided Public Key Encryption With Keyword Search JAVA
24. Two-Factor Data Security Protection Mechanism for Cloud Storage System - .NET
MOBILE COMPUTING
25. EPLQ: efficient privacy-preserving location-based query over outsourced encrypted data - .NET
26. An Optimization Framework for Mobile Data Collection in Energy-Harvesting Wireless Sensor Networks
- .NET
27. Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach - .NET
28. WORAL A Witness Oriented Secure Location Provenance Framework for Mobile Devices - .NET
29. Bilevel Feature Extraction-Based Text Mining for Fault Diagnosis of Railway Systems .NET
KNOWLEDGE AND DATA ENGINEERING
30. Privacy preserving outsourced media search - .NET
31. Online Subgraph Skyline Analysis Over Knowledge Graphs - .NET
32. RSKNN: KNN search on road networks by Incorporating social influence JAVA
33. Nearest Keyword Set Search in Multi-dimensional Datasets JAVA
34. A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks JAVA
35. Relevance Feedback Algorithms Inspired By Quantum Detection - .NET
36. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments JAVA
37. Clustering Data Streams Based on Shared Density between Micro-Clusters JAVA
38. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation JAVA
DATA MINING OR KNOLEDGE OF DATA ENGINEERING
39. Topicsketch: Real-time Bursty Topic Detection from Twitter - .NET
40. Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems JAVA
41. Mining Health Examination Records A Graph-based Approach JAVA
42. Crawling Hidden Objects with kNN Queries .NET
43. DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud JAVA
44. The Impact of Review Environment on Review Credibility .NET
IMAGE PROCESSING
45. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation - .NET
Third Floor , TNR Complex , Near A.T.C Bus Dippo, New Bus stand , Salem - 636004.
Mob: 9043308111, Ph : 0427-4041555 Email : optimus.projects2016@gmail.com

OPTIMUS
TECHNOCRATES (INDIA) PVT.LTD
www.optimustechno.com
BIG DATA
46. Visual Exploration of Changes in Passenger Flows and Tweets on Mega-City Metro Network - .NET
47. Personalized Travel sequence recommendation on multi-source big social media JAVA
PARALLEL AND DISTRIBUTED SYSTEMS
48. Online Resource Scheduling under Concave Pricing for Cloud Computing JAVA
49. FiDoop-DP: Data Partitioning in Frequent Itemset Mining on Hadoop Clusters JAVA
50. A Crowdsourcing Worker Quality Evaluation Algorithm on MapReduce forBig Data Applications JAVA

..connecting you to the


power of IT
Third Floor , TNR Complex , Near A.T.C Bus Dippo, New Bus stand , Salem - 636004.
Mob: 9043308111, Ph : 0427-4041555 Email : optimus.projects2016@gmail.com

You might also like