Latest 2014 Java Projects (B.Tech & M.Tech):
Students and institutes who are looking for latest java 2014 projects with full project source code, project report, paper presentation can contact us for buying projects in bulk. Projects listed here are developed based on latest technologies using java programming language.
List of Latest 2014 Java Projects:
S No | Title Of The Project | Domain | Year |
1 | Discovering Emerging Topics in Social Streams via Link-Anomaly Detection | Data Mining | 2014 |
2 | Efficient Prediction of Difficult Keyword Queries over Databases | Data Mining | 2014 |
3 | Dealing With Concept Drifts in Process Mining | Data Mining | 2014 |
4 | A Cocktail Approach for Travel Package Recommendation | Data Mining | 2014 |
5 | Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data | Data Mining | 2014 |
6 | BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform | Data Mining | 2014 |
7 | Data Mining with Big Data | Data Mining | 2014 |
8 | Facilitating Document Annotation using Content and Querying Value | Data Mining | 2014 |
9 | Fast Nearest Neighbor Search with Keywords | Data Mining | 2014 |
10 | Privacy-Preserving and Content-Protecting Location Based Queries | Data Mining | 2014 |
11 | Security Evaluation of Pattern Classifiers under Attack | Data Mining | 2014 |
12 | Supporting Privacy Protection in Personalized Web Search | Data Mining | 2014 |
13 | Towards Online Shortest Path Computation | Data Mining | 2014 |
14 | Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases | Cloud Computing | 2014 |
15 | A Hybrid Cloud Approach for Secure Authorized Deduplication | Cloud Computing | 2014 |
16 | A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using Map Reduce on Cloud | Cloud Computing | 2014 |
17 | A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems | Cloud Computing | 2014 |
18 | Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation | Cloud Computing | 2014 |
19 | Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds | Cloud Computing | 2014 |
20 | Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage | Cloud Computing | 2014 |
21 | Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage | Cloud Computing | 2014 |
22 | Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud | Cloud Computing | 2014 |
23 | Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data | Cloud Computing | 2014 |
24 | Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds | Cloud Computing | 2014 |
25 | Towards Differential Query Services in Cost-Efficient Clouds | Cloud Computing | 2014 |
26 | Automatic Test Packet Generation | Networking | 2014 |
27 | Boundary Cutting for Packet Classification | Networking | 2014 |
28 | Cost-Effective Resource Allocation of Overlay Routing Relay Nodes | Networking | 2014 |
29 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Networking | 2014 |
30 | An Incentive Framework for Cellular Traffic Offloading | Mobile Computing | 2014 |
31 | Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks | Mobile Computing | 2014 |
32 | Efficient Authentication for Mobile and Pervasive Computing | Mobile Computing | 2014 |
33 | Friendbook: A Semantic-based Friend Recommendation System for Social Networks | Mobile Computing | 2014 |
34 | Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices | Mobile Computing | 2014 |
35 | Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems | Secure Computing | 2014 |
36 | Efficient and Privacy-Aware Data Aggregation in Mobile Sensing | Secure Computing | 2014 |
37 | PROFILR : Toward Preserving Privacy and Functionality in Geosocial Networks | Secure Computing | 2014 |
38 | Top-k Query Result Completeness Verification in Tiered Sensor Networks | Secure Computing | 2014 |
39 | Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks | Parallel & Distributed Systems | 2014 |
40 | Exploiting Service Similarity for Privacy in Location-Based Search Queries | Parallel & Distributed Systems | 2014 |
41 | LocaWard: A Security and Privacy Aware Location-Based Rewarding System | Parallel & Distributed Systems | 2014 |
42 | On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures | Parallel & Distributed Systems | 2014 |
43 | RRE: A Game-Theoretic Intrusion Response and Recovery Engine | Parallel & Distributed Systems | 2014 |
44 | Secure Out sourced Attribute-based Signatures | Parallel & Distributed Systems | 2014 |
45 | Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | Parallel & Distributed Systems | 2014 |
46 | SOS: A Distributed Mobile Q&A System Based on Social Networks | Parallel & Distributed Systems | 2014 |
47 | The Client Assignment Problem for Continuous Distributed Interactive Applications: Analysis, Algorithms, and Evaluation | Parallel & Distributed Systems | 2014 |
48 | The Design and Evaluation of An Information Sharing System for Human Networks | Parallel & Distributed Systems | 2014 |
49 | Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks | Parallel & Distributed Systems | 2014 |
50 | Privacy-Enhanced Web Service Composition | Service Computing | 2014 |
Can I get the source code of “cocktail approach for travel package recommendation” in java