Java Application Projects

 JAVA Application Projects

1

Extended AES with Custom Configurable Encryption

2

A BigData approach for classification and prediction of student result using MapReduce

3

Distributed Data Mining with Differential Privacy

4

Critical study on Data Mining with IDSS using RAPID technique for Diabetes

5

Online Book Buying and Selling Portal

6

Towards Effective Bug Triage with Software Data Reduction Techniques

7

Bike Store Management System

8

Blood Bank Management System

9

Computer Inventory System

10

Data Security With Third Party Admin In Cloud Storage

11

Employee Payroll Management System

12

Ensuring Security Using EMF Technique

13

Hospital Management System

14

Intelligent Backup of High Frequency Using Data Files in Cloud Storage

15

Online Nodue Management System

16

Online Toll Gate Management System

17

Student Mentoring System

18

Tuition Management System

19

Online Book Recommendation System using Social Trust in Social Network

20

Connecting Social Media to E-Commerce

21

Online Product Review using Sentiment Analysis

22

Top-K Query Processing

23

Detection of Bullying Messages in Social Media

24

Hotel Management System

25

Hashtag based Topic Modeling in Social Media

26

Understanding Short Texts through Semantic Enrichment and Hashing

27

Data Lineage in Malicious Environments

28

Fraud Resilient Device for Off-Line Micro-Payments

29

Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata

30

Profiling Online Social Behaviors for Compromised Account Detection

31

Airline Reservation System

32

Building web applications on top of encrypted data using Mylar

33

College Management System

34

Data security model for Cloud Computing using V-GRT methodology

35

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

36

Detecting Malicious Facebook Applications

37

Discovery of Ranking Fraud for Mobile Apps

38

Employee Attendance System using QR Code

39

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

40

EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval

41

Encrypted Data Storage Vs Data Against illegal Access

42

E-TENDER

43

Face Recognition in Social Networks Using Big Data

44

Human Resource Management System

45

Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints

46

Integration of Cloud and Sensor Networks with Novel Authentication

47

Learning to Rank Image Tags With Limited Training Examples

48

Location Based Service System with User Ratings and Comments

49

Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation

50

Mining Online Product Evaluation System based on Ratings and Review Comments

51

Natural Language Interface to Database

52

Online Allegation

53

Online Banking System with Email OTP

54

Online Bug Tracking System

55

Online College Counselling system

56

Online Content Based Image Retrieval System with Ranking Model

57

Online Crime File Management System

58

Online Dictionary

59

Online Employee Tracking System

60

Online Product Rating System with Dynamic Trust model for User Authorization

61

Online Student Attendance Management System (with Parent Notification on Leave)

62

Personalized Movie Recommendation System

63

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites

64

Real-Time Detection of Traffic from Twitter Stream Analysis

65

Resource management system

66

Resource Monitor

67

Route-Saver: Leveraging Route APIs for Accurate and Efficient Query Processing at Location-Based Services

68

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

69

Secure Online Product Recommendation System

70

Secure Overlay Cloud Storage with Access Control

71

Twitter Based Tweet Summarization

72

Twitter Message Segmentation

73

User Rating based Location Information System

74

Using Opinion Mining Techniques in Tourism

75

Video Fraud Detecting On social Network

76

WebCrawler: Web Server Performance Testing Tool

77

A Cocktail Approach for Travel Package Recommendation

78

A Novel Privacy-Preserving Public Auditing for Group Data in the Cloud

79

An Efficient Certificateless Encryption for Secure Data Sharing in Public Cloud

80

An Incentive Framework for Cellular Traffic Offloading

81

Analyze Drifts in Business

82

Approximate Distance Finder with Fast nearest Neighbor Search with Keywords

83

Cloud Data Center Load Balancing Strategy based on QoS

84

Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds

85

Dynamic Query Forms for Database Queries

86

Efficient Authentication for Mobile and Pervasive Computing

87

Efficient Information Retrieval Using Ranked Query

88

Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks

89

Enhanced Secure Login System using Captcha as Graphical Passwords

90

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

91

Facilitating Document Annotation using Content and Querying Value

92

Friendbook A Semantic-based Friend Recommendation System for Social Networks

93

Image Search Reranking With Query-Dependent Click-Based Relevance Feedback

94

K-Anonymity for Crowdsourcing Database

95

Live Traffic Index based Online Shortest Path Computation

96

LocaWard A Security and Privacy Aware Location-Based Rewarding System

97

Malicious Feedback Rating Prevention in e-Commerce Sites

98

Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query

99

Prediction-Based Cloud Bandwidth and Cost Reduction System

100

Privacy Preserving Delegated Access Control in Public Clouds

101

Privacy-Preserving and Content-Protecting Location Based Queries

102

Privacy-Preserving Mechanism for Secure Medical Data

84

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

85

Probabilistic Aspect Mining Model for Drug Reviews

86

Random space perturbation (RASP) based secure and efficient range query and kNN query services for protected data in the cloud

87

RRE A Game-Theoretic Intrusion Response and Recovery Engine

88

Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data

89

Scalable Distributed Service Integrity Attestation for Software

90

Secure Out sourced Attribute

91

Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption

92

Security in Privacy for Medical Data Health Records

93

SocialTube P2P-assisted Video Sharing in Online Social Networks

94

SOS A Distributed Mobile Q&A System  Based on Social Networks

95

Spam Filter based Security Evaluation of Pattern Classifiers under Attack

96

Supporting Authorized Duplicate Check in a Hybrid Cloud Architecture

97

Supporting Privacy Protection in Personalized Web Search

98

Tag Recommendation for Photos on Social Websites

99

The Client Assignment Problem for Continuous Distributed Interactive Applications

100

Toward Preserving Privacy and Functionality in Geosocial Networks

101

User-centric location-based service for Privacy in Queries

102

Web Service Recommendation via Exploiting Location and QoS Information

103

A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia

104

A Secure Cloud Server System using Proxy Re-Encryption Model

105

A Secure payment System for banking transactions

106

An efficient Mailing System for Detecting Spam Mails

107

Annotating Search Results from Web Databases

108

Anonymization for Secure Data in Web

109

Attribute-based Encryption System for Secured Data Storage

110

Automatic Testing System for Web Application

111

Boolean Retrieval for Medical datas

112

Cloud Data Protection for the Masses

113

CloudMov: Cloud based Video Streaming System

114

Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm

115

Continuous query processing system for location based services

116

Cooperative Secure Multi-Cloud Verification System

117

Detecting Complaints in Online Product Purchase

118

Detecting false users in Online Rating system & Securing Reputation

119

Distributed data integration on electricity board

120

Dynamic Assignments of Clients to Servers based on Load

121

Dynamic Resource allocation in Cloud

122

Earthquake Reporting System using Social Networking Site

123

Efficient and secure search on encrypted medical data

124

E-Fraud Prevention based on the Self-Authentication of e-Documents

125

Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems

126

Enhanced Security Scheme in Social Networking using XML

127

Error-Tolerant Resource Allocation and Payment Minimization for Cloud System

128

Facilitating Effective User Navigation through backtracking

129

Filtering Unwanted Messages in Online Social Networking User walls

130

Get your Campus

131

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

132

Identity-Based Secure Distributed Data Storage Schemes

133

Information leak detection and prevention system

134

Intrusion Detection and Prevention in Web Servers

135

IPTV Portal System

136

Load balancing model for Cloud Data Center

137

Location Based Search System

138

Multi-Cloud System to avoid server failures

139

Multiparty Access Control for Online Social Networks

140

Personalised Search Engine from user click-through logs

141

Personalized Image Search System

142

Personalized QoS-Aware Web Service Recommendation and Visualization

143

Portable Cloud System

144

Predicting BMI using Behavioral Outcomes

145

Preserving data and identity privacy from an untrusted cloud by Multi-Owner Data Sharing

146

Preventing Intrusion in Web and Database Servers

147

Preventing Private Information Inference Attacks on Social Networks

148

Privacy Preserving Data Sharing With Anonymous ID Assignment

149

Privacy Preserving Delegated Access Control in Cloud Computing

150

Privacy Protection Scheme in Location Information System

151

Privacy-Preserving Public Auditing For Secure Cloud Storage

152

Protecting Sensitive Labels in Social Network Data Anonymization

153

PUBMED: an efficient biomedical based hierarchical search engine

154

Ranking and feedback model in search engines

155

Ranking system for web library

156

Scalable and Secure Sharing of Personal Health Records

157

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

158

Secure Access Control System in Cloud using Attribute based encryption technique

159

Secure cloud access system using JAR

160

Secure Key based Privacy Preserving Access Control System

161

Secure personal information system in Medical System

162

Security Enhanced Facebook like Social Networking Sites

163

Security key based Video Uploading and viewing System

164

Self diagnosing with identifying disease treatment with online doctor precautionary

165

SocialTube: P2P-assisted Video Sharing in Online Social Networks

166

Spatial Approximate String Search

167

Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

148

Twitsper Tweeting Privately

149

Two tales of privacy in online social networks

150

Vertical Search Engine

151

Video Sharing Website

 

 

DESKTOP APPLICATION

1

A Decentralized Service Discovery Approach on Peer-to-Peer Networks

2

A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks

3

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

4

A System for Denial-of-Service Attack Detection

5

An enhanced model for achieving high throughput using variant buffer size methodology

6

Anomaly based intrusion detection system

7

Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks

8

Bandwidth estimation systems in networks

9

Blocking intruders for secured network maintenance

10

Cache based User Location Querying System

11

Caching techniques in MANET and various routing protocols in MANET

12

Capacity of Data Collection in Arbitrary Wireless sensor networks

13

CFR: an efficient congestion free router

14

Channel allocation system in mobile networks

15

Clone Node Detection in Wireless Sensor Networking

16

Coding for cryptographic security enhancement using stopping sets

17

Content based image retrieval system

18

Content Sharing in Peer-to-Peer Networks

19

Cut detection in Wireless Sensor Network

20

Data Transmission Using Multi-Tasking-Sockets

21

Delay-Based Network Utility Maximization

22

Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks

23

Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks

24

Dynamic Control of Coding for Progressive Packet Arrivals in DTNs

25

Efficient and Dynamic Routing Topology Inference

26

Efficient load balancing system in SIP Servers

27

Efficient load distribution scheme to avoid congestion in servers

28

Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm

29

Fault Node Recovery Algorithm for a Wireless Sensor Network

30

FEC based cryptography for secured data communication

31

Finding latency in data transmission

32

Geometric Routing Protocol in MANET

33

Homophonic cryptography technique for data security

34

Hop-by-Hop routing in Wireless Network

35

Impact of denial of service attacks on servers

36

Intrusion detection system in wireless sensor networks

37

Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols

38

Mobility management schemes in wireless networks using agent forwarding methods

39

Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links

40

Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power

41

Optimized Software Release Planner

42

Packet monitoring based multicasting system

43

Preventing attackers in WSN from collecting datas

44

Protecting location information in Wireless Sensor Network

45

Puzzle based secure data transmission scheme to avoid intruders

46

Recovery from link failure in wireless networks

47

Reducing the costly forward using band-based directional broadcast

48

Reducing the number of transmission in Wireless Networks

49

Routing in Wireless Adhoc Network

50

Secure and efficient video distribution scheme using variant bandwidth system

51

Secure communication by hiding packets in intermediate router system

52

Secure Content Distribution using Network Coding Algorithm

53

Secured data communication system in wireless mesh networks

54

Selfish overlay network creation and maintenance

55

Single-source shortest path algorithm with nonnegative edge path

56

Supporting data transfer and movements of mobile terminal between different locations

57

Ticket based secured mobile banking scheme for detecting frauds

58

Ticket based security system for banking applications

59

Trace back scheme on finding attackers in Routing

60

Traffic flow analysis system based on a novel concept of flow set

61

Trust aware routing in MANET

62

Trust based Peer-to-Peer System for Secure Data Transmission

63

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service

64

Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks

65

Virus Spread in Network

66

Virus spread in P2P network

67

Automatic Vehicle Detection in Surveillance Video

68

Data embedding using Pixel-pair matching technique

69

Digital image processing filters for image filtering methods

70

Efficient steganography embedding methodology for secret data preservation

71

Handwritten Chinese Character Recognition

72

License Plate Recognition System

73

Reducing noises in images

74

Video steganography for secure data preservation

75

Visual cryptography system for secret image sharing

76

A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs

77

Credit card fraud detection system using genetic algorithm

78

Crime Detection in Credit Card Fraud

79

Visual cryptography system for secret image sharing

80

Criminal Face Detection

81

Decision trees for uncertain data

82

Document clustering

83

Efficient search on XML data

84

Efficient searching technique in xml data

85

Feature Selection based Fast Clustering Algorithm with Minimum Spanning Tree in Medical Data

86

Finding File Duplication

87

High efficient location monitoring system

88

IP based intruder blocking system in cloud computing

89

Monitoring cloud resources for better resource utilization

90

Project Management System

91

Student Management System

92

Automatic Test Packet Generation

93

Efficient Prediction of Difficult Keyword Queries over IMDB Movie Databases

94

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

95

Top-k Query Result Completeness Verification in Tiered Sensor Networks

96

Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks

97

Bug Report Analysis

98

CAPTCHA based Secure System

99

Context-Based Diversification for Keyword Queries Over XML Data

100

E-Pharmacy

101

Folder Comparer using MD5 Algorithm

102

Person Authentication Using Face Detection

103

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

104

Puzzle Gaming System

105

File Authentication System using Captcha


Post a Comment

0 Comments