JAVA Application Projects
1 |
Extended
AES with Custom Configurable Encryption |
2 |
A
BigData approach for classification and prediction of student result using
MapReduce |
3 |
Distributed
Data Mining with Differential Privacy |
4 |
Critical
study on Data Mining with IDSS using RAPID technique for Diabetes |
5 |
Online
Book Buying and Selling Portal |
6 |
Towards
Effective Bug Triage with Software Data Reduction Techniques |
7 |
Bike
Store Management System |
8 |
Blood
Bank Management System |
9 |
Computer
Inventory System |
10 |
Data
Security With Third Party Admin In Cloud Storage |
11 |
Employee
Payroll Management System |
12 |
Ensuring
Security Using EMF Technique |
13 |
Hospital
Management System |
14 |
Intelligent
Backup of High Frequency Using Data Files in Cloud Storage |
15 |
Online
Nodue Management System |
16 |
Online
Toll Gate Management System |
17 |
Student
Mentoring System |
18 |
Tuition
Management System |
19 |
Online
Book Recommendation System using Social Trust in Social Network |
20 |
Connecting
Social Media to E-Commerce |
21 |
Online
Product Review using Sentiment Analysis |
22 |
Top-K
Query Processing |
23 |
Detection
of Bullying Messages in Social Media |
24 |
Hotel
Management System |
25 |
Hashtag
based Topic Modeling in Social Media |
26 |
Understanding
Short Texts through Semantic Enrichment and Hashing |
27 |
Data
Lineage in Malicious Environments |
28 |
Fraud
Resilient Device for Off-Line Micro-Payments |
29 |
Inference
Attack on Browsing History of Twitter Users using Public Click Analytics and
Twitter Metadata |
30 |
Profiling
Online Social Behaviors for Compromised Account Detection |
31 |
Airline
Reservation System |
32 |
Building
web applications on top of encrypted data using Mylar |
33 |
College
Management System |
34 |
Data
security model for Cloud Computing using V-GRT methodology |
35 |
Designing
High Performance Web-Based Computing Services to Promote Telemedicine
Database Management System |
36 |
Detecting
Malicious Facebook Applications |
37 |
Discovery
of Ranking Fraud for Mobile Apps |
38 |
Employee
Attendance System using QR Code |
39 |
Designing
High Performance Web-Based Computing Services to Promote Telemedicine
Database Management System |
40 |
EMR:
A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
41 |
Encrypted
Data Storage Vs Data Against illegal Access |
42 |
E-TENDER |
43 |
Face
Recognition in Social Networks Using Big Data |
44 |
Human
Resource Management System |
45 |
Improved
Privacy-Preserving P2P Multimedia Distribution Based on Recombined
Fingerprints |
46 |
Integration
of Cloud and Sensor Networks with Novel Authentication |
47 |
Learning
to Rank Image Tags With Limited Training Examples |
48 |
Location
Based Service System with User Ratings and Comments |
49 |
Location-Aware
and Personalized Collaborative Filtering for Web Service Recommendation |
50 |
Mining
Online Product Evaluation System based on Ratings and Review Comments |
51 |
Natural
Language Interface to Database |
52 |
Online
Allegation |
53 |
Online
Banking System with Email OTP |
54 |
Online
Bug Tracking System |
55 |
Online
College Counselling system |
56 |
Online
Content Based Image Retrieval System with Ranking Model |
57 |
Online
Crime File Management System |
58 |
Online
Dictionary |
59 |
Online
Employee Tracking System |
60 |
Online
Product Rating System with Dynamic Trust model for User Authorization |
61 |
Online
Student Attendance Management System (with Parent Notification on Leave) |
62 |
Personalized
Movie Recommendation System |
63 |
Privacy
Policy Inference of User-Uploaded Images on Content Sharing Sites |
64 |
Real-Time
Detection of Traffic from Twitter Stream Analysis |
65 |
Resource
management system |
66 |
Resource
Monitor |
67 |
Route-Saver:
Leveraging Route APIs for Accurate and Efficient Query Processing at
Location-Based Services |
68 |
Secure
Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
69 |
Secure
Online Product Recommendation System |
70 |
Secure
Overlay Cloud Storage with Access Control |
71 |
Twitter
Based Tweet Summarization |
72 |
Twitter
Message Segmentation |
73 |
User
Rating based Location Information System |
74 |
Using
Opinion Mining Techniques in Tourism |
75 |
Video
Fraud Detecting On social Network |
76 |
WebCrawler:
Web Server Performance Testing Tool |
77 |
A
Cocktail Approach for Travel Package Recommendation |
78 |
A
Novel Privacy-Preserving Public Auditing for Group Data in the Cloud |
79 |
An
Efficient Certificateless Encryption for Secure Data Sharing in Public Cloud |
80 |
An
Incentive Framework for Cellular Traffic Offloading |
81 |
Analyze
Drifts in Business |
82 |
Approximate
Distance Finder with Fast nearest Neighbor Search with Keywords |
83 |
Cloud
Data Center Load Balancing Strategy based on QoS |
84 |
Decentralized
Access Control with Anonymous Authentication of Data Stored in Clouds |
85 |
Dynamic
Query Forms for Database Queries |
86 |
Efficient
Authentication for Mobile and Pervasive Computing |
87 |
Efficient
Information Retrieval Using Ranked Query |
88 |
Enabling
Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks |
89 |
Enhanced
Secure Login System using Captcha as Graphical Passwords |
90 |
Expressive,
Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage |
91 |
Facilitating
Document Annotation using Content and Querying Value |
92 |
Friendbook
A Semantic-based Friend Recommendation System for Social Networks |
93 |
Image
Search Reranking With Query-Dependent Click-Based Relevance Feedback |
94 |
K-Anonymity
for Crowdsourcing Database |
95 |
Live
Traffic Index based Online Shortest Path Computation |
96 |
LocaWard
A Security and Privacy Aware Location-Based Rewarding System |
97 |
Malicious
Feedback Rating Prevention in e-Commerce Sites |
98 |
Multi-keyword
Ranked Search over Encrypted Cloud Data Supporting Synonym Query |
99 |
Prediction-Based
Cloud Bandwidth and Cost Reduction System |
100 |
Privacy
Preserving Delegated Access Control in Public Clouds |
101 |
Privacy-Preserving
and Content-Protecting Location Based Queries |
102 |
Privacy-Preserving
Mechanism for Secure Medical Data |
84 |
Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data |
85 |
Probabilistic
Aspect Mining Model for Drug Reviews |
86 |
Random
space perturbation (RASP) based secure and efficient range query and kNN
query services for protected data in the cloud |
87 |
RRE
A Game-Theoretic Intrusion Response and Recovery Engine |
88 |
Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data |
89 |
Scalable
Distributed Service Integrity Attestation for Software |
90 |
Secure
Out sourced Attribute |
91 |
Securing
Broker-Less Publish Subscribe Systems Using Identity-Based Encryption |
92 |
Security
in Privacy for Medical Data Health Records |
93 |
SocialTube
P2P-assisted Video Sharing in Online Social Networks |
94 |
SOS
A Distributed Mobile Q&A System
Based on Social Networks |
95 |
Spam
Filter based Security Evaluation of Pattern Classifiers under Attack |
96 |
Supporting
Authorized Duplicate Check in a Hybrid Cloud Architecture |
97 |
Supporting
Privacy Protection in Personalized Web Search |
98 |
Tag
Recommendation for Photos on Social Websites |
99 |
The
Client Assignment Problem for Continuous Distributed Interactive Applications |
100 |
Toward
Preserving Privacy and Functionality in Geosocial Networks |
101 |
User-centric
location-based service for Privacy in Queries |
102 |
Web
Service Recommendation via Exploiting Location and QoS Information |
103 |
A
Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia |
104 |
A
Secure Cloud Server System using Proxy Re-Encryption Model |
105 |
A
Secure payment System for banking transactions |
106 |
An
efficient Mailing System for Detecting Spam Mails |
107 |
Annotating
Search Results from Web Databases |
108 |
Anonymization
for Secure Data in Web |
109 |
Attribute-based
Encryption System for Secured Data Storage |
110 |
Automatic
Testing System for Web Application |
111 |
Boolean
Retrieval for Medical datas |
112 |
Cloud
Data Protection for the Masses |
113 |
CloudMov:
Cloud based Video Streaming System |
114 |
Clustering
Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm |
115 |
Continuous
query processing system for location based services |
116 |
Cooperative
Secure Multi-Cloud Verification System |
117 |
Detecting
Complaints in Online Product Purchase |
118 |
Detecting
false users in Online Rating system & Securing Reputation |
119 |
Distributed
data integration on electricity board |
120 |
Dynamic
Assignments of Clients to Servers based on Load |
121 |
Dynamic
Resource allocation in Cloud |
122 |
Earthquake
Reporting System using Social Networking Site |
123 |
Efficient
and secure search on encrypted medical data |
124 |
E-Fraud
Prevention based on the Self-Authentication of e-Documents |
125 |
Enabling
Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems |
126 |
Enhanced
Security Scheme in Social Networking using XML |
127 |
Error-Tolerant
Resource Allocation and Payment Minimization for Cloud System |
128 |
Facilitating
Effective User Navigation through backtracking |
129 |
Filtering
Unwanted Messages in Online Social Networking User walls |
130 |
Get
your Campus |
131 |
Harnessing
the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations |
132 |
Identity-Based
Secure Distributed Data Storage Schemes |
133 |
Information
leak detection and prevention system |
134 |
Intrusion
Detection and Prevention in Web Servers |
135 |
IPTV
Portal System |
136 |
Load
balancing model for Cloud Data Center |
137 |
Location
Based Search System |
138 |
Multi-Cloud
System to avoid server failures |
139 |
Multiparty
Access Control for Online Social Networks |
140 |
Personalised
Search Engine from user click-through logs |
141 |
Personalized
Image Search System |
142 |
Personalized
QoS-Aware Web Service Recommendation and Visualization |
143 |
Portable
Cloud System |
144 |
Predicting
BMI using Behavioral Outcomes |
145 |
Preserving
data and identity privacy from an untrusted cloud by Multi-Owner Data Sharing |
146 |
Preventing
Intrusion in Web and Database Servers |
147 |
Preventing
Private Information Inference Attacks on Social Networks |
148 |
Privacy
Preserving Data Sharing With Anonymous ID Assignment |
149 |
Privacy
Preserving Delegated Access Control in Cloud Computing |
150 |
Privacy
Protection Scheme in Location Information System |
151 |
Privacy-Preserving
Public Auditing For Secure Cloud Storage |
152 |
Protecting
Sensitive Labels in Social Network Data Anonymization |
153 |
PUBMED:
an efficient biomedical based hierarchical search engine |
154 |
Ranking
and feedback model in search engines |
155 |
Ranking
system for web library |
156 |
Scalable
and Secure Sharing of Personal Health Records |
157 |
Scalable
and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption |
158 |
Secure
Access Control System in Cloud using Attribute based encryption technique |
159 |
Secure
cloud access system using JAR |
160 |
Secure
Key based Privacy Preserving Access Control System |
161 |
Secure
personal information system in Medical System |
162 |
Security
Enhanced Facebook like Social Networking Sites |
163 |
Security
key based Video Uploading and viewing System |
164 |
Self
diagnosing with identifying disease treatment with online doctor
precautionary |
165 |
SocialTube:
P2P-assisted Video Sharing in Online Social Networks |
166 |
Spatial
Approximate String Search |
167 |
Toward
Privacy Preserving and Collusion Resistance in a Location Proof Updating
System |
148 |
Twitsper
Tweeting Privately |
149 |
Two
tales of privacy in online social networks |
150 |
Vertical
Search Engine |
151 |
Video
Sharing Website |
DESKTOP APPLICATION |
|
1 |
A
Decentralized Service Discovery Approach on Peer-to-Peer Networks |
2 |
A
Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks |
3 |
A
Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation |
4 |
A
System for Denial-of-Service Attack Detection |
5 |
An
enhanced model for achieving high throughput using variant buffer size
methodology |
6 |
Anomaly
based intrusion detection system |
7 |
Back-Pressure-Based
Packet-by-Packet Adaptive Routing in Communication Networks |
8 |
Bandwidth
estimation systems in networks |
9 |
Blocking
intruders for secured network maintenance |
10 |
Cache
based User Location Querying System |
11 |
Caching
techniques in MANET and various routing protocols in MANET |
12 |
Capacity
of Data Collection in Arbitrary Wireless sensor networks |
13 |
CFR:
an efficient congestion free router |
14 |
Channel
allocation system in mobile networks |
15 |
Clone
Node Detection in Wireless Sensor Networking |
16 |
Coding
for cryptographic security enhancement using stopping sets |
17 |
Content
based image retrieval system |
18 |
Content
Sharing in Peer-to-Peer Networks |
19 |
Cut
detection in Wireless Sensor Network |
20 |
Data
Transmission Using Multi-Tasking-Sockets |
21 |
Delay-Based
Network Utility Maximization |
22 |
Discovery
and Verification of Neighbor Positions in Mobile Ad Hoc Networks |
23 |
Distributed
Processing of Probabilistic Top-k Queries in Wireless Sensor Networks |
24 |
Dynamic
Control of Coding for Progressive Packet Arrivals in DTNs |
25 |
Efficient
and Dynamic Routing Topology Inference |
26 |
Efficient
load balancing system in SIP Servers |
27 |
Efficient
load distribution scheme to avoid congestion in servers |
28 |
Fast
Transmission to Remote Cooperative Groups: A New Key Management Paradigm |
29 |
Fault
Node Recovery Algorithm for a Wireless Sensor Network |
30 |
FEC
based cryptography for secured data communication |
31 |
Finding
latency in data transmission |
32 |
Geometric
Routing Protocol in MANET |
33 |
Homophonic
cryptography technique for data security |
34 |
Hop-by-Hop
routing in Wireless Network |
35 |
Impact
of denial of service attacks on servers |
36 |
Intrusion
detection system in wireless sensor networks |
37 |
Minimum
Cost Blocking Problem in Multi-path Wireless Routing Protocols |
38 |
Mobility
management schemes in wireless networks using agent forwarding methods |
39 |
Modeling
the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links |
40 |
Opportunistic
MANETs: Mobility Can Make Up for Low Transmission Power |
41 |
Optimized
Software Release Planner |
42 |
Packet
monitoring based multicasting system |
43 |
Preventing
attackers in WSN from collecting datas |
44 |
Protecting
location information in Wireless Sensor Network |
45 |
Puzzle
based secure data transmission scheme to avoid intruders |
46 |
Recovery
from link failure in wireless networks |
47 |
Reducing
the costly forward using band-based directional broadcast |
48 |
Reducing
the number of transmission in Wireless Networks |
49 |
Routing
in Wireless Adhoc Network |
50 |
Secure
and efficient video distribution scheme using variant bandwidth system |
51 |
Secure
communication by hiding packets in intermediate router system |
52 |
Secure
Content Distribution using Network Coding Algorithm |
53 |
Secured
data communication system in wireless mesh networks |
54 |
Selfish
overlay network creation and maintenance |
55 |
Single-source
shortest path algorithm with nonnegative edge path |
56 |
Supporting
data transfer and movements of mobile terminal between different locations |
57 |
Ticket
based secured mobile banking scheme for detecting frauds |
58 |
Ticket
based security system for banking applications |
59 |
Trace
back scheme on finding attackers in Routing |
60 |
Traffic
flow analysis system based on a novel concept of flow set |
61 |
Trust
aware routing in MANET |
62 |
Trust
based Peer-to-Peer System for Secure Data Transmission |
63 |
Using
Fuzzy Logic Control to Provide Intelligent Traffic Management Service |
64 |
Vampire
Attacks: Draining Life from Wireless Ad Hoc Sensor Networks |
65 |
Virus
Spread in Network |
66 |
Virus
spread in P2P network |
67 |
Automatic
Vehicle Detection in Surveillance Video |
68 |
Data
embedding using Pixel-pair matching technique |
69 |
Digital
image processing filters for image filtering methods |
70 |
Efficient
steganography embedding methodology for secret data preservation |
71 |
Handwritten
Chinese Character Recognition |
72 |
License
Plate Recognition System |
73 |
Reducing
noises in images |
74 |
Video
steganography for secure data preservation |
75 |
Visual
cryptography system for secret image sharing |
76 |
A
Method for Mining Infrequent Causal Associations and Its Application in
Finding Adverse Drug Reaction Signal Pairs |
77 |
Credit
card fraud detection system using genetic algorithm |
78 |
Crime
Detection in Credit Card Fraud |
79 |
Visual
cryptography system for secret image sharing |
80 |
Criminal
Face Detection |
81 |
Decision
trees for uncertain data |
82 |
Document
clustering |
83 |
Efficient
search on XML data |
84 |
Efficient
searching technique in xml data |
85 |
Feature
Selection based Fast Clustering Algorithm with Minimum Spanning Tree in
Medical Data |
86 |
Finding
File Duplication |
87 |
High
efficient location monitoring system |
88 |
IP
based intruder blocking system in cloud computing |
89 |
Monitoring
cloud resources for better resource utilization |
90 |
Project
Management System |
91 |
Student
Management System |
92 |
Automatic
Test Packet Generation |
93 |
Efficient
Prediction of Difficult Keyword Queries over IMDB Movie Databases |
94 |
Secure
Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
95 |
Top-k
Query Result Completeness Verification in Tiered Sensor Networks |
96 |
Traffic
Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks |
97 |
Bug
Report Analysis |
98 |
CAPTCHA
based Secure System |
99 |
Context-Based
Diversification for Keyword Queries Over XML Data |
100 |
E-Pharmacy |
101 |
Folder
Comparer using MD5 Algorithm |
102 |
Person
Authentication Using Face Detection |
103 |
Privacy-Preserving
and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
104 |
Puzzle
Gaming System |
105 |
File
Authentication System using Captcha |
0 Comments