Java IEEE Projects

2016-2017 IEEE JAVA PROJECT TITLES:

CLOUD COMPUTING PROJECT TITLES:

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

An Efficient Privacy-Preserving Ranked Keyword Search Method

CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System

Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing

CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds

DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

Dynamic and Public Auditing with Fair Arbitration for Cloud Data

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services

Geometric Range Search on Encrypted Spatial Data

Identity-Based Encryption with Cloud Revocation Authority and Its Applications

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud

Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems

Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing

DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

SecRBAC: Secure data in the Clouds

DATA MINING PROJECT TITLES

A Novel Recommendation Model Regularized with User Trust and Item Ratings

Automatically Mining Facets for Queries from Their Search Results

Booster in High Dimensional Data Classification

Building an intrusion detection system using a filter-based feature selection algorithm

Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information

Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings

Crowdsourcing for Top-K Query Processing over Uncertain Data

Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder

Domain-Sensitive Recommendation with User-Item Subgroup Analysis

Efficient Algorithms for Mining Top-K High Utility Itemsets

Efficient Cache-Supported Path Planning on Roads

Mining User-Aware Rare Sequential Topic Patterns in Document Streams

Nearest Keyword Set Search in Multi-Dimensional Datasets

Rating Prediction based on Social Sentiment from Textual Reviews

Location Aware Keyword Query Suggestion Based on Document Proximity

Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs

Quantifying Political Leaning from Tweets, Retweets, and Retweeters

Relevance Feedback Algorithms Inspired By Quantum Detection

Sentiment Embeddings with Applications to Sentiment Analysis

Top-Down XML Keyword Query Processing

TopicSketch: Real-time Bursty Topic Detection from Twitter

Top-k Dominating Queries on Incomplete Data

Understanding Short Texts through Semantic Enrichment and Hashing

NETWORKING PROJECT TITLES

A Stable Approach for Routing Queries in Unstructured P2P Networks

iPath: Path Inference in Wireless Sensor Networks

Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks

Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

MOBILE COMPUTING PROJECT TITLES

Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data

Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach

Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach

PARALLEL AND DISTRIBUTED SYSTEMS PROJECT TITLES

A Hop-by-Hop Routing Mechanism for Green Internet

Continuous Answering Holistic Queries over Sensor Networks

Dictionary Based Secure Provenance Compression for Wireless Sensor Networks

The Server Provisioning Problem for Continuous Distributed Interactive Applications

SECURE COMPUTING PROJECT TITLES

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts

Data Lineage in Malicious Environments

Detecting Malicious Facebook Applications

FRoDO: Fraud Resilient Device for Off-Line Micro-Payments

Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata

Resolving Multi-party Privacy Conflicts in Social Media

INFORMATION FORENSICS AND SECURITY PROJECT TITLES

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data

Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms

Profiling Online Social Behaviors for Compromised Account Detection

IMAGE PROCESSING PROJECT TITLES

A Locality Sensitive Low-Rank Model for Image Tag Completion

A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks

Learning of Multimodal Representations with Random Walks on the Click Graph

Online Multi-Modal Distance Metric Learning with Application to Image Retrieval

Tag Based Image Search by Social Re-ranking

MULTIMEDIA PROJECT TITLES

Social Friend Recommendation Based on Multiple Network Correlation

User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors

SOFTWARE ENGINEERING PROJECT TITLES

Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation

Metamorphic Testing for Software Quality Assessment: A Study of Search Engines

SITAR: GUI Test Script Repair

FUZZY SYSTEMS PROJECT TITLES

Answering Approximate Queries over XML Data

S.No
Code
Title
Category
1
JPJ1501
A Hybrid Cloud Approach for Secure Authorized Deduplication
CLOUD COMPUTING
2
JPJ1502
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
CLOUD COMPUTING
3
JPJ1503
A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
CLOUD COMPUTING
4
JPJ1504
A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
CLOUD COMPUTING
5
JPJ1505
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
CLOUD COMPUTING
6
JPJ1506
An Authenticated Trust and Reputation Calculation and Management System for Cloud and Sensor Networks Integrati
CLOUD COMPUTING
7
JPJ1507
Audit-Free Cloud Storage via Deniable Attribute-based Encryption
CLOUD COMPUTING
8
JPJ1508
Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
CLOUD COMPUTING
9
JPJ1509
CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
CLOUD COMPUTING
10
JPJ1510
Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption
CLOUD COMPUTING
11
JPJ1511
Enabling Cloud Storage Auditing With Key-Exposure Resistance
CLOUD COMPUTING
12
JPJ1512
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
CLOUD COMPUTING
13
JPJ1513
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
CLOUD COMPUTING
14
JPJ1514
Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage
CLOUD COMPUTING
15
JPJ1515
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
CLOUD COMPUTING
16
JPJ1516
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
CLOUD COMPUTING
17
JPJ1517
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
CLOUD COMPUTING
18
JPJ1518
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
CLOUD COMPUTING
19
JPJ1519
Secure Auditing and Deduplicating Data in Cloud
CLOUD COMPUTING
20
JPJ1520
Stealthy Denial of Service Strategy in Cloud Computing
CLOUD COMPUTING
21
JPJ1521
Best Keyword Cover Search
DATA MINING
22
JPJ1522
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
DATA MINING
23
JPJ1523
Context-Based Diversification for Keyword Queries over XML Data
DATA MINING
24
JPJ1524
Discovery of Ranking Fraud for Mobile Apps
DATA MINING
25
JPJ1525
Malware Propagation in Large-Scale Networks
DATA MINING
26
JPJ1526
On Summarization and Timeline Generation for Evolutionary Tweet Streams
DATA MINING
27
JPJ1527
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
DATA MINING
28
JPJ1528
Progressive Duplicate Detection
DATA MINING
29
JPJ1529
Reverse Nearest Neighbors in Unsupervised Distance-Based Outlier Detection
DATA MINING
30
JPJ1530
Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services
DATA MINING
31
JPJ1531
Scalable Constrained Spectral Clustering
DATA MINING
32
JPJ1532
Towards Effective Bug Triage with Software Data Reduction Techniques
DATA MINING
33
JPJ1533
Tweet Segmentation and Its Application to Named Entity Recognition
DATA MINING
34
JPJ1534
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
NETWORKING
35
JPJ1535
A Proximity-Aware Interest-Clustered P2P File Sharing System
NETWORKING
36
JPJ1536
Detecting Malicious Facebook Applications
NETWORKING
37
JPJ1537
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File Sharing
NETWORKING
38
JPJ1538
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
MOBILE COMPUTING
39
JPJ1539
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
MOBILE COMPUTING
40
JPJ1540
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
MOBILE COMPUTING
41
JPJ1541
User-Defined Privacy Grid System for Continuous Location-Based Services
MOBILE COMPUTING
42
JPJ1542
A Computational Dynamic Trust Model for User Authorization
SECURE COMPUTING
43
JPJ1543
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Network
SECURE COMPUTING
44
JPJ1544
Continuous and Transparent User Identity Verification for Secure Internet Services
SECURE COMPUTING
45
JPJ1545
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
SECURE COMPUTING
46
JPJ1546
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
SECURE COMPUTING
47
JPJ1547
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
SECURE COMPUTING
48
JPJ1548
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
SECURE COMPUTING
49
JPJ1549
Secure Spatial Top-k Query Processing via Untrusted Location- Based Service Providers
SECURE COMPUTING
50
JPJ1550
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
51
JPJ1551
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
PARALLEL & DISTRIBUTED SYSTEMS
52
JPJ1552
Secure Distributed Deduplication Systems with Improved Reliability
PARALLEL & DISTRIBUTED SYSTEMS
53
JPJ1553
A Framework for Secure Computations with Two Non-Colluding Servers and Multiple Clients, Applied to Recommendat
INFORMATION FORENSICS AND SECURITY
54
JPJ1554
Effective Key Management in Dynamic Wireless Sensor Networks
INFORMATION FORENSICS AND SECURITY
55
JPJ1555
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
INFORMATION FORENSICS AND SECURITY
56
JPJ1556
Passive IP Traceback: Disclosing the Locations of IP Spoofers from Path Backscatter
INFORMATION FORENSICS AND SECURITY
57
JPJ1557
Software Puzzle: A Countermeasure to Resource-Inflated Denialof- Service Attacks
INFORMATION FORENSICS AND SECURITY
58
JPJ1558
An Attribute-Assisted Reranking Model for Web Image Search
IMAGE PROCESSING
59
JPJ1559
EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
IMAGE PROCESSING
60
JPJ1560
Learning to Rank Image Tags With Limited Training Examples
IMAGE PROCESSING
61
JPJ1561
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
SERVICE COMPUTING (WEB SERVICE)
62
JPJ1562
Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
SERVICE COMPUTING (WEB SERVICE)
63
JPJ1563
A Fuzzy Preference Tree-Based Recommender System for Personalized Business-to-Business E-Services
FUZZY SYSTEMS
64
JPJ1564
Prediction of Atomic Web Services Reliability for QoS-Aware Recommendation
SERVICE COMPUTING (WEB SERVICE)
65
JPJ1565
Real-Time Detection of Traffic From Twitter Stream Analysis
DATA MINING
66
JPJ1566
t-Closeness through Microaggregation: Strict Privacy with Enhanced Utility Preservation
DATA MINING
S.No
Code
Title
Category
1
JPJ1401
A Hybrid Cloud Approach for Secure Authorized Deduplication
CLOUD COMPUTING
2
JPJ1402
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
CLOUD COMPUTING
3
JPJ1403
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
CLOUD COMPUTING
4
JPJ1404
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
CLOUD COMPUTING
5
JPJ1405
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
CLOUD COMPUTING
6
JPJ1406
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
CLOUD COMPUTING
7
JPJ1407
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
CLOUD COMPUTING
8
JPJ1408
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CLOUD COMPUTING
9
JPJ1409
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
CLOUD COMPUTING
10
JPJ1410
PACK Prediction-Based Cloud Bandwidth and Cost Reduction System
CLOUD COMPUTING
11
JPJ1411
Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
CLOUD COMPUTING
12
JPJ1412
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
CLOUD COMPUTING
13
JPJ1413
Towards Differential Query Services in Cost-Efficient Clouds
CLOUD COMPUTING
14
JPJ1414
A Cocktail Approach for Travel Package Recommendation
DATA MINING
15
JPJ1415
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
DATA MINING
16
JPJ1416
BestPeer++ A Peer-to-Peer Based Large-Scale Data Processing Platform
DATA MINING
17
JPJ1417
Data Mining with Big Data
DATA MINING
18
JPJ1418
Dealing With Concept Drifts in Process Mining
DATA MINING
19
JPJ1419
Discovering Emerging Topics in Social Streams via Link-Anomaly Detection
DATA MINING
20
JPJ1420
Efficient Prediction of Difficult Keyword Queries over Databases
DATA MINING
21
JPJ1421
Facilitating Document Annotation Using Content and Querying Value
DATA MINING
22
JPJ1422
Fast Nearest Neighbor Search with Keywords
DATA MINING
23
JPJ1423
Keyword Query Routing
DATA MINING
24
JPJ1424
Privacy-Preserving and Content-Protecting Location Based Queries
DATA MINING
25
JPJ1425
Security Evaluation of Pattern Classifiers under Attack
DATA MINING
26
JPJ1426
Supporting Privacy Protection in Personalized Web Search
DATA MINING
27
JPJ1427
Towards Online Shortest Path Computation
DATA MINING
28
JPJ1428
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
SECURE COMPUTING
29
JPJ1429
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
SECURE COMPUTING
30
JPJ1430
PROFILR Toward Preserving Privacy and Functionality in Geosocial Networks
SECURE COMPUTING
31
JPJ1431
Top-k Query Result Completeness Verification in Tiered Sensor Networks
SECURE COMPUTING
32
JPJ1432
Automatic Test Packet Generation
NETWORKING
33
JPJ1433
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
NETWORKING
34
JPJ1434
Boundary Cutting for Packet Classification
NETWORKING
35
JPJ1435
SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS
NETWORKING
36
JPJ1436
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
37
JPJ1437
Exploiting Service Similarity for Privacy in Location-Based Search Queries
PARALLEL & DISTRIBUTED SYSTEMS
38
JPJ1438
LocaWard A Security and Privacy Aware Location-Based Rewarding System
PARALLEL & DISTRIBUTED SYSTEMS
39
JPJ1439
On False Data-Injection Attacks against Power System State Estimation Modeling and Countermeasures
PARALLEL & DISTRIBUTED SYSTEMS
40
JPJ1440
RRE: A Game-Theoretic Intrusion Response and Recovery Engine
PARALLEL & DISTRIBUTED SYSTEMS
41
JPJ1441
Securing Broker-Less PublishSubscribe Systems Using Identity-Based Encryption
PARALLEL & DISTRIBUTED SYSTEMS
42
JPJ1442
SOS A Distributed Mobile Q&A System Based on Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
43
JPJ1443
The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Eva
PARALLEL & DISTRIBUTED SYSTEMS
44
JPJ1444
The Design and Evaluation of An Information Sharing System for Human Networks
PARALLEL & DISTRIBUTED SYSTEMS
45
JPJ1445
Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
PARALLEL & DISTRIBUTED SYSTEMS
46
JPJ1446
Secure Outsourced Attribute-based Signatures
PARALLEL & DISTRIBUTED SYSTEMS
47
JPJ1447
An Incentive Framework for Cellular Traffic Offloading
MOBILE COMPUTING
48
JPJ1448
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
MOBILE COMPUTING
49
JPJ1449
Efficient Authentication for Mobile and Pervasive Computing
MOBILE COMPUTING
50
JPJ1450
Friendbook A Semantic-based Friend Recommendation System for Social Networks
MOBILE COMPUTING
51
JPJ1451
Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices
MOBILE COMPUTING
52
JPJ1452
Privacy-Enhanced Web Service Composition
SERVICE COMPUTING (Web Service)
53
JPJ1453
Web Service Recommendation via Exploiting Location and QoS Information
SERVICE COMPUTING (Web Service)
54
JPJ1454
Privacy Preserving Delegated Access Control in Public Clouds
CLOUD COMPUTING
55
JPJ1455
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
CLOUD COMPUTING
56
JPJ1456
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
CLOUD COMPUTING
57
JPJ1457
Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Syn
CLOUD COMPUTING
58
JPJ1458
XSPath: Navigation on XML Schemas Made Easy
DATA MINING
59
JPJ1459
m-Privacy for Collaborative Data Publishing
DATA MINING
60
JPJ1460
Dynamic Query Forms for Database Queries
DATA MINING
61
JPJ1461
K-Anonymity for Crowdsourcing Database
DATA MINING
62
JPJ1462
A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
DATA MINING
63
JPJ1463
Abductive Analysis of Administrative Policies in Rule-Based Access Control
SECURE COMPUTING
64
JPJ1464
Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks
SECURE COMPUTING
65
JPJ1465
Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection
SECURE COMPUTING
66
JPJ1466
Malware Propagation in Large-Scale Networks
SECURE COMPUTING
67
JPJ1467
Multi-Path Routing and Forwarding in Non-Cooperative Wireless Networks
PARALLEL & DISTRIBUTED SYSTEMS
68
JPJ1468
SocialTube: P2P-Assisted Video Sharing in Online Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
69
JPJ1469
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks
PARALLEL & DISTRIBUTED SYSTEMS
70
JPJ1470
Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
PARALLEL & DISTRIBUTED SYSTEMS
71
JPJ1471
A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless Sensor Network
NETWORKING
72
JPJ1472
Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
MULTIMEDIA
73
JPJ1473
Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
SERVICE COMPUTING
74
JPJ1474
Image Search Reranking With Query-Dependent Click-Based Relevance Feedback
IMAGE PROCESSING
75
JPJ1475
Probabilistic Aspect Mining Model for Drug Reviews
DATA MINING
76
JPJ1476
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
PARALLEL & DISTRIBUTED SYSTEMS
77
JPJ1477
LARS*: An Efficient and Scalable Location-Aware Recommender System
DATA MINING