Contact at or 8097636691
Responsive Ads Here

Wednesday, 14 March 2018

JAVA – 2016 – 2017 Final Year Projects for B.Tech/B.E & M.Tech/M.E

JAVA – 2016 – 2017 Final Year Projects for B.Tech/B.E & M.Tech/M.E
The below 2016-2017 projects developed with Java & MySQL/Oracle and these projects categorized under different domains below
  • Cloud computing
  • Data mining
  • Image Processing
  • Networking
  • Secure Computing
  • Mobile Computing
  • Software Engineering
  • Parallel & Distributed Systems
  • Information Forensics & Security
  • Multimedia (Social Networking)
  • Fuzzy Systems
S.NoDomainProject Name
1Cloud ComputingA Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2Cloud ComputingA Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3Cloud ComputingAn Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
4Cloud ComputingAn Efficient Privacy-Preserving Ranked Keyword Search Method
5Cloud ComputingCDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
6Cloud ComputingCircuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
7Cloud ComputingCloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
8Cloud ComputingConditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
9Cloud ComputingConjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
10Cloud ComputingDiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
11Cloud ComputingDual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
12Cloud ComputingDynamic and Public Auditing with Fair Arbitration for Cloud Data
13Cloud ComputingEnabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
14Cloud ComputingFine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
15Cloud ComputingGeometric Range Search on Encrypted Spatial Data
16Cloud ComputingIdentity-Based Encryption with Cloud Revocation Authority and Its Applications
17Cloud ComputingIdentity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
18Cloud ComputingProtecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
19Cloud ComputingReal-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
20Cloud ComputingSecure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
21Cloud ComputingSecure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
22Cloud ComputingTMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
23Cloud ComputingA Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
24Cloud ComputingDeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
25Cloud ComputingFlexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
26Cloud ComputingSecRBAC: Secure data in the Clouds
27Data MiningA Novel Recommendation Model Regularized with User Trust and Item Ratings
28Data MiningAutomatically Mining Facets for Queries from Their Search Results
29Data MiningBooster in High Dimensional Data Classification
30Data MiningBuilding an intrusion detection system using a filter-based feature selection algorithm
31Data MiningConnecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
32Data MiningCross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
33Data MiningCrowdsourcing for Top-K Query Processing over Uncertain Data
34Data MiningCyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
35Data MiningDomain-Sensitive Recommendation with User-Item Subgroup Analysis
36Data MiningEfficient Algorithms for Mining Top-K High Utility Itemsets
37Data MiningEfficient Cache-Supported Path Planning on Roads
38Data MiningMining User-Aware Rare Sequential Topic Patterns in Document Streams
39Data MiningNearest Keyword Set Search in Multi-Dimensional Datasets
40Data MiningRating Prediction based on Social Sentiment from Textual Reviews
41Data MiningLocation Aware Keyword Query Suggestion Based on Document Proximity
42Data MiningUsing Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
43Data MiningQuantifying Political Leaning from Tweets, Retweets, and Retweeters
44Data MiningRelevance Feedback Algorithms Inspired By Quantum Detection
45Data MiningSentiment Embeddings with Applications to Sentiment Analysis
46Data MiningTop-Down XML Keyword Query Processing
47Data MiningTopicSketch: Real-time Bursty Topic Detection from Twitter
48Data MiningTop-k Dominating Queries on Incomplete Data
49Data MiningUnderstanding Short Texts through Semantic Enrichment and Hashing
50NetworkingA Stable Approach for Routing Queries in Unstructured P2P Networks
51NetworkingiPath: Path Inference in Wireless Sensor Networks
52NetworkingOpportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
53NetworkingSpatial Reusability-Aware Routing in Multi-Hop Wireless Networks
54NetworkingSTAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
55Mobile ComputingEnergy and Memory Efficient Clone Detection in Wireless Sensor Networks
56Mobile ComputingEPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
57Mobile ComputingSecure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
58Mobile ComputingDetecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
59Parallel & Distributed SystemsA Hop-by-Hop Routing Mechanism for Green Internet
60Parallel & Distributed SystemsContinuous Answering Holistic Queries over Sensor Networks
61Parallel & Distributed SystemsDictionary Based Secure Provenance Compression for Wireless Sensor Networks
62Parallel & Distributed SystemsThe Server Provisioning Problem for Continuous Distributed Interactive Applications
63Secure ComputingContributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
64Secure ComputingData Lineage in Malicious Environments
65Secure ComputingDetecting Malicious Facebook Applications
66Secure ComputingFRoDO: Fraud Resilient Device for Off-Line Micro-Payments
67Secure ComputingInference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
68Secure ComputingResolving Multi-party Privacy Conflicts in Social Media
69Information Forensics & SecurityHidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
70Information Forensics & SecurityOptimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
71Information Forensics & SecurityPrivacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
72Information Forensics & SecurityProfiling Online Social Behaviors for Compromised Account Detection
73Image ProcessingA Locality Sensitive Low-Rank Model for Image Tag Completion
74Image ProcessingA Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
75Image ProcessingLearning of Multimodal Representations with Random Walks on the Click Graph
76Image ProcessingOnline Multi-Modal Distance Metric Learning with Application to Image Retrieval
77Image ProcessingTag Based Image Search by Social Re-ranking
78Multimedia (Social Networking)Social Friend Recommendation Based on Multiple Network Correlation
79Multimedia (Social Networking)User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
80Software EngineeringMapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation
81Software EngineeringMetamorphic Testing for Software Quality Assessment: A Study of Search Engines
82Software EngineeringSITAR: GUI Test Script Repair
83Fuzzy SystemsAnswering Approximate Queries over XML Data

No comments:

Post a Comment