0% found this document useful (0 votes)
39 views3 pages

Web Application Titles

vhmvm

Uploaded by

sudhir kc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views3 pages

Web Application Titles

vhmvm

Uploaded by

sudhir kc
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

VEDHA TECHNOLOGIES

IEEE JAVA 2024-2025 TOPICS

Sl.No 2024 & 2025 Project Title


WEB APPLICATIONS

1 Item Recommendation for Word of Mouth Scenario in Social ECommerce

2 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks

3 Achieving Efficient Secure Deduplication with User-Defined Access Control

4 Asymmetric Hash Code Learning for Remote Sensing Image Retrieval

5 Attacking and Protecting Data Privacy in Edge Cloud Collaborative Inference Systems

6 Auction based Resource Allocation Mechanism

7 Audience behavior mining integrating TV rating with multi-media content

8 Big Data Clustering Algorithm For Mitigating The Risk Of Customer Churn

9 BOEW A Content-Based Image Retrieval Scheme

10 Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval

11 Clustering and category used in Clinical Health Database

12 Composite Behavioral Modeling for Identity Theft Detection


VEDHA TECHNOLOGIES
IEEE JAVA 2024-2025 TOPICS

13 Intelligent Distribution of Fresh Agricultural Products in Smart City

14
CryptoMaze Privacy-Preserving Splitting of Off-Chain Payments
15
Data Integrity Audit Scheme Based on Blockchain Expansion Technology
16
Distributed Faulty Node Detection in Delay Tolerant Networks Design and Analysis
17
Auction based Resource Allocation Mechanism in Federated Cloud Environment TARA
18 Resolving Multi-Party Privacy Conflicts in Social Media

19
Automated Detecting Spammers In Social Media
20
NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media
21
Improvising Personalized Travel Recommendation System with Recency Effects

22 Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval
23
Highly Efficient And Low Power Usage Is Essential For Cloud Computing
24 Performance and Power consumption evaluation in smart phone based image processing
25 Privacy Preserving and Reducing Communication Complexity Based on Database Query
Scheme
26
QOS Recommendation in Cloud Services
27 Secure Cloud Data Deduplication with Efficient Reencryption
VEDHA TECHNOLOGIES
IEEE JAVA 2024-2025 TOPICS

28
Security challenges can be mitigated with cryptography and steganography techniques
29
User Identity Linkage via Co-Attentive Neural Network
30
Privacy Preserving Electronic Ticket Scheme with Attribute Based Credentials
31
HinCTI A Cyber Threat Intelligence Modeling and Identification System
32
Global-Aware Ranking Deep Metric Learning for Remote Sensing Image Retrieval
33
Enabling Trust and Privacy Preserving e-KYC System Using Blockchain
34
FADOHS Framework for Detection and Integration
35
FRoDO Fraud Resilient Device for Off-Line Micro-Payments
36
NetSpam a Network-based Spam Detection Framework for Reviews in Online Social Media
37
Intelligent Distribution of Fresh Agricultural Products in Smart City
38 Audience behavior mining integrating TV rating with multi-media content
39

Secure Data Group Sharing and Conditional Dissemination with Multi-Owner


40 DSAS A secure data sharing and authized searchable framework for e-health care
system

41
Social Media and Misleading Information in a Democracy A Mechanism Design
Approach

You might also like