JAVA Application Projects
|
1 |
Extended
AES with Custom Configurable Encryption |
|
2 |
A
BigData approach for classification and prediction of student result using
MapReduce |
|
3 |
Distributed
Data Mining with Differential Privacy |
|
4 |
Critical
study on Data Mining with IDSS using RAPID technique for Diabetes |
|
5 |
Online
Book Buying and Selling Portal |
|
6 |
Towards
Effective Bug Triage with Software Data Reduction Techniques |
|
7 |
Bike
Store Management System |
|
8 |
Blood
Bank Management System |
|
9 |
Computer
Inventory System |
|
10 |
Data
Security With Third Party Admin In Cloud Storage |
|
11 |
Employee
Payroll Management System |
|
12 |
Ensuring
Security Using EMF Technique |
|
13 |
Hospital
Management System |
|
14 |
Intelligent
Backup of High Frequency Using Data Files in Cloud Storage |
|
15 |
Online
Nodue Management System |
|
16 |
Online
Toll Gate Management System |
|
17 |
Student
Mentoring System |
|
18 |
Tuition
Management System |
|
19 |
Online
Book Recommendation System using Social Trust in Social Network |
|
20 |
Connecting
Social Media to E-Commerce |
|
21 |
Online
Product Review using Sentiment Analysis |
|
22 |
Top-K
Query Processing |
|
23 |
Detection
of Bullying Messages in Social Media |
|
24 |
Hotel
Management System |
|
25 |
Hashtag
based Topic Modeling in Social Media |
|
26 |
Understanding
Short Texts through Semantic Enrichment and Hashing |
|
27 |
Data
Lineage in Malicious Environments |
|
28 |
Fraud
Resilient Device for Off-Line Micro-Payments |
|
29 |
Inference
Attack on Browsing History of Twitter Users using Public Click Analytics and
Twitter Metadata |
|
30 |
Profiling
Online Social Behaviors for Compromised Account Detection |
|
31 |
Airline
Reservation System |
|
32 |
Building
web applications on top of encrypted data using Mylar |
|
33 |
College
Management System |
|
34 |
Data
security model for Cloud Computing using V-GRT methodology |
|
35 |
Designing
High Performance Web-Based Computing Services to Promote Telemedicine
Database Management System |
|
36 |
Detecting
Malicious Facebook Applications |
|
37 |
Discovery
of Ranking Fraud for Mobile Apps |
|
38 |
Employee
Attendance System using QR Code |
|
39 |
Designing
High Performance Web-Based Computing Services to Promote Telemedicine
Database Management System |
|
40 |
EMR:
A Scalable Graph-based Ranking Model for Content-based Image Retrieval |
|
41 |
Encrypted
Data Storage Vs Data Against illegal Access |
|
42 |
E-TENDER |
|
43 |
Face
Recognition in Social Networks Using Big Data |
|
44 |
Human
Resource Management System |
|
45 |
Improved
Privacy-Preserving P2P Multimedia Distribution Based on Recombined
Fingerprints |
|
46 |
Integration
of Cloud and Sensor Networks with Novel Authentication |
|
47 |
Learning
to Rank Image Tags With Limited Training Examples |
|
48 |
Location
Based Service System with User Ratings and Comments |
|
49 |
Location-Aware
and Personalized Collaborative Filtering for Web Service Recommendation |
|
50 |
Mining
Online Product Evaluation System based on Ratings and Review Comments |
|
51 |
Natural
Language Interface to Database |
|
52 |
Online
Allegation |
|
53 |
Online
Banking System with Email OTP |
|
54 |
Online
Bug Tracking System |
|
55 |
Online
College Counselling system |
|
56 |
Online
Content Based Image Retrieval System with Ranking Model |
|
57 |
Online
Crime File Management System |
|
58 |
Online
Dictionary |
|
59 |
Online
Employee Tracking System |
|
60 |
Online
Product Rating System with Dynamic Trust model for User Authorization |
|
61 |
Online
Student Attendance Management System (with Parent Notification on Leave) |
|
62 |
Personalized
Movie Recommendation System |
|
63 |
Privacy
Policy Inference of User-Uploaded Images on Content Sharing Sites |
|
64 |
Real-Time
Detection of Traffic from Twitter Stream Analysis |
|
65 |
Resource
management system |
|
66 |
Resource
Monitor |
|
67 |
Route-Saver:
Leveraging Route APIs for Accurate and Efficient Query Processing at
Location-Based Services |
|
68 |
Secure
Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
|
69 |
Secure
Online Product Recommendation System |
|
70 |
Secure
Overlay Cloud Storage with Access Control |
|
71 |
Twitter
Based Tweet Summarization |
|
72 |
Twitter
Message Segmentation |
|
73 |
User
Rating based Location Information System |
|
74 |
Using
Opinion Mining Techniques in Tourism |
|
75 |
Video
Fraud Detecting On social Network |
|
76 |
WebCrawler:
Web Server Performance Testing Tool |
|
77 |
A
Cocktail Approach for Travel Package Recommendation |
|
78 |
A
Novel Privacy-Preserving Public Auditing for Group Data in the Cloud |
|
79 |
An
Efficient Certificateless Encryption for Secure Data Sharing in Public Cloud |
|
80 |
An
Incentive Framework for Cellular Traffic Offloading |
|
81 |
Analyze
Drifts in Business |
|
82 |
Approximate
Distance Finder with Fast nearest Neighbor Search with Keywords |
|
83 |
Cloud
Data Center Load Balancing Strategy based on QoS |
|
84 |
Decentralized
Access Control with Anonymous Authentication of Data Stored in Clouds |
|
85 |
Dynamic
Query Forms for Database Queries |
|
86 |
Efficient
Authentication for Mobile and Pervasive Computing |
|
87 |
Efficient
Information Retrieval Using Ranked Query |
|
88 |
Enabling
Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks |
|
89 |
Enhanced
Secure Login System using Captcha as Graphical Passwords |
|
90 |
Expressive,
Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage |
|
91 |
Facilitating
Document Annotation using Content and Querying Value |
|
92 |
Friendbook
A Semantic-based Friend Recommendation System for Social Networks |
|
93 |
Image
Search Reranking With Query-Dependent Click-Based Relevance Feedback |
|
94 |
K-Anonymity
for Crowdsourcing Database |
|
95 |
Live
Traffic Index based Online Shortest Path Computation |
|
96 |
LocaWard
A Security and Privacy Aware Location-Based Rewarding System |
|
97 |
Malicious
Feedback Rating Prevention in e-Commerce Sites |
|
98 |
Multi-keyword
Ranked Search over Encrypted Cloud Data Supporting Synonym Query |
|
99 |
Prediction-Based
Cloud Bandwidth and Cost Reduction System |
|
100 |
Privacy
Preserving Delegated Access Control in Public Clouds |
|
101 |
Privacy-Preserving
and Content-Protecting Location Based Queries |
|
102 |
Privacy-Preserving
Mechanism for Secure Medical Data |
|
84 |
Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data |
|
85 |
Probabilistic
Aspect Mining Model for Drug Reviews |
|
86 |
Random
space perturbation (RASP) based secure and efficient range query and kNN
query services for protected data in the cloud |
|
87 |
RRE
A Game-Theoretic Intrusion Response and Recovery Engine |
|
88 |
Privacy-Preserving
Multi-Keyword Ranked Search over Encrypted Cloud Data |
|
89 |
Scalable
Distributed Service Integrity Attestation for Software |
|
90 |
Secure
Out sourced Attribute |
|
91 |
Securing
Broker-Less Publish Subscribe Systems Using Identity-Based Encryption |
|
92 |
Security
in Privacy for Medical Data Health Records |
|
93 |
SocialTube
P2P-assisted Video Sharing in Online Social Networks |
|
94 |
SOS
A Distributed Mobile Q&A System
Based on Social Networks |
|
95 |
Spam
Filter based Security Evaluation of Pattern Classifiers under Attack |
|
96 |
Supporting
Authorized Duplicate Check in a Hybrid Cloud Architecture |
|
97 |
Supporting
Privacy Protection in Personalized Web Search |
|
98 |
Tag
Recommendation for Photos on Social Websites |
|
99 |
The
Client Assignment Problem for Continuous Distributed Interactive Applications |
|
100 |
Toward
Preserving Privacy and Functionality in Geosocial Networks |
|
101 |
User-centric
location-based service for Privacy in Queries |
|
102 |
Web
Service Recommendation via Exploiting Location and QoS Information |
|
103 |
A
Generalized Flow-Based Method for Analysis of Implicit Relationships on
Wikipedia |
|
104 |
A
Secure Cloud Server System using Proxy Re-Encryption Model |
|
105 |
A
Secure payment System for banking transactions |
|
106 |
An
efficient Mailing System for Detecting Spam Mails |
|
107 |
Annotating
Search Results from Web Databases |
|
108 |
Anonymization
for Secure Data in Web |
|
109 |
Attribute-based
Encryption System for Secured Data Storage |
|
110 |
Automatic
Testing System for Web Application |
|
111 |
Boolean
Retrieval for Medical datas |
|
112 |
Cloud
Data Protection for the Masses |
|
113 |
CloudMov:
Cloud based Video Streaming System |
|
114 |
Clustering
Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm |
|
115 |
Continuous
query processing system for location based services |
|
116 |
Cooperative
Secure Multi-Cloud Verification System |
|
117 |
Detecting
Complaints in Online Product Purchase |
|
118 |
Detecting
false users in Online Rating system & Securing Reputation |
|
119 |
Distributed
data integration on electricity board |
|
120 |
Dynamic
Assignments of Clients to Servers based on Load |
|
121 |
Dynamic
Resource allocation in Cloud |
|
122 |
Earthquake
Reporting System using Social Networking Site |
|
123 |
Efficient
and secure search on encrypted medical data |
|
124 |
E-Fraud
Prevention based on the Self-Authentication of e-Documents |
|
125 |
Enabling
Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems |
|
126 |
Enhanced
Security Scheme in Social Networking using XML |
|
127 |
Error-Tolerant
Resource Allocation and Payment Minimization for Cloud System |
|
128 |
Facilitating
Effective User Navigation through backtracking |
|
129 |
Filtering
Unwanted Messages in Online Social Networking User walls |
|
130 |
Get
your Campus |
|
131 |
Harnessing
the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations |
|
132 |
Identity-Based
Secure Distributed Data Storage Schemes |
|
133 |
Information
leak detection and prevention system |
|
134 |
Intrusion
Detection and Prevention in Web Servers |
|
135 |
IPTV
Portal System |
|
136 |
Load
balancing model for Cloud Data Center |
|
137 |
Location
Based Search System |
|
138 |
Multi-Cloud
System to avoid server failures |
|
139 |
Multiparty
Access Control for Online Social Networks |
|
140 |
Personalised
Search Engine from user click-through logs |
|
141 |
Personalized
Image Search System |
|
142 |
Personalized
QoS-Aware Web Service Recommendation and Visualization |
|
143 |
Portable
Cloud System |
|
144 |
Predicting
BMI using Behavioral Outcomes |
|
145 |
Preserving
data and identity privacy from an untrusted cloud by Multi-Owner Data Sharing |
|
146 |
Preventing
Intrusion in Web and Database Servers |
|
147 |
Preventing
Private Information Inference Attacks on Social Networks |
|
148 |
Privacy
Preserving Data Sharing With Anonymous ID Assignment |
|
149 |
Privacy
Preserving Delegated Access Control in Cloud Computing |
|
150 |
Privacy
Protection Scheme in Location Information System |
|
151 |
Privacy-Preserving
Public Auditing For Secure Cloud Storage |
|
152 |
Protecting
Sensitive Labels in Social Network Data Anonymization |
|
153 |
PUBMED:
an efficient biomedical based hierarchical search engine |
|
154 |
Ranking
and feedback model in search engines |
|
155 |
Ranking
system for web library |
|
156 |
Scalable
and Secure Sharing of Personal Health Records |
|
157 |
Scalable
and Secure Sharing of Personal Health Records in Cloud Computing Using
Attribute-Based Encryption |
|
158 |
Secure
Access Control System in Cloud using Attribute based encryption technique |
|
159 |
Secure
cloud access system using JAR |
|
160 |
Secure
Key based Privacy Preserving Access Control System |
|
161 |
Secure
personal information system in Medical System |
|
162 |
Security
Enhanced Facebook like Social Networking Sites |
|
163 |
Security
key based Video Uploading and viewing System |
|
164 |
Self
diagnosing with identifying disease treatment with online doctor
precautionary |
|
165 |
SocialTube:
P2P-assisted Video Sharing in Online Social Networks |
|
166 |
Spatial
Approximate String Search |
|
167 |
Toward
Privacy Preserving and Collusion Resistance in a Location Proof Updating
System |
|
148 |
Twitsper
Tweeting Privately |
|
149 |
Two
tales of privacy in online social networks |
|
150 |
Vertical
Search Engine |
|
151 |
Video
Sharing Website |
|
DESKTOP APPLICATION |
|
|
1 |
A
Decentralized Service Discovery Approach on Peer-to-Peer Networks |
|
2 |
A
Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks |
|
3 |
A
Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation |
|
4 |
A
System for Denial-of-Service Attack Detection |
|
5 |
An
enhanced model for achieving high throughput using variant buffer size
methodology |
|
6 |
Anomaly
based intrusion detection system |
|
7 |
Back-Pressure-Based
Packet-by-Packet Adaptive Routing in Communication Networks |
|
8 |
Bandwidth
estimation systems in networks |
|
9 |
Blocking
intruders for secured network maintenance |
|
10 |
Cache
based User Location Querying System |
|
11 |
Caching
techniques in MANET and various routing protocols in MANET |
|
12 |
Capacity
of Data Collection in Arbitrary Wireless sensor networks |
|
13 |
CFR:
an efficient congestion free router |
|
14 |
Channel
allocation system in mobile networks |
|
15 |
Clone
Node Detection in Wireless Sensor Networking |
|
16 |
Coding
for cryptographic security enhancement using stopping sets |
|
17 |
Content
based image retrieval system |
|
18 |
Content
Sharing in Peer-to-Peer Networks |
|
19 |
Cut
detection in Wireless Sensor Network |
|
20 |
Data
Transmission Using Multi-Tasking-Sockets |
|
21 |
Delay-Based
Network Utility Maximization |
|
22 |
Discovery
and Verification of Neighbor Positions in Mobile Ad Hoc Networks |
|
23 |
Distributed
Processing of Probabilistic Top-k Queries in Wireless Sensor Networks |
|
24 |
Dynamic
Control of Coding for Progressive Packet Arrivals in DTNs |
|
25 |
Efficient
and Dynamic Routing Topology Inference |
|
26 |
Efficient
load balancing system in SIP Servers |
|
27 |
Efficient
load distribution scheme to avoid congestion in servers |
|
28 |
Fast
Transmission to Remote Cooperative Groups: A New Key Management Paradigm |
|
29 |
Fault
Node Recovery Algorithm for a Wireless Sensor Network |
|
30 |
FEC
based cryptography for secured data communication |
|
31 |
Finding
latency in data transmission |
|
32 |
Geometric
Routing Protocol in MANET |
|
33 |
Homophonic
cryptography technique for data security |
|
34 |
Hop-by-Hop
routing in Wireless Network |
|
35 |
Impact
of denial of service attacks on servers |
|
36 |
Intrusion
detection system in wireless sensor networks |
|
37 |
Minimum
Cost Blocking Problem in Multi-path Wireless Routing Protocols |
|
38 |
Mobility
management schemes in wireless networks using agent forwarding methods |
|
39 |
Modeling
the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links |
|
40 |
Opportunistic
MANETs: Mobility Can Make Up for Low Transmission Power |
|
41 |
Optimized
Software Release Planner |
|
42 |
Packet
monitoring based multicasting system |
|
43 |
Preventing
attackers in WSN from collecting datas |
|
44 |
Protecting
location information in Wireless Sensor Network |
|
45 |
Puzzle
based secure data transmission scheme to avoid intruders |
|
46 |
Recovery
from link failure in wireless networks |
|
47 |
Reducing
the costly forward using band-based directional broadcast |
|
48 |
Reducing
the number of transmission in Wireless Networks |
|
49 |
Routing
in Wireless Adhoc Network |
|
50 |
Secure
and efficient video distribution scheme using variant bandwidth system |
|
51 |
Secure
communication by hiding packets in intermediate router system |
|
52 |
Secure
Content Distribution using Network Coding Algorithm |
|
53 |
Secured
data communication system in wireless mesh networks |
|
54 |
Selfish
overlay network creation and maintenance |
|
55 |
Single-source
shortest path algorithm with nonnegative edge path |
|
56 |
Supporting
data transfer and movements of mobile terminal between different locations |
|
57 |
Ticket
based secured mobile banking scheme for detecting frauds |
|
58 |
Ticket
based security system for banking applications |
|
59 |
Trace
back scheme on finding attackers in Routing |
|
60 |
Traffic
flow analysis system based on a novel concept of flow set |
|
61 |
Trust
aware routing in MANET |
|
62 |
Trust
based Peer-to-Peer System for Secure Data Transmission |
|
63 |
Using
Fuzzy Logic Control to Provide Intelligent Traffic Management Service |
|
64 |
Vampire
Attacks: Draining Life from Wireless Ad Hoc Sensor Networks |
|
65 |
Virus
Spread in Network |
|
66 |
Virus
spread in P2P network |
|
67 |
Automatic
Vehicle Detection in Surveillance Video |
|
68 |
Data
embedding using Pixel-pair matching technique |
|
69 |
Digital
image processing filters for image filtering methods |
|
70 |
Efficient
steganography embedding methodology for secret data preservation |
|
71 |
Handwritten
Chinese Character Recognition |
|
72 |
License
Plate Recognition System |
|
73 |
Reducing
noises in images |
|
74 |
Video
steganography for secure data preservation |
|
75 |
Visual
cryptography system for secret image sharing |
|
76 |
A
Method for Mining Infrequent Causal Associations and Its Application in
Finding Adverse Drug Reaction Signal Pairs |
|
77 |
Credit
card fraud detection system using genetic algorithm |
|
78 |
Crime
Detection in Credit Card Fraud |
|
79 |
Visual
cryptography system for secret image sharing |
|
80 |
Criminal
Face Detection |
|
81 |
Decision
trees for uncertain data |
|
82 |
Document
clustering |
|
83 |
Efficient
search on XML data |
|
84 |
Efficient
searching technique in xml data |
|
85 |
Feature
Selection based Fast Clustering Algorithm with Minimum Spanning Tree in
Medical Data |
|
86 |
Finding
File Duplication |
|
87 |
High
efficient location monitoring system |
|
88 |
IP
based intruder blocking system in cloud computing |
|
89 |
Monitoring
cloud resources for better resource utilization |
|
90 |
Project
Management System |
|
91 |
Student
Management System |
|
92 |
Automatic
Test Packet Generation |
|
93 |
Efficient
Prediction of Difficult Keyword Queries over IMDB Movie Databases |
|
94 |
Secure
Data Retrieval for Decentralized Disruption-Tolerant Military Networks |
|
95 |
Top-k
Query Result Completeness Verification in Tiered Sensor Networks |
|
96 |
Traffic
Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks |
|
97 |
Bug
Report Analysis |
|
98 |
CAPTCHA
based Secure System |
|
99 |
Context-Based
Diversification for Keyword Queries Over XML Data |
|
100 |
E-Pharmacy |
|
101 |
Folder
Comparer using MD5 Algorithm |
|
102 |
Person
Authentication Using Face Detection |
|
103 |
Privacy-Preserving
and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks |
|
104 |
Puzzle
Gaming System |
|
105 |
File
Authentication System using Captcha |
0 Comments