JAVA IEEE & Web Based Projects

Leading and practical academic project training in Vijaypur and Hubli


Latest Java Projects 2018-19   IEEE | Web Application

Id Title Technology
1 A Practical Public Key Encryption Scheme Based on Learning Parity with Noise Cloud Computing
2 An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers Cloud Computing
3 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics Cloud Computing
4 Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing Cloud Computing
5 A Power-of-Two Choices Based Algorithm for Fog Computing Cloud Computing
6 virtFlow: Guest Independent Execution Flow Analysis Across Virtualized Environments Cloud Computing
7 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras Cloud Computing
8 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras Cloud Computing
9 Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment Cloud Computing
10 Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers Cloud Computing
11 Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets Cloud Computing
12 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical cloud environment Cloud Computing
13 Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center Cloud Computing
14 A tight estimate of job completion time in vehicular clouds Cloud Computing
15 HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems Cloud Computing
16 An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers Cloud Computing
17 Dynamic VM Scaling: Provisioning and Pricing through an Online Auction Cloud Computing
18 Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach Cloud Computing
19 Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing Cloud Computing
20 An Efficient and Secured Framework for Mobile Cloud Computing Cloud Computing
21 Efficient Traceable Authorization Search System for Secure Cloud Storage Cloud Computing
22 A Robust Formulation for Efficient Application Offloading to Clouds Cloud Computing
23 A Planning Approach for Reassigning Virtual Machines in IaaS Clouds Cloud Computing
24 Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing Cloud Computing
25 A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage Cloud Computing
26 VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment Cloud Computing
27 A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings DATA MINING
28 Automated Phrase Mining from Massive Text Corpora DATA MINING
29 A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining DATA MINING
30 Search Result Diversity Evaluation based on Intent Hierarchies DATA MINING
31 Emotion Recognition on Twitter: Comparative Study and Training a Unison Model DATA MINING
32 Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments on E-Commerce Applications DATA MINING
33 Bayesian Nonparametric Learning for Hierarchical and Sparse Topics DATA MINING
34 Comments Mining With TF-IDF: The Inherent Bias and Its Removal DATA MINING
35 A Correlation-based Feature Weighting Filter for Naive Bayes DATA MINING
36 A Weighted Frequent Itemset Mining Algorithm for Intelligent Decision in Smart Systems DATA MINING
37 An Efficient Method for High Quality and Cohesive Topical Phrase Mining DATA MINING
38 Complementary Aspect-based Opinion Mining DATA MINING
39 Discovering Canonical Correlations between Topical and Topological Information in Document Networks DATA MINING
40 Document Summarization for Answering Non-Factoid Queries DATA MINING
41 Efficient Vertical Mining of High Average-Utility Itemsets based on Novel Upper-Bounds DATA MINING
42 Fast Cosine Similarity Search in Binary Space with Angular Multi-index Hashing DATA MINING
43 Frequent Itemsets Mining with Differential Privacy over Large-scale Data DATA MINING
44 Fuzzy Bag-of-Words Model for Document Representation DATA MINING
45 Highlighter: automatic highlighting of electronic learning documents DATA MINING
46 Online Product Quantization DATA MINING
47 Predicting Contextual Informativeness for Vocabulary Learning DATA MINING
48 Range-based Nearest Neighbor Queries with Complex-shaped Obstacles DATA MINING
49 Reverse k Nearest Neighbor Search over Trajectories DATA MINING
50 Selective Database Projections Based Approach for Mining High-Utility Itemsets DATA MINING
51 Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective DATA MINING
52 Collective List-Only Entity Linking: A Graph-Based Approach DATA MINING
53 Entity Linking: A Problem to Extract Corresponding Entity with Knowledge Base DATA MINING
54 Principal Component Analysis Based Filtering for Scalable, High Precision k-NN Search DATA MINING
55 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices SECURE COMPUTING
56 Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks SECURE COMPUTING
57 A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense CYBERSECURITY
58 CoDetect: Financial Fraud Detection with Anomaly Feature Detection CYBERSECURITY
59 Credit card fraud detection using AdaBoost and majority voting CYBERSECURITY
60 Selfish Decentralized Computation Offloading for Mobile Cloud Computing in Dense Wireless Networks MOBILE COMPUTING
61 Service Provisioning in Mobile Environments through Opportunistic Computing MOBILE COMPUTING
62 Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency Situations MOBILE COMPUTING
63 Semantic-based Compound Keyword Search over Encrypted Cloud Data SERVICE COMPUTING
64 Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach SERVICE COMPUTING
65 Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes SERVICE COMPUTING
66 Scheduling Inter-Datacenter Video Flows for Cost Efficiency SERVICE COMPUTING
67 Lightweight Fine-Grained Search over Encrypted Data in Fog Computing SERVICE COMPUTING
68 SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage SERVICE COMPUTING
69 Migration Modeling and Learning Algorithms for Containers in Fog Computing SERVICE COMPUTING
70 Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing SERVICE COMPUTING
71 Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems SERVICE COMPUTING
72 FraudFind: Financial Fraud Detection by Analyzing Human Behavior INFORMATION AND SECURITY SYSTEMS
73 FraudVis: Understanding Unsupervised Fraud Detection Algorithms INFORMATION AND SECURITY SYSTEMS
74 Machine Learning Applied to Rotating Check Fraud Detection INFORMATION AND SECURITY SYSTEMS
75 Random Forest for Credit Card Fraud Detection INFORMATION AND SECURITY SYSTEMS
76 Exploring Feature Coupling and Model Coupling for Image Source Identification INFORMATION FORENSIC SECURITY
77 Supervised and Unsupervised Aspect Category Detection for Sentiment Analysis With Co-Occurrence Data INFORMATION FORENSIC SECURITY
78 Towards Shared Ownership in the Cloud INFORMATION FORENSIC SECURITY
79 Analyzing and Detecting Money-Laundering Accounts in Online Social Networks NETWORK,SOCIAL NETWORK
80 Shared Predictive Cross-Modal Deep Quantization NETWORK,SOCIAL NETWORK
81 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks NETWORK,SOCIAL NETWORK
82 A Meta Path based Method for Entity Set Expansion in Knowledge Graph BIG DATA
83 Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage BIG DATA
84 RRPhish Anti-Phishing via Mining Brand Resources Request CONSUMER ELECTRONICS,INDUSTRIAL ELECTRONICS
85 Confidence-interval Fuzzy Model-based Indoor Localization CONSUMER ELECTRONICS,INDUSTRIAL ELECTRONICS
86 A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumption INFORMATION AND COMMUNICATION SYSTEM
87 Detecting Regions of Maximal Divergence for Spatio-Temporal Anomaly Detection PATTERN ANALYSIS AND MACHINE INTELLIGENCE
88 Ordinal Constraint Binary Coding for Approximate Nearest Neighbor Search PATTERN ANALYSIS AND MACHINE INTELLIGENCE
89 Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection SOFTWARE ENGINEERING,COMPUTER GRAPHICS
90 EVA: Visual Analytics to Identify Fraudulent Events SOFTWARE ENGINEERING,COMPUTER GRAPHICS
ID PROJECT TITLE TECHNOLOGY DOMAIN ABSTRACT
1 A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks Big Data Java Click here
2 Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud Cloud Computing Java Click here
3 A robust reputation management mechanism in the federated cloud Cloud Computing Java Click here
4 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Cloud Computing Java Click here
5 Securing Cloud Data under Key Exposure Cloud Computing Java Click here
6 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage Cloud Computing Java Click here
7 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds Cloud Computing Java Click here
8 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification Cloud Computing Java Click here
9 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Cloud Computing Java Click here
10 Public Interest Analysis Based on Implicit Feedback of IPTV Users Data Engineering Java Click here
11 Search Rank Fraud and Malware Detection in Google Play Data Engineering Java Click here
12 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks Data Engineering Java Click here
13 Influence Maximization in Trajectory Databases Data Engineering Java Click here
14 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets Data Engineering Java Click here
15 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback Data Engineering Java Click here
16 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data Data Engineering Java Click here
17 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge Data Engineering Java Click here
18 Computing Semantic Similarity of Concepts in Knowledge Graphs Data Engineering Java Click here
19 QDA: A Query-Driven Approach to Entity Resolution Data Engineering Java Click here
20 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach Data Engineering Java Click here
21 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective Data Engineering Java Click here
22 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification Cloud Computing Java Click here
23 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Cloud Computing Java Click here
24 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing Cloud Computing Java Click here
25 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users Cloud Computing Java Click here
26 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Cloud Computing Java Click here
27 A robust reputation management mechanism in the federated cloud Cloud Computing Java Click here
28 Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid Cloud Computing Java Click here
29 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data Cloud Computing Java Click here
30 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems Cloud Computing Java Click here
31 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing Cloud Computing Java Click here
32 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud Cloud Computing Java Click here
33 Fast Phrase Search for Encrypted Cloud Storage Cloud Computing Java Click here
34 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds Cloud Computing Java Click here
35 Identity-Based Encryption with Cloud Revocation Authority and Its Applications Cloud Computing Java Click here
36 Identity-Based Private Matching over Outsourced Encrypted Datasets Cloud Computing Java Click here
37 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage Cloud Computing Java Click here
38 On the Security of Data Access Control for Multi-authority Cloud Storage Systems Cloud Computing Java Click here
39 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing Cloud Computing Java Click here
40 Privacy Protection based Access Control Scheme in Cloud-based Services Cloud Computing Java Click here
41 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data Cloud Computing Java Click here
42 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud Cloud Computing Java Click here
43 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage Cloud Computing Java Click here
44 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption Cloud Computing Java Click here
45 Securing Cloud Data under Key Exposure Cloud Computing Java Click here
46 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud Cloud Computing Java Click here
47 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Cloud Computing Java Click here
48 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving Cloud Computing Java Click here
49 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets Data Mining Java Click here
50 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach Data Mining Java Click here
51 Collaborative Filtering-Based Recommendation of Online Social Voting Data Mining Java Click here
52 Computing Semantic Similarity of Concepts in Knowledge Graphs Data Mining Java Click here
53 Detecting Stress Based on Social Interactions in Social Networks Data Mining Java Click here
54 Dynamic Facet Ordering for Faceted Product Search Engines Data Mining Java Click here
55 Efficient Clue-based Route Search on Road Networks Data Mining Java Click here
56 Efficient Keyword-aware Representative Travel Route Recommendation Data Mining Java Click here
57 Energy-efficient Query Processing in Web Search Engines Data Mining Java Click here
58 Generating Query Facets using Knowledge Bases Data Mining Java Click here
59 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach Data Mining Java Click here
60 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items Data Mining Java Click here
61 Mining Competitors from Large Unstructured Datasets Data Mining Java Click here
62 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction Data Mining Java Click here
63 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback Data Mining Java Click here
64 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks Data Mining Java Click here
65 QDA: A Query-Driven Approach to Entity Resolution Data Mining Java Click here
66 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data Data Mining Java Click here
67 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem Data Mining Java Click here
68 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors Data Mining Java Click here
69 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets Data Mining Java Click here
70 Trajectory Community Discovery and Recommendation by Multisource Diffusion Modeling Data Mining Java Click here
71 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge Data Mining Java Click here
72 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective Data Mining Java Click here
73 User-Centric Similarity Search Data Mining Java Click here
74 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks Data Mining Java Click here

More benefits to final year students

Every project team will get project

  • Project documentation and reports
  • Presentations
  • Project structure Implementation details
  • Coding skills
  • Job Skills
  • Software and tools
  • Placement Assistance