[go: up one dir, main page]

0% found this document useful (0 votes)
19 views5 pages

Java Major Title List-2023

The document lists various Java major projects for 2023, primarily focused on cloud computing, data mining, social networks, and security. Each project includes a title and its corresponding domain, showcasing a wide range of applications from DNA cryptography to fraud detection and privacy preservation. The projects aim to address contemporary challenges in technology and data management.

Uploaded by

Sara kounain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views5 pages

Java Major Title List-2023

The document lists various Java major projects for 2023, primarily focused on cloud computing, data mining, social networks, and security. Each project includes a title and its corresponding domain, showcasing a wide range of applications from DNA cryptography to fraud detection and privacy preservation. The projects aim to address contemporary challenges in technology and data management.

Uploaded by

Sara kounain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

JAVA MAJOR PROJECTS LIST-2023

JAVA MAJOR PROJECTS LIST


SRNO TITLE DOMAIN
1. Implementation Of DNA Cryptography In Cloud Computing Cloud computing
2. Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Cloud Computing
Email
3. Dynamic Job Ordering and Slot Configurations for Map reduce Workloads Cloud Computing
4. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute- Cloud Computing
Based Encryption
5. Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates Cloud Computing
6. Access Control by Signature-Keys to Provide Privacy for Cloud and Big Data Cloud Computing
7. Privacy preserving ranked multi keyword search for multiple data owners in cloud Cloud Computing
computing
8. Privacy-preserving Search over Encrypted Personal Health Record in Multi-Source Cloud Cloud Computing
9. Performance-Oriented Deployment of Streaming Applications on Cloud Cloud Computing
10. Advanced Security In Cloud Computing Of Military Weapons Cloud Computing
11. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud Cloud Computing
12. IFCaas: Information Flow Control as a service for cloud security Cloud Computing
13. Designing Secure And Efficient Biometric-Based Secure Access Mechanism For CS Cloud Computing
14. A Novel Feature Matching Ranked Search Mechanism Over Encrypted Cloud Data Cloud Computing
15. Identity-Based Encryption Transformation For Flexible Sharing Of Encrypted Data Cloud Computing
In Public Cloud
16. Pay As You Decrypt Decryption Outsourcing For Functional Encryption Using Cloud Computing
Block Chain
17. Privacy-Preserving Efficient Verifiable Deep Packet Inspection Cloud Computing
18. Proactive Fault-Tolerance Technique To Enhance Reliability Of Cloud Service In Cloud Computing
Cloud Federation Environment
19. Protecting Your Shopping Preference With Differential Privacy Cloud Computing
20. Representing Fine Grained Co-occurrences For Behavior Based Fraud Detection Secure Computing
21. Scalable And Adaptive Data Replica Placement For Geo-Distributed Cloud Storages Cloud Computing
22. Secure Cloud Storage With Data Dynamics Using Secure Network Coding Cloud Computing
Techniques
23. Secure Data Transfer And Deletion From Counting Bloom Filter In Cloud Cloud Computing
Computing
24. Secure Keyword Search And Data Sharing Mechanism For Cloud Computing Cloud Computing
25. Similarity Search For Encrypted Images In Secure Cloud Computing Cloud Computing
26. A Verifiable Semantic Searching Scheme By Optimal Matching Over Encrypted Cloud Computing
Data In Public Cloud
27. Privacy Preserving And Quality-Aware Incentive Mechanism For Mobile Crowd Cloud Computing
Sensing
28. Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Cloud Computing
Automata
29. Publicly Verifiable Shared Dynamic Electronic Health Record Databases Cloud Computing
30. Securing Resources In Decentralized Cloud Storage Cloud Computing
31. Semantics Of Data Mining Services In Cloud Computing Cloud Computing
JAVA MAJOR PROJECTS LIST-2023

32. Secure Storage Auditing With Efficient Key Updates Cloud Computing
33. Publicly Verifiable Shared Dynamic Electronic Health Record Databases Cloud Computing
34. Enabling Identity-Based Integrity Auditing And Data Cloud Computing
35. efficient resource allocation for task scheduling in cloud computing Cloud Computing
36. Dynamic Multi-Keyword Ranked Search Based On Bloom Filter Cloud Computing
37. Verifiable And Multi Keyword Searchable Attribute Based Encryption Scheme For Cloud Computing
Cloud
38. A Practical Public Key Encryption Scheme Based On Learning Parity With Noise Cloud Computing
39. Privacy Aware Personal Data Storage PPDS Learning How To Protect User Privacy Cloud Computing
40. A Secure Elliptic Curve Cryptography Based Mutual Authentication Protocol For Cloud Computing
Cloud Assisted Tmis
41. A Secure Searchable Encryption Framework For Privacy-Critical Cloud Storage Cloud Computing
Services
42. Profit Maximization For Cloud Brokers In Cloud Computing Cloud Computing
43. Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption For Cloud Computing
Personal Health Record System
44. Secure Data Group Sharing And Conditional Dissemination With Multi-Owner In Cloud Computing
Cloud Computing
45. Cryptographically Enforced Dynamic Access Control In The Cloud Cloud Computing
46. Adaptive Resource Management For Analyzing Video Streams From Globally Cloud Computing
Distributed Network Cameras
47. An Approach To Balance Maintenance Costs And Electricity Consumption In Cloud Cloud Computing
Data Centers
48. A Power-Of-Two Choices Based Algorithm For Fog Computing Cloud Computing
49. Provably Secure And Lightweight Identity Based Authenticated Data Sharing Cloud Computing
Protocol
50. Efficient Retrieval Over Documents Encrypted By Attributes In Cloud Computing Cloud Computing
51. An Efficient And Secured Framework For Mobile Cloud Computing Cloud Computing
52. A Key-Policy Attribute-Based Temporary Keyword Search Scheme For Secure Cloud Computing
Cloud Storage
53. an efficient and privacy-preserving biometric identification scheme in cloud Cloud Computing
computing
54. An Efficient And Secure Dynamic Auditing Protocol For Data Storage In Cloud Cloud Computing
Computing
55. Chaotic Searchable Encryption For Mobile Cloud Storage Cloud Computing
56. Efficient Traceable Authorization Search System For Secure Cloud Storage Cloud Computing
57. An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems Cloud Computing
58. Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm Cloud Computing
59. Division and Replication of Data in Cloud for Optimal Performance and Security Cloud Computing
60. Emotion Recognition on Twitter Comparative Study and Training a Unison Model Cloud Computing
61. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Computing
Cloud Storage
62. keyD secure key-deduplication with identity-based broadcast encryption Cloud Computing
63. Efficient Privacy-Aware Authentication Scheme For Mobile Cloud Computing
64. SeSPHR A Methodology for Secure Sharing of Personal Health Records Cloud Computing
JAVA MAJOR PROJECTS LIST-2023

65. Provably secure and lightweight identity-based authenticated data sharing protocol Cloud Computing
for cyber-physical cloud environment
66. Development And Examination Of Fog Computing Based Encrypted Control Fog Computing
System
67. On-The-Fly Privacy For Location Histograms Secure Computing
68. Analyzing Product Usage Based On Twitter Users Based On Data Mining Process Data Mining
69. Big Data Analytics Of Geosocial Media For Planning And Real-Time Decisions Data Mining
70. Credit Card Transactions Data Adversarial Augmentation In The Frequency Domain Data Mining
71. Crime Analysis Mapping, Intrusion Detection - Using Data Mining Data Mining
72. Data Mining And Feature Analysis Of College Students' Campus Network Behavior Data Mining
73. Multi View Clustering With The Cooperation Of Visible And Hidden Views Data Mining
74. Fuzzy K-Means Clustering With Discriminative Embedding Data Mining
75. Effective Keyword Search Over Weighted Graphs Data Mining
76. Ant Colony Stream Clustering A Fast Density Clustering Algorithm For Dynamic Data Mining
Data Streams
77. Toward Effective Collaborative Filtering Using Uninteresting Items Data Mining
78. Co-detect Financial Fraud Detection With Anomaly Feature Detection Data Mining
79. A Weighted Frequent Item Set Mining Algorithm Data Mining
80. Privacy Characterization and Quantification in Data Publishing Data Mining
81. Stock Market Analysis And Prediction Data Mining
82. Predictability and Prediction of Human Mobility Based on Application-Collected Data Mining
Location Data
83. Detecting And Characterizing Extremist Reviewer Groups In Online Product Social Network
Reviews
84. Protecting User Data In Profile Matching Social Networks Social Network
85. Trust-Based Video Management Framework For Social Multimedia Networks Social Network
86. User Behavior Prediction Of Social Hotspots Social Network
87. An Efficient Secure Electronic Payment System For E-Commerce Social Network
88. Fake News, Disinformation, And Deep Fakes: Leveraging Distributed Ledger Social Network
Technologies And Blockchain To Combat Digital Deception And Counterfeit
Reality
89. Detecting Malicious Social Bots Based On Click Stream Sequences Social Network
90. Predicting Cyber Bullying On Social Media In The Big Data Era Using Machine Social Network
Learning Algorithms Review Of Literature And Open Challenges
91. Spammer Detection And Fake User Identification On Social Networks Social Network
92. Towards Robust Image Steganography Social Network
93. Online Public Shaming On Twitter Detection, Analysis And Mitigation Social Network
94. Social Network Rumor Diffusion Predication Based On Equal Responsibility Game Social Network
Model
95. Retrieving Hidden Friends A Collusion Privacy Attack Against Online Friend Social Network
Search Engine
96. A Hierarchical Attention Model For Social Contextual Social Network
97. Mining Users Trust From E-Commerce Reviews Based On Sentiment Similarity Social Network
Analysis
98. Risk Assessment In Social Networks Based On User Anomalous Behaviors Social Network
JAVA MAJOR PROJECTS LIST-2023

99. Health Monitoring On Social Media Over Time Social Network


100. A Comprehensive Study On Social Network Social Network
101. Adaptive Diffusion Of Sensitive Information In Online Social Networks Social Network
102. Analyzing And Detecting Money-Laundering Accounts In Online Social Networks Social Network
103. Benchmarking Image Retrieval Diversification Techniques For Social Media Social Network
104. Detection Of Suicide-Related Posts In Twitter Data Streams Social Network
105. Hate Speech On Twitter A Pragmatic Approach To Collect Hateful And Offensive Social Network
Expressions And Perform Hate Speech Detection
106. An Online Social Network Based Question and Answer System Social Network
107. Distributed Machine Learning Oriented Data Integrity Machine Learning
108. Network Representation Learning Enhanced Recommendation Algorithm Machine Learning
109. Deep Collaborative Conjunctive Recommender For Rating Prediction Machine Learning
110. A Fuzzy Approach To Text Classification With Two Stage Training For Ambiguous Machine Learning
Instances
111. A Novel Method For Intrusion Detection Systems Using Support Vector Machine Machine Learning
112. Classification Of Non Linear Clustering Algorithms Machine Learning
113. Credit Card Fraud Detection Using Adaboost And Majority Voting Machine Learning
114. Detecting Malicious Packet Losses Machine Learning
115. An Efficient Privacy Preserving Message Authentication Scheme For Internet Of Internet of Things
Things
116. Scalable And Secure Big Data Iot System Based On Multifactor Authentication And Internet of Things
Lightweight Cryptography
117. An Efficient Iot Based Platform For Remote Real Time Cardiac Activity Monitoring Internet of Things
118. Towards Fine-Grained Access Control In Enterprise-Scale Internet-Of-Things Internet of Things
119. Securing Data In Internet Of Things Using Cryptography And Steganography Internet of Things
Techniques
120. Enhancing Data Security In Iot Healthcare Services Using Fog Computing Internet of Things
121. Employee Attendance Using QR-Scan In Front Of Webcam Information
Security
122. Cashless Society Managing Privacy And Security In The Technological Age Information
Security
123. Fraud Find Financial Fraud Detection By Analyzing Human Behavior Information
Security
124. Fraudvis Understanding Unsupervised Fraud Detection Algorithms Information
Security
125. Web Based Collaborative Big Data Analytics On Big Data Big Data
126. Leveraging Map Reduce To Efficiently Extract Associations Between Biomedical Big Data
Concepts From Large Text Data
127. Accounttrade Accountability Against Dishonest Big Data Buyers And Sellers Big Data
128. Big Data Analytics For Program Popularity Prediction In Broadcast TV Industries Big Data
129. Traffic And Energy Aware Routing For Heterogeneous WSN Networking
130. Energy Efficient Link-Delay Aware Routing In Wireless Sensor Networks Networking
131. Getrust- A Guarantee-Based Trust Model In Chord-Based P2P Networks Networking
132. A Lightweight Privacy-Preserving Authentication Protocol for VANETs Networking
133. An Integrated Indexing And Search Service For Distributed File System Distribute System
JAVA MAJOR PROJECTS LIST-2023

134. A Developer Centered Bug Prediction Model Software


Engineering
135. Block chain Based Accounts Payable Platform For Goods Trade Block Chain
136. A Data Analytical Approach To The Cybercrime Underground Economy Cyber Security
137. An Attribute-assisted Re-ranking Model for Web Image Search Image Processing
138. Digitital currency transacation using Blockchain Technology BlockChain

You might also like