Latest 2014 Java Projects (B.Tech & M.Tech):

Students and institutes who are looking for latest java 2014 projects with full project source code, project report, paper presentation can contact us for buying projects in bulk. Projects listed here are developed based on latest technologies using java programming language. 

List of Latest 2014 Java Projects:

S No Title Of The Project Domain Year
1 Discovering Emerging Topics in Social Streams via Link-Anomaly Detection Data Mining 2014
2 Efficient Prediction of Difficult Keyword Queries over Databases Data Mining 2014
3 Dealing With Concept Drifts in Process Mining Data Mining 2014
4 A Cocktail Approach for Travel Package Recommendation Data Mining 2014
5 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Data Mining 2014
6 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform Data Mining 2014
7 Data Mining with Big Data Data Mining 2014
8 Facilitating Document Annotation using Content and Querying Value Data Mining 2014
9 Fast Nearest Neighbor Search with Keywords Data Mining 2014
10 Privacy-Preserving and Content-Protecting Location Based Queries Data Mining 2014
11 Security Evaluation of Pattern Classifiers under Attack Data Mining 2014
12 Supporting Privacy Protection in Personalized Web Search Data Mining 2014
13 Towards Online Shortest Path Computation Data Mining 2014
14 Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases Cloud Computing 2014
15 A Hybrid Cloud Approach for Secure Authorized Deduplication Cloud Computing 2014
16 A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud Cloud Computing 2014
17 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Cloud Computing 2014
18 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation Cloud Computing 2014
19 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds Cloud Computing 2014
20 Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Cloud Computing 2014
21 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage Cloud Computing 2014
22 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud Cloud Computing 2014
23 Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data Cloud Computing 2014
24 Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds Cloud Computing 2014
25 Towards Differential Query Services in Cost-Efficient Clouds Cloud Computing 2014
26 Automatic Test Packet Generation Networking 2014
27 Boundary Cutting for Packet Classification Networking 2014
28 Cost-Effective Resource Allocation of Overlay Routing Relay Nodes Networking 2014
29 Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Networking 2014
30 An Incentive Framework for Cellular Traffic Offloading Mobile Computing 2014
31 Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks Mobile Computing 2014
32 Efficient Authentication for Mobile and Pervasive Computing Mobile Computing 2014
33 Friendbook: A Semantic-based Friend Recommendation System for Social Networks Mobile Computing 2014
34 Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices Mobile Computing 2014
35 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems Secure Computing 2014
36 Efficient and Privacy-Aware Data Aggregation in Mobile Sensing Secure Computing 2014
37 PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks Secure Computing 2014
38 Top-k Query Result Completeness Verification in Tiered Sensor Networks Secure Computing 2014
39 Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Parallel & Distributed Systems 2014
40 Exploiting Service Similarity for Privacy in Location-Based Search Queries Parallel & Distributed Systems 2014
41 LocaWard: A Security and Privacy Aware Location-Based Rewarding System Parallel & Distributed Systems 2014
42 On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures Parallel & Distributed Systems 2014
43 RRE: A Game-Theoretic Intrusion Response and Recovery Engine Parallel & Distributed Systems 2014
44 Secure Out sourced Attribute-based Signatures Parallel & Distributed Systems 2014
45 Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption Parallel & Distributed Systems 2014
46 SOS: A Distributed Mobile Q&A System  Based on Social Networks Parallel & Distributed Systems 2014
47 The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation Parallel & Distributed Systems 2014
48 The Design and Evaluation of An Information Sharing System for Human Networks Parallel & Distributed Systems 2014
49 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks Parallel & Distributed Systems 2014
50 Privacy-Enhanced Web Service Composition Service Computing 2014