JAVA – 2016 – 2017 Final Year Projects for B.Tech/B.E & M.Tech/M.E
The below 2016-2017 projects developed with Java & MySQL/Oracle and these projects categorized under different domains below
- Cloud computing
- Data mining
- Image Processing
- Networking
- Secure Computing
- Mobile Computing
- Software Engineering
- Parallel & Distributed Systems
- Information Forensics & Security
- Multimedia (Social Networking)
- Fuzzy Systems
S.No | Domain | Project Name |
1 | Cloud Computing | A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data |
2 | Cloud Computing | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
3 | Cloud Computing | An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing |
4 | Cloud Computing | An Efficient Privacy-Preserving Ranked Keyword Search Method |
5 | Cloud Computing | CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System |
6 | Cloud Computing | Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing |
7 | Cloud Computing | CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services |
8 | Cloud Computing | Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email |
9 | Cloud Computing | Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds |
10 | Cloud Computing | DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud |
11 | Cloud Computing | Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage |
12 | Cloud Computing | Dynamic and Public Auditing with Fair Arbitration for Cloud Data |
13 | Cloud Computing | Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates |
14 | Cloud Computing | Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services |
15 | Cloud Computing | Geometric Range Search on Encrypted Spatial Data |
16 | Cloud Computing | Identity-Based Encryption with Cloud Revocation Authority and Its Applications |
17 | Cloud Computing | Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud |
18 | Cloud Computing | Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud |
19 | Cloud Computing | Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems |
20 | Cloud Computing | Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
21 | Cloud Computing | Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
22 | Cloud Computing | TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage |
23 | Cloud Computing | A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing |
24 | Cloud Computing | DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments |
25 | Cloud Computing | Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing |
26 | Cloud Computing | SecRBAC: Secure data in the Clouds |
27 | Data Mining | A Novel Recommendation Model Regularized with User Trust and Item Ratings |
28 | Data Mining | Automatically Mining Facets for Queries from Their Search Results |
29 | Data Mining | Booster in High Dimensional Data Classification |
30 | Data Mining | Building an intrusion detection system using a filter-based feature selection algorithm |
31 | Data Mining | Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
32 | Data Mining | Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
33 | Data Mining | Crowdsourcing for Top-K Query Processing over Uncertain Data |
34 | Data Mining | Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder |
35 | Data Mining | Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
36 | Data Mining | Efficient Algorithms for Mining Top-K High Utility Itemsets |
37 | Data Mining | Efficient Cache-Supported Path Planning on Roads |
38 | Data Mining | Mining User-Aware Rare Sequential Topic Patterns in Document Streams |
39 | Data Mining | Nearest Keyword Set Search in Multi-Dimensional Datasets |
40 | Data Mining | Rating Prediction based on Social Sentiment from Textual Reviews |
41 | Data Mining | Location Aware Keyword Query Suggestion Based on Document Proximity |
42 | Data Mining | Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs |
43 | Data Mining | Quantifying Political Leaning from Tweets, Retweets, and Retweeters |
44 | Data Mining | Relevance Feedback Algorithms Inspired By Quantum Detection |
45 | Data Mining | Sentiment Embeddings with Applications to Sentiment Analysis |
46 | Data Mining | Top-Down XML Keyword Query Processing |
47 | Data Mining | TopicSketch: Real-time Bursty Topic Detection from Twitter |
48 | Data Mining | Top-k Dominating Queries on Incomplete Data |
49 | Data Mining | Understanding Short Texts through Semantic Enrichment and Hashing |
50 | Networking | A Stable Approach for Routing Queries in Unstructured P2P Networks |
51 | Networking | iPath: Path Inference in Wireless Sensor Networks |
52 | Networking | Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks |
53 | Networking | Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks |
54 | Networking | STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users |
55 | Mobile Computing | Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
56 | Mobile Computing | EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
57 | Mobile Computing | Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
58 | Mobile Computing | Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
59 | Parallel & Distributed Systems | A Hop-by-Hop Routing Mechanism for Green Internet |
60 | Parallel & Distributed Systems | Continuous Answering Holistic Queries over Sensor Networks |
61 | Parallel & Distributed Systems | Dictionary Based Secure Provenance Compression for Wireless Sensor Networks |
62 | Parallel & Distributed Systems | The Server Provisioning Problem for Continuous Distributed Interactive Applications |
63 | Secure Computing | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts |
64 | Secure Computing | Data Lineage in Malicious Environments |
65 | Secure Computing | Detecting Malicious Facebook Applications |
66 | Secure Computing | FRoDO: Fraud Resilient Device for Off-Line Micro-Payments |
67 | Secure Computing | Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata |
68 | Secure Computing | Resolving Multi-party Privacy Conflicts in Social Media |
69 | Information Forensics & Security | Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
70 | Information Forensics & Security | Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
71 | Information Forensics & Security | Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
72 | Information Forensics & Security | Profiling Online Social Behaviors for Compromised Account Detection |
73 | Image Processing | A Locality Sensitive Low-Rank Model for Image Tag Completion |
74 | Image Processing | A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
75 | Image Processing | Learning of Multimodal Representations with Random Walks on the Click Graph |
76 | Image Processing | Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
77 | Image Processing | Tag Based Image Search by Social Re-ranking |
78 | Multimedia (Social Networking) | Social Friend Recommendation Based on Multiple Network Correlation |
79 | Multimedia (Social Networking) | User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors |
80 | Software Engineering | Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation |
81 | Software Engineering | Metamorphic Testing for Software Quality Assessment: A Study of Search Engines |
82 | Software Engineering | SITAR: GUI Test Script Repair |
83 | Fuzzy Systems | Answering Approximate Queries over XML Data |
I want a source code of project “Fuzzy Keyword Search Over Encrypted data in Cloud Computing” in jsp
can you please send me the source code and project report of “A scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks” in java programming. i am a final year b tech student. if you provide the resource to my email id, i am very thankful to you.
Can you Please share me the source code of Building an intrusion detection system using a filter-based feature selection algorithm topic.
Can you please send me the source code for Location Aware Keyword Query Suggestion based on document proximity project
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
please send the source code and documention
i want souce code of stamp
i want the source code for Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
Hi, Can you please send me the source code for Location Aware Keyword Query Suggestion based on document proximity project. I’m doing some research and really interested in. Thanks
Hi, Can you please send me the source code for Tag Based Image Search by Social Re-ranking. I’m really interested in. Thanks
Please can u send me the source code of dual server public key encryption with keyword search for secure cloud storage in java
Can you please provide me with the necessary items for the project “Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud”?