[go: up one dir, main page]

0% found this document useful (0 votes)
43 views5 pages

Java Latest Mini Projects 2015-2016

This document lists 90 potential Java mini-project topics ranging from secure data management and redaction to cloud computing applications to social media analysis and more. Some examples include approaches for secure data sharing in cloud computing, methods for privacy preservation in data mining and web searches, and systems for online ticket booking and vehicle tracking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views5 pages

Java Latest Mini Projects 2015-2016

This document lists 90 potential Java mini-project topics ranging from secure data management and redaction to cloud computing applications to social media analysis and more. Some examples include approaches for secure data sharing in cloud computing, methods for privacy preservation in data mining and web searches, and systems for online ticket booking and vehicle tracking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

JAVA LATEST MINI PROJECTS 2015-2016

1. A New Approach for Secure Data Reduplication

2. Method For Inequality Avoidance In Data Mining

3. Repeated Scaling of Applications for cloud Services

4. A new way Providing Authentication By Graphical Images

5. A Reliable Platform for Resource Sharing On Cloud

6. A Relational Keyword Search System

7. A Methodology for Developing Secure Data Management

8. Consistency as a Service Auditing Cloud Consistency

9. Privacy-Preserving and Accurate Access Control system

10. An Approach To Check Records On Cloud Computing

11. An Advanced String Alteration System

12. Shortest Distance Computing Based On Local Landmark

13. Discovery of Malwares in delay tolerant networks

14. cloud service using quality of service

15. key exchange over internet

16. Possibility Secure Of Implicit Machines In Cloud Data Centers

17. preserving open audit for common data in the cloud

18. Around the internet Placement and training

19. level of conservation distribution in cloud computing

20. maximum possible route problems with irrelevant constraints.

21. Multi-Keyword Ranked Search more than Cloud Data

22. Improved web tune composition


23. Content caring position Based Queries

24. A Several Sender-Receiver Strategy For Minimizing Cost

25. Community Audit For Common Information In The Cloud

26. Confidentiality Access Control In Public Cloudsic Clouds

27. Protecting Place Comfort in Geo-Social Applications

28. A rapid Clustering-Based quality search

29. Query Services in Cost-Proficient Clouds

30. Cross searching in a large set of files

31. Information matching alert estimation

32. A Advanced journey package

33. Production through idea stream in formula

34. Capable Calculation of Complex Keyword Query

35. Energetic Cloud price for income Maximization

36. Decentralized direct with secret verification data store

37. Discover promising Topics in public stream via connection difference finding

38. Resourceful status on being Graph With modified e-mail

39. Safe electronic physical condition accounts

40. Enabling information security in Regenerating-Coding-Based Cloud Storage

41. Allow Considering Solutions through Remote Discovering An Online of Everything

42. Records Insertion with Large Information

43. Aware Resource Provisioning

44. Keyword Query Routing

45. Scalable Data Sharing


46. Mapping Sparse Table

47. Revocable Data Access Control

48. Friend Book

49. Locality-Sensitive Recommender

50. Re-Encryption Based Key Management for Secure and Scalable

51. Heart Disease Diagnosis And Treatment

52. Content Leakage Detection for Trusted Content Delivery Networks

53. Safety Estimation prototype Classifiers Over Spammers

54. Privacy Protection in Web Search

55. Protected Removal Of Union Policy In Horizontally Distributed Databases

56. Sampling Online social Networks

57. Product Configuration In Software Product Lines

58. Collaborative Filtering Recommendation

59. Cloud Examine Concession In Internet Of Stuff Atmosphere

60. Design of Private and Professional Query Services

61. Personal Looking information Depending on Keyword

62. WebSite Designing & Hosting in the Network

63. Bootstrap Clustering for Substantial Data

64. Provide Security From Duplication Using Convergent Key Management

65. Framework to compare cloud storage providers

66. Trouble-free Video Broadcasting

67. Secure File Downloading System from Distributed DataBase.

68. Testing Web Links


69. Online College Magazine

70. Chittoor And Cuddapah Soil,Crops And Land Cost

71. Super Market

72. A Framework for Mining Signatures from Event Sequences and Its Applications in

Healthcare Data

73. Advanced journey package Abstract

74. Creation With Idea Flow In System

75. Advanced String Alteration System

76. Hybrid Attribute- and Re-Encryption- Based Key Management for Secure and Scalable

Mobile Applications in Cloud

77. Trusted DataBase

78. Online drug acquisition System

79. Unique Identification Supervision System

80. Online vocabulary system

81. Online Engagement Book

82. E- Referendum system

83. E - Attendance Supervision System

84. Gadgets on the Internet

85. LPG organization control system

86. Auditorium Tickets e-Booking

87. Cake Delights online

88. Congregation Deadlines of Scientific Workflows

89. Vehicle Theft Control and Tracking System


90. Healthcare Reference System

91. Improved Data Protection Model For Cloud Computing

92. Make Journey Planner

You might also like