B.Tech & M.Tech 2016-2017 Java Projects

JAVA – 2016 – 2017 Final Year Projects for B.Tech/B.E & M.Tech/M.E

The below 2016-2017 projects developed with Java & MySQL/Oracle and these projects categorized under different domains below

  • Cloud computing
  • Data mining
  • Image Processing
  • Networking
  • Secure Computing
  • Mobile Computing
  • Software Engineering
  • Parallel & Distributed Systems
  • Information Forensics & Security
  • Multimedia (Social Networking)
  • Fuzzy Systems
S.No Domain Project Name
1 Cloud Computing A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
2 Cloud Computing A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3 Cloud Computing An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
4 Cloud Computing An Efficient Privacy-Preserving Ranked Keyword Search Method
5 Cloud Computing CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
6 Cloud Computing Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing
7 Cloud Computing CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services
8 Cloud Computing Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
9 Cloud Computing Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
10 Cloud Computing DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud
11 Cloud Computing Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
12 Cloud Computing Dynamic and Public Auditing with Fair Arbitration for Cloud Data
13 Cloud Computing Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
14 Cloud Computing Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
15 Cloud Computing Geometric Range Search on Encrypted Spatial Data
16 Cloud Computing Identity-Based Encryption with Cloud Revocation Authority and Its Applications
17 Cloud Computing Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
18 Cloud Computing Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud
19 Cloud Computing Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems
20 Cloud Computing Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
21 Cloud Computing Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
22 Cloud Computing TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
23 Cloud Computing A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
24 Cloud Computing DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
25 Cloud Computing Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
26 Cloud Computing SecRBAC: Secure data in the Clouds
27 Data Mining A Novel Recommendation Model Regularized with User Trust and Item Ratings
28 Data Mining Automatically Mining Facets for Queries from Their Search Results
29 Data Mining Booster in High Dimensional Data Classification
30 Data Mining Building an intrusion detection system using a filter-based feature selection algorithm
31 Data Mining Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
32 Data Mining Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings
33 Data Mining Crowdsourcing for Top-K Query Processing over Uncertain Data
34 Data Mining Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
35 Data Mining Domain-Sensitive Recommendation with User-Item Subgroup Analysis
36 Data Mining Efficient Algorithms for Mining Top-K High Utility Itemsets
37 Data Mining Efficient Cache-Supported Path Planning on Roads
38 Data Mining Mining User-Aware Rare Sequential Topic Patterns in Document Streams
39 Data Mining Nearest Keyword Set Search in Multi-Dimensional Datasets
40 Data Mining Rating Prediction based on Social Sentiment from Textual Reviews
41 Data Mining Location Aware Keyword Query Suggestion Based on Document Proximity
42 Data Mining Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs
43 Data Mining Quantifying Political Leaning from Tweets, Retweets, and Retweeters
44 Data Mining Relevance Feedback Algorithms Inspired By Quantum Detection
45 Data Mining Sentiment Embeddings with Applications to Sentiment Analysis
46 Data Mining Top-Down XML Keyword Query Processing
47 Data Mining TopicSketch: Real-time Bursty Topic Detection from Twitter
48 Data Mining Top-k Dominating Queries on Incomplete Data
49 Data Mining Understanding Short Texts through Semantic Enrichment and Hashing
50 Networking A Stable Approach for Routing Queries in Unstructured P2P Networks
51 Networking iPath: Path Inference in Wireless Sensor Networks
52 Networking Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks
53 Networking Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
54 Networking STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
55 Mobile Computing Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
56 Mobile Computing EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data
57 Mobile Computing Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
58 Mobile Computing Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach
59 Parallel & Distributed Systems A Hop-by-Hop Routing Mechanism for Green Internet
60 Parallel & Distributed Systems Continuous Answering Holistic Queries over Sensor Networks
61 Parallel & Distributed Systems Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
62 Parallel & Distributed Systems The Server Provisioning Problem for Continuous Distributed Interactive Applications
63 Secure Computing Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts
64 Secure Computing Data Lineage in Malicious Environments
65 Secure Computing Detecting Malicious Facebook Applications
66 Secure Computing FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
67 Secure Computing Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
68 Secure Computing Resolving Multi-party Privacy Conflicts in Social Media
69 Information Forensics & Security Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
70 Information Forensics & Security Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data
71 Information Forensics & Security Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms
72 Information Forensics & Security Profiling Online Social Behaviors for Compromised Account Detection
73 Image Processing A Locality Sensitive Low-Rank Model for Image Tag Completion
74 Image Processing A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
75 Image Processing Learning of Multimodal Representations with Random Walks on the Click Graph
76 Image Processing Online Multi-Modal Distance Metric Learning with Application to Image Retrieval
77 Image Processing Tag Based Image Search by Social Re-ranking
78 Multimedia (Social Networking) Social Friend Recommendation Based on Multiple Network Correlation
79 Multimedia (Social Networking) User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors
80 Software Engineering Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine- Grained Benchmark, and Feature Evaluation
81 Software Engineering Metamorphic Testing for Software Quality Assessment: A Study of Search Engines
82 Software Engineering SITAR: GUI Test Script Repair
83 Fuzzy Systems Answering Approximate Queries over XML Data

11 Replies to “B.Tech & M.Tech 2016-2017 Java Projects”

  1. can you please send me the source code and project report of “A scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks” in java programming. i am a final year b tech student. if you provide the resource to my email id, i am very thankful to you.

  2. Can you Please share me the source code of Building an intrusion detection system using a filter-based feature selection algorithm topic.

  3. Can you please send me the source code for Location Aware Keyword Query Suggestion based on document proximity project

  4. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
    please send the source code and documention

  5. i want the source code for Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption

  6. Hi, Can you please send me the source code for Location Aware Keyword Query Suggestion based on document proximity project. I’m doing some research and really interested in. Thanks

  7. Hi, Can you please send me the source code for Tag Based Image Search by Social Re-ranking. I’m really interested in. Thanks

  8. Please can u send me the source code of dual server public key encryption with keyword search for secure cloud storage in java

  9. Can you please provide me with the necessary items for the project “Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud”?

Leave a Reply

Your email address will not be published. Required fields are marked *