Loading...

Final Year Projects in JAVA

Latest JAVA Projects 2019

BabyCare Servlet Project

Broadcasting Chatserver Project

City Classified and Search Project

Company Mailer Servlet Project

Connect Globe Project

eLibrary Project in Servlet

Fee Management Project in Servlet

Fee Report Student Management System in Java

Java Application World (JApps) Project

Library Management System in Java Swing

Mailcasting Project

Online Banking Project

Online Library Project

Online Quiz Project

Payment Billing Product Project

Pharmacy Project

Transport Company Project

IEEE 2017-18 JAVA Projects

Cloud Computing

1 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

2 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy- Preserving Policy

3 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud TEES (Traffic and Energy saving Encrypted Search)

4 Attribute-Based Storage Supporting Secure De-duplication of Encrypted Data in Cloud.

5 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.

6 Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data

7 RAAC: Robust and Auditable Access Control. With Multiple Attribute Authorities for. Public Cloud Storage

8 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

9 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

10 Securing Cloud Data under Key Exposure

11 Achieving Flexible and Self-Contained Data Protection in Cloud Computing

12 Securing Aggregate Queries for DNA Databases

13 FaaSeC: Enabling Forensics-as-a-Service for Cloud Computing Systems

14 Privacy Protection based Access Control Scheme in Cloud-based Services.

15 A Robust Reputation Management Mechanism In The Federated Cloud

16 Fast Phrase Search for Encrypted Cloud Storage

17 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud

18 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing

19 Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme over Encrypted Cloud Data

20 Strong Key Exposure Resilient Auditing for Secure Cloud Storage

21 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users

22 Achieving Efficient and Secure Data Acquisition for Cloud-supported Internet of Things in SmartGrid

23 Customer Satisfaction Aware Optimal Multi server Configuration for Profit Maximization in Cloud Computing

24 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

25 RAPARE A Generic Strategy for Cold Start Rating Prediction Problem

26 Fuzzy Identity Based Data Integrity Auditing for Reliable Cloud Storage Systems

27 Keyword Search with Access Control Over Encrypted Cloud Data

28 On the Security of Data Access Control for Multi-authority Cloud Storage Systems

29 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

30 Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds

 

Data Mining / Knowledge and Data Engineering

1 Semantically Enhanced Medical Information Retrieval System: A Tensor Factorization Based Approach

2 Detecting Stress Based on Social Interactions in Social Networks

3 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach

4 PPRank: Economically Selecting Initial Users for. Influence Maximization in Social Networks

5 SocialQ&A: An Online Social Network Based Question and Answer System

6 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback

7 Computing Semantic Similarity of Concepts in Knowledge Graphs

8 A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks

9 User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective

10 Analyzing Sentiments in One Go A Supervised Joint Topic Modeling Approach.

11 User-Centric Similarity Search

12 Dynamic Facet Ordering for Faceted Product Search Engines

13 Search Rank Fraud and Malware Detection in Google Play

14 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data

15 Influence Maximization in Trajectory Databases

16 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets

17 QDA: A Query-Driven Approach to Entity Resolution

18 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

19 Collaborative Filtering-Based Recommendation of Online Social Voting

20 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence

21 Improving Automated Bug Triaging with Specialized Topic Model

22 Trajectory Community Discovery and Recommendation by Multi-Source Diffusion Modeling

23 Generating Query Facets using Knowledge Bases

24 Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks

25 Privacy-Preserving Learning Analytics: Challenges and Techniques

26 Privacy-Preserving Selective Aggregation of Online User Behavior Data

27 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions

28 Public Interest Analysis Based on Implicit Feedback of IPTV Users

29 Tri Clustered Tensor Completion for Social Aware Image Tag Refinement

30 Towards Detecting Compromised Accounts on Social Networks

31 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

32 Two-Stage Friend Recommendation Based onNetwork Alignment and Series-Expansion ofProbabilistic Topic Model

33 User-Centric Similarity Search

34 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks

35 Efficient Clue-Based Route Search on Road Networks

36 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge

37 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction

38 GALLOP: GlobAL Feature Fused LOcation Prediction for Different Check-in Scenarios

39 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items

Internet of Things

1 Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks

2 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems

3 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy- Preserving Policy

 

Secure/Services Computing

1 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method

2 Transactional Behavior Verification in Business Process as a Service Configuration

3 A Credibility Analysis System for Assessing Information on Twitter

4 Privacy Protection based Access Control Scheme in Cloud-based Services.

5 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

6 Privacy-Preserving Learning Analytics: Challenges and Techniques

7 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions

8 Search Rank Fraud and Malware Detection in Google Play

9 Securing Aggregate Queries for DNA Databases

10 Securing Cloud Data under Key Exposure

11 SocialQ&A: An Online Social Network Based Question and Answer System

12 Towards Detecting Compromised Accounts on Social Networks

13 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

 

Multimedia

1 Two-Stage Friend Recommendation Based on Network Alignment and Series Expansion of Probabilistic Topic Model

2 Personalized Social Image Recommendation Method Based on User-Image-Tag Model

 

Software Engineering

1 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection

2 Improving Automated Bug Triaging with Specialized Topic Model

 

Parallel and Distributed Systems

1 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence

3 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach

4 PPRank: Economically Selecting Initial Users for. Influence Maximization in Social Networks

5 User Vitality Ranking and Prediction in Social Networking Services: A Dynamic Network Perspective

 

Computational Social Systems

1 Collaborative Filtering-Based Recommendation of Online Social Voting

 

Computers

1 Privacy-Preserving Selective Aggregation of Online User Behavior Data

2 Tri Clustered Tensor Completion for Social Aware Image Tag Refinement

 

Information Forencis Security

1 ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions

2 NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media

3 FaaSeC: Enabling Forensics-as-a-Service for Cloud Computing Systems

4 NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media

5 Strong Key Exposure Resilient Auditing for Secure Cloud Storage

6 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

 

Mobile Computing

1 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

2 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

3 SPFM Scalable and Privacy preserving Friend Matching in Mobile Cloud

4 Quantifying Interdependent Privacy Risks with Location Data

5 Searching Trajectories by Regions of Interest

 

Information Processing over Networks

1 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending

2 NetSpam: A Network-Based Spam Detection Framework for Reviews in Online Social Media

3 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks

 

Image Processing

1 Image Re-ranking based on Topic Diversity

2 Tri Clustered Tensor Completion for Social Aware Image Tag Refinement

3 Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model

 

Big Data

1 A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks

2 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud

3 Social Q&A: An Online Social Network Based Question and Answer System

4 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy- Preserving Policy

 

 

Industrial Informatics

1 Public Interest Analysis Based on Implicit Feedback of IPTV Users

 

Learning Technologies

1 Privacy-Preserving Learning Analytics: Challenges and Techniques