PLAGIARISM

HOME / B.TECH / JAVA / MAJOR / PROJECTS

B.TECH JAVA MAJOR PROJECTS LIST 2018-19

S.No Code PROJECT TITLE Download Titles Action
CLOUD COMPUTING
1 CTJV801 A Practical Public Key Encryption Scheme Based on Learning Parity with Noise
2 CTJV802 An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
3 CTJV803 CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics
4 CTJV804 Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing
5 CTJV805 A Power-of-Two Choices Based Algorithm for Fog Computing
6 CTJV806 virtFlow: Guest Independent Execution Flow Analysis Across Virtualized Environments
7 CTJV807 Adaptive Resource Management for Analyzing Video Streams from Globally Distributed Network Cameras
8 CTJV808 Enhancing Performance and Energy Efficiency for Hybrid Workloads in Virtualized Cloud Environment
9 CTJV809 Minimal Cost Server Configuration for Meeting Time-Varying Resource Demands in Cloud Centers
10 CTJV810 Aggregation-Based Colocation Datacenter Energy Management in Wholesale Markets
11 CTJV811 Provably secure and lightweight identity-based authenticated data sharing protocol for cyber-physical
cloud environment
12 CTJV812 Energy Efficient Scheduling of Servers with Multi-Sleep Modes for Cloud Data Center
13 CTJV813 A tight estimate of job completion time in vehicular clouds
14 CTJV814 HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems
15 CTJV815 An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers
16 CTJV816 Dynamic VM Scaling: Provisioning and Pricing through an Online Auction
17 CTJV817 Price-based Resource Allocation for Edge Computing: A Market Equilibrium Approach
18 CTJV818 Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing
19 CTJV819 An Efficient and Secured Framework for Mobile Cloud Computing
20 CTJV820 Efficient Traceable Authorization Search System for Secure Cloud Storage
21 CTJV821 A Robust Formulation for Efficient Application Offloading to Clouds
22 CTJV822 A Planning Approach for Reassigning Virtual Machines in IaaS Clouds
23 CTJV823 Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
24 CTJV873 A Lightweight secure data sharing scheme for mobile cloud computing
DATA MINING
1 CTJV824 CoDetect: Financial Fraud Detection With Anomaly Feature detection
2 CTJV825 Complementary Aspect-based Opinion Mining
3 CTJV826 Emotion Recognition on Twitter: Comparative Study and Training a Unison Model
4 CTJV827 Frequent Itemsets Mining With Differential Privacy Over Large- Scale Data
5 CTJV828 Health Monitoring on Social Media over Time
6 CTJV829 Online Product Quantization
7 CTJV830 Privacy Characterization and Quantification in Data Publishing
8 CTJV831 Road Traffic Speed Prediction: A Probabilistic Model Fusing multi secure data
9 CTJV832 Scalable Content-Aware Collaborative Filtering for Location Recommendation
10 CTJV833 SDE: A Novel Clustering Framework Based on Sparsity-Density Entropy
11 CTJV834 Search Result Diversity Evaluation based on Intent Hierarchies
12 CTJV835 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
13 CTJV836 A Two-stage Biomedical Event Trigger Detection Method Integrating Feature Selection and Word Embeddings
14 CTJV837 Automated Phrase Mining from Massive Text Corpora
15 CTJV838 A Two-Phase Algorithm for Differentially Private Frequent Subgraph Mining
16 CTJV839 Supervised Topic Modeling using Hierarchical Dirichlet Process-based Inverse Regression: Experiments
on E-Commerce Applications
17 CTJV840 Bayesian Nonparametric Learning for Hierarchical and Sparse Topics
18 CTJV841 Comments Mining With TF-IDF: The Inherent Bias and Its Removal
19 CTJV842 A Correlation-based Feature Weighting Filter for Naive Bayes
20 CTJV843 A Weighted Frequent Item set Mining Algorithm for Intelligent Decision in Smart Systems
21 CTJV844 An Efficient Method for High Quality and Cohesive Topical Phrase Mining
MACHINE LEARNING
1 CTJV845 A Comprehensive Study on Social Network Mental Disorders Detection via Online Social Media Mining
2 CTJV846 A Credibility Analysis System for Assessing Information on Twitter
3 CTJV847 A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing
4 CTJV848 Credit Card Fraud Detection Using AdaBoost and Majority Voting
5 CTJV849 Hate Speech on Twitter: A Pragmatic Approach to Collect Hateful and Offensive Expressions and Perform Hate Speech
Detection
6 CTJV950 Using Data Mining to Predict Hospital Admissions From the Emergency Department
SECURE COMPUTING
1 CTJV951 Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices
2 CTJV952 Magic Train: Design of Measurement Methods Against Bandwidth Inflation Attacks
NETWORKING
1 CTJV953 Energy Efficient Link-Delay Aware Routing in Wireless Sensor networks
2 CTJV954 GeTrust: A guarantee-based trust model in Chord-based P2P networks
3 CTJV955 PROVEST: Provenance-based Trust Model for Delay Tolerant networks
4 CTJV956 Traffic and Energy Aware Routing for Heterogeneous Wireless networks
SOCIAL NETWORKING
1 CTJV857 3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in social networks
2 CTJV858 Analyzing and Detecting Money-Laundering Accounts in Online social networks
3 CTJV859 Detection of suicide-related posts in Twitter data streams
4 CTJV860 Risk Assessment in Social Networks based on User Anomalous Behaviours
5 CTJV861 Segregating Spammers and Unsolicited Bloggers from Genuine Experts on Twitter
MOBILE COMPUTING
1 CTJV862 Distributed Faulty Node Detection in Delay Tolerant Networks: Design and Analysis
2 CTJV863 Efficient Privacy-Aware Authentication Scheme for Mobile Cloud
3 CTJV864 Identifying On-site Users for Social Events: Mobility, Content, and Social Relationship
4 CTJV865 Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing
5 CTJV866 Traffic-Aware Efficient Mapping of Wireless Body Area Networks to Health Cloud Service Providers in Critical Emergency
Situations
WEB MINING
1 CTJV867 Relevant Feedback Based Accurate and Intelligent Retrieval on Capturing User Intention for Personalized Websites
SECURE COMPUTING
1 CTJV868 A Hybrid Approach for Detecting Automated Spammers in twitter
2 CTJV869 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
3 CTJV870 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t- Closeness
4 CTJV871 Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage
INFORMATION FORENSIC SECURITY
1 CTJV872 Trust-based Collaborative Privacy Management in Online Social networks
INTERNET OF THINGS
1 CTJV874 Cloud-based Fine-grained Health Information Access Control Framework for Lightweight IoT Devices with Dynamic
Auditing and Attribute Revocation
2 CTJV875 Light-Weight Security and Data Provenance for Multi-Hop Internet of Things
IMAGE PROCESSING
1 CTJV876 Automatic Generation of Social Event Storyboard From Image Click-Through Data
2 CTJV877 Query-free Clothing Retrieval via Implicit Relevance Feedback
SOFTWARE ENGINEERING
1 CTJV878 A Developer Centered Bug Prediction Model
SERVICE COMPUTING(WEB SERVICES)
1 CTJV879 Lightweight Fine-Grained Search over Encrypted Data in Fog Computing
2 CTJV880 Semantic-based Compound Keyword Search over Encrypted Cloud Data
3 CTJV881 Quality and Profit Assured Trusted Cloud Federation Formation: Game Theory Based Approach
4 CTJV882 Optimizing Autonomic Resources for the Management of Large Service-Based Business Processes
5 CTJV883 Scheduling Inter-Datacenter Video Flows for Cost Efficiency
6 CTJV884 Migration Modeling and Learning Algorithms for Containers in Fog Computing
7 CTJV885 Multi-user Multi-task Computation Offloading in Green Mobile Edge Cloud Computing
8 CTJV886 Achieving Fairness-aware Two-level Scheduling for Heterogeneous Distributed Systems
BIG DATA
1 CTJV887 A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
2 CTJV888 AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers
3 CTJV889 Structural Balance Theory-based E-commerce Recommendation over Big Rating Data
4 CTJV890 Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage
CONSUMER ELECTRONICS , INDUSTRIAL ELECTRONICS
1 CTJV891 RRPhish Anti-Phishing via Mining Brand Resources Request
2 CTJV892 Confidence-interval Fuzzy Model-based Indoor Localization
INFORMATION AND COMMUNICATION SYSTEM
1 CTJV893 A Data Mining based Model for Detection of Fraudulent Behaviour in Water Consumpti
PATTERN ANALYSIS AND MACHINE INTELLIGENCE
1 CTJV894 Detecting Regions of Maximal Divergence for Spatio-Temporal Anomaly Detection
2 CTJV895 Ordinal Constraint Binary Coding for Approximate Nearest Neighbor Search
SOFTWARE ENGINEERING, COMPUTER GRAPHICS
1 CTJV896 Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection
2 CTJV897 EVA: Visual Analytics to Identify Fraudulent Events
INFORMATION AND SECURITY SYSTEMS
1 CTJV898 FraudFind: Financial Fraud Detection by Analyzing Human Behavior
2 CTJV899 FraudVis: Understanding Unsupervised Fraud Detection Algorithms
3 CTJV900 Machine Learning Applied to Rotating Check Fraud Detection

B.TECH JAVA MAJOR PROJECTS LIST 2017-18

S.No Code PROJECT TITLE Download Titles Action
1 CTJV701 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
2 CTJV702 A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
3 CTJV703 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
4 CTJV704 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users
5 CTJV105 A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
6 CTJV706 A robust reputation management mechanism in the federated cloud
7 CTJV707 Achieving Efficient and Secure Data Acquisition for Cloudsupported Internet of Things in Smart Grid
8 CTJV708 Achieving secure, universal, and fine-grained query results verification for secure search scheme over encrypted cloud data
9 CTJV709 Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems
10 CTJV710 Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
11 CTJV711 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
12 CTJV712 Fast Phrase Search for Encrypted Cloud Storage
13 CTJV713 Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
14 CTJV714 Identity-Based Encryption with Cloud Revocation Authority and Its Applications
15 CTJV715 Identity-Based Private Matching over Outsourced Encrypted Datasets
16 CTJV716 Identity-based Remote Data Integrity Checking with Perfect Data Privacy Preserving for Cloud Storage
17 CTJV717 On the Security of Data Access Control for Multi-authority Cloud Storage Systems
18 CTJV718 Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
19 CTJV719 Privacy Protection based Access Control Scheme in Cloud-based Services
20 CTJV720 Privacy-Preserving Multikeyword Similarity Search Over Outsourced Cloud Data
21 CTJV721 Provably Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online Data Sharing on the Cloud
22 CTJV722 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
23 CTJV723 Secure Data Sharing in Cloud Computing Using RevocableStorage Identity-Based Encryption
24 CTJV724 Securing Cloud Data under Key Exposure
25 CTJV725 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud
26 CTJV726 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud
27 CTJV727 Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
28 CTJV728 An Efficient Privacy-Preserving Ranked Keyword Search Method
29 CTJV729 Cda Generation And Integration For Health Information Exchange Based On Cloud Computing System
30 CTJV730 Conditional Identity-Based Broadcast Proxy Re-Encryption And Its Application To Cloud Email
31 CTJV731 Conjunctive Keyword Search With Designated Tester AndTiming Enabled Proxy Re Encryption Function For E-Health Clouds
32 CTJV732 Deypos: Deduplicatable Dynamic Proof Of Storage For MultiUse Environments
33 CTJV733 Diplocloud: Efficient And Scalable Management Of Rdf Data In The Cloud
34 CTJV734 Dual-Server Public-Key Encryption With Keyword Search For Secure CloudStorage
35 CTJV735 Dynamic And Public Auditing With Fair Arbitration For Cloud Data
36 CTJV736 Enabling Cloud Storage Auditing With Verifiable Outsourcing Of Keyupdates
37 CTJV737 Fine-Grained Two-Factor Access Control For Web-Based Cloud Computing Services
38 CTJV738 Flexible And Fine-Grained Attribute-Based Data Storage In Cloud Computing
39 CTJV739 Geometric Range Search On Encrypted Spatial Data
40 CTJV740 Identity-Based Encryption With Cloud Revocation Authority And Its Applications
41 CTJV741 Identity-Based Proxy-Oriented Data Uploading And Remote Data Integrity Checking In Public Cloud
42 CTJV742 Protecting Your Right: Verifiable Attribute-Based Keyword Serch With Fine-Grained Owner-Enforced Search
Authorization In The Cloud
43 CTJV743 Building An Intrusion Detection System Using A Filter-Based Feature Selection Algorithm
44 CTJV744 Connecting Social Media To E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
45 CTJV745 Cyberbullying Detection Based On Semantic-Enhanced Marginalized Denoising Auto-Encoder
46 CTJV746 Domain-Sensitive Recommendation With User-Item Subgroup Analysis
47 CTJV747 Efficient Algorithms For Mining Top-K High Utility Itemsets
48 CTJV748 Efficient Cache-Supported Path Planning On Roads
49 CTJV749 Location Aware Keyword Query Suggestion Based On Document Proximity
50 CTJV750 Nearest Keyword Set Search In Multi-Dimensional Datasets
51 CTJV751 Answering Approximate Queries Over Xml Data
52 CTJV752 An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
53 CTJV753 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
54 CTJV754 Collaborative Filtering-Based Recommendation of Online Social Voting
55 CTJV755 Computing Semantic Similarity of Concepts in Knowledge Graphs
56 CTJV756 Detecting Stress Based on Social Interactions in Social Networks
57 CTJV757 Dynamic Facet Ordering for Faceted Product Search Engines
58 CTJV758 Efficient Clue-based Route Search on Road Networks
59 CTJV759 Efficient Keyword-aware Representative Travel Route Recommendation
60 CTJV760 Energy-efficient Query Processing in Web Search Engines
61 CTJV761 Generating Query Facets using Knowledge Bases
62 CTJV762 Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
63 CTJV763 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items
64 CTJV764 Mining Competitors from Large Unstructured Datasets
65 CTJV765 Modeling Information Diffusion over Social Networks for Temporal Dynamic Prediction
66 CTJV766 Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
67 CTJV767 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
68 CTJV768 QDA: A Query-Driven Approach to Entity Resolution
69 CTJV769 Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
70 CTJV770 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem
71 CTJV771 SociRank: Identifying and Ranking Prevalent News Topics Using Social Media Factors
72 CTJV772 Towards Real-Time, Country-Level Location Classification of Worldwide Tweets
73 CTJV773 Trajectory Community Discovery and Recommendation by Multi- source Diffusion Modeling
74 CTJV774 Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
75 CTJV775 User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
76 CTJV776 User-Centric Similarity Search
77 CTJV777 When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
78 CTJV778 An Overlay Architecture for Throughput Optimal Multipath Routing
79 CTJV779 FaceChange: Attaining Neighbor Node Anonymity in Mobile Opportunistic Social Networks With Fine-Grained Control
80 CTJV780 Network Capability in Localizing Node Failures via End-to-End Path Measurements
81 CTJV781 Privacy and Integrity Preserving Top-k Query Processing for Two- Tiered Sensor Network
82 CTJV782 Routing in Accumulative Multi-Hop Networks
83 CTJV783 SWEET: Serving the Web by Exploiting Email Tunnels
84 CTJV784 Ipath: Path Inference In Wireless Sensor Networks
85 CTJV785 A Proxy-based Collaboration System to Minimize Content Download Time and Energy Consumption
86 CTJV786 Detecting Mobile Malicious Webpages in Real Time
87 CTJV787 Quantifying Interdependent Privacy Risks with Location Data
88 CTJV788 Searching Trajectories by Regions of Interest
89 CTJV789 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks
90 CTJV790 Detecting Node Failures In Mobile Wireless Networks: A Probabilistic Approach
91 CTJV791 Energy And Memory Efficient Clone Detection In Wireless Sensor Networks
92 CTJV792 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence
93 CTJV793 A Credibility Analysis System for Assessing Information on twitter
94 CTJV794 Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
95 CTJV795 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
96 CTJV796 My Privacy My Decision: Control of Photo Sharing on Online Social Networks
97 CTJV797 Privacy-Preserving Selective Aggregation of Online User Behavior Data
98 CTJV798 ProGuard: Detecting Malicious Accounts in Social-NetworkBased Online Promotions
99 CTJV799 Search Rank Fraud and Malware Detection in Google Play
100 CTJV800 Towards Detecting Compromised Accounts on Social Networks
101 CTJV801 Data Lineage In Malicious Environments
102 CTJV802 Frodo: Fraud Resilient Device For Off-Line Micro-Payments
103 CTJV803 Inference Attack On Browsing History Of Twitter
104 CTJV804 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media
105 CTJV805 Preventing Distributed Denial-of-Service Flooding Attacks with Dynamic Path Identifiers
106 CTJV806 Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
107 CTJV807 Privacy-Preserving Utility Verification Of The Data Published By Non-Interactive Differentially Private Mechanisms
108 CTJV808 A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT
109 CTJV809 An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy
110 CTJV810 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services
111 CTJV811 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems
112 CTJV812 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud
113 CTJV813 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
114 CTJV814 SocialQ&A: An Online Social Network Based Question and Answer System
115 CTJV815 Automatic Generation of Social Event Storyboard from Image Click-through Data
116 CTJV816 Image Re-ranking based on Topic Diversity
117 CTJV817 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement
118 CTJV818 A Scalable Approach For Content-Based Image Retrieval In Peer-To- Peer Networks
119 CTJV819 Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model
120 CTJV820 A System for Profiling and Monitoring Database Access Patterns by Application Programs for Anomaly Detection
121 CTJV821 Improving Automated Bug Triaging with Specialized Topic Model
122 CTJV822 Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method
123 CTJV823 Transactional Behavior Verification in Business Process as a Service Configuration

B.TECH JAVA MAJOR PROJECTS LIST 2016-17

S.No Code PROJECT TITLE Download Titles Action
1 CTJV701 A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks
2 CTJV702 AN EFFICIENT FILE HIERARCHY ATTRIBUTE-BASED ENCRYPTION SCHEME IN CLOUD COMPUTING
3 CTJV703 Booster in High Dimensional Data Classification
4 CTJV704 Building an intrusion detection system using a filter-based feature selection algorithm
5 CTJV705 Cloud Based Multimedia Content Protection System
6 CTJV706 Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
7 CTJV707 Detecting Node Failures in Mobile Wireless Networks A Probabilistic Approach
8 CTJV708 Dynamic Job Ordering and Slot Configurations for Mapreduce Workloads
9 CTJV709 Efficient Algorithms for Mining Top-K High Utility Itemsets
10 CTJV710 Efficient Cache-Supported Path Planning on Roads
11 CTJV711 iPath Path Inference in Wireless Sensor Networks
12 CTJV712 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
13 CTJV713 Identity-Based Encryption with Outsourced Revocation in Cloud Computing
14 CTJV714 Key Updating for Leakage Resiliency With Application to AES Modes of Operation
15 CTJV715 CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System
16 CTJV716 Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds
17 CTJV717 Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage
18 CTJV718 Dynamic and Public Auditing with Fair Arbitration for Cloud Data
19 CTJV719 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services
20 CTJV720 Geometric Range Search on Encrypted Spatial Data
21 CTJV721 Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
22 CTJV722 Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search
Authorization in the Cloud
23 CTJV723 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
24 CTJV724 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information
25 CTJV725 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
26 CTJV726 Location Aware Keyword Query Suggestion Based on Document Proximity
27 CTJV727 Energy and Memory Efficient Clone Detection in Wireless Sensor Networks
28 CTJV728 Data Lineage in Malicious Environments
29 CTJV729 FRoDO: Fraud Resilient Device for Off-Line Micro-Payments
30 CTJV730 Answering Approximate Queries Over XML Data
31 CTJV731 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
32 CTJV732 Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
33 CTJV733 Domain-Sensitive Recommendation with User-Item Subgroup Analysis
34 CTJV734 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata
35 CTJV735 Metamorphic Testing for Software Quality Assessment A Study of Search
36 CTJV736 Nearest Keyword Set Search in Multi dimensional Datasets
37 CTJV737 Quantifying Political Leaning from Tweets,Retweets, and Retweeters
38 CTJV738 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
39 CTJV739 DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud

B.TECH JAVA MAJOR PROJECTS LIST 2015-16

S.No Code PROJECT TITLE Download Titles Action
1 CTJV601 SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
2 CTJV602 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks
3 CTJV603 A Proximity-Aware Interest-Clustered P2P File Sharing System
4 CTJV604 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
5 CTJV605 Adaptive Network Coded Clouds
6 CTJV606 Automatic Test Packet Generation
7 CTJV607 A Computational Dynamic Trust Model for User Authorization
8 CTJV608 data mining with big data
9 CTJV609 Detecting Malicious Facebook Applications
10 CTJV610 Discovery of Ranking Fraud for Mobile Apps
11 CTJV611 FOCS- Fast Overlapped Community Search
12 CTJV612 Preserving Location Privacy in Geo-Social Applications
13 CTJV613 Efficient Prediction of Difficult Keyword Queries
14 CTJV614 Efficient and Privacy-Aware Data
15 CTJV615 A Profit Maximization Scheme with Guaranteed
16 CTJV616 A Scalable and Reliable Matching Service for Content-Based Publish/Subscribe Systems
17 CTJV617 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
18 CTJV618 Audit-Free Cloud Storage via Deniable Attribute-based Encryption
19 CTJV619 Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
20 CTJV620 Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
21 CTJV621 Provable Multicopy Dynamic Data Possession in Cloud Computing System
22 CTJV622 Secure Auditing and Deduplicating Data in Cloud
23 CTJV623 Stealthy Denial of Service Strategy in Cloud Computing
24 CTJV624 Best Keyword Cover Search
25 CTJV625 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model
26 CTJV626 Progressive Duplicate Detection
27 CTJV627 A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks
28 CTJV628 A Proximity-Aware Interest-Clustered P2P File Sharing System
29 CTJV629 Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
30 CTJV630 User-Defined Privacy Grid System for Continuous Location-Based Services
31 CTJV631 DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attacks
32 CTJV632 Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints
33 CTJV633 Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
34 CTJV634 Real-Time Detection of Traffic From Twitter Stream Analysis
35 CTJV635 Privacy-Preserving Public Auditing for Regenerating Code-Based Cloud Storage
36 CTJV636 Context-Based Diversification for Keyword Queries Over XML Data
37 CTJV637 Malware Propagation in Large-Scale Networks
38 CTJV638 Tweet Segmentation and Its Application to Named Entity Recognition
39 CTJV639 An Attribute-assisted Reranking Model for Web Image Search
40 CTJV640 Steganography Using Reversible Texture Synthesis
41 CTJV641 YouTube Video Promotion by Cross-network
42 CTJV642 Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
43 CTJV643 The Impact of View Histories on Edit Recommendations

B.TECH JAVA MAJOR PROJECTS LIST 2014-15

S.No Code PROJECT TITLE Download Titles Action
1 CTJV501 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
2 CTJV502 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
3 CTJV503 Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
4 CTJV504 Cloud Armor: Supporting Reputation-based Trust Management for Cloud Services
5 CTJV505 Friend book A Semantic-based Friend Recommendation System for Social Networks
6 CTJV506 EAACK—A Secure Intrusion-Detection
7 CTJV507 A Load Balancing Model Based on Cloud Partitioning
8 CTJV508 Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
9 CTJV509 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
10 CTJV510 Fast nearest Neighbor Search with Keywords
11 CTJV511 Towards Online Shortest Path Computation
12 CTJV512 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems
13 CTJV513 Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks
14 CTJV514 On the Security of Data Access Control
15 CTJV515 Supporting Privacy Protection in Personalized Web Search
16 CTJV516 Cloud Based SQL Query Processor
17 CTJV517 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
18 CTJV518 Crowd sourcing Predictors of Behavioral Outcomes
19 CTJV519 Comparable Entity Mining from Comparative Questions
20 CTJV520 Facilitating Effective User Navigation through Website Structure Improvement
21 CTJV521 Robust Module-based Data Management
22 CTJV522 Vampire attacks: Draining life from wireless ad-hoc sensor networks
23 CTJV523 Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
24 CTJV524 A Dynamic Secure Group Sharing Framework in Public Cloud Computing
25 CTJV525 A Scalable Server Architecture for Mobile Presence Services in Social Network Applications
26 CTJV526 A System to Filter Unwanted Messages from OSN User Walls
27 CTJV527 Access Policy Consolidation for Event Processing Systems
28 CTJV528 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
29 CTJV529 Cloud computing for mobile users can offloading compution save energy
30 CTJV530 CloudMoV Cloud-based Mobile Social TV
31 CTJV531 Crowd sourcing Predictors of Behavioral Outcomes
32 CTJV532 Enforcing Secure and Privacy-Preserving
33 CTJV533 Extracting Spread-Spectrum Hidden Data from Digital Media
34 CTJV534 FoCUS: Learning to Crawl Web Forums
35 CTJV535 Fully Anonymous Profile Matching In Mobile Social Networks
36 CTJV536 Identity-Based Secure Distributed Data Storage
37 CTJV537 Mining Contracts for Business Events And Temporal Constraints in Service Engagements
38 CTJV538 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
39 CTJV539 PMSE A Personalized Mobile Search Engine
40 CTJV540 Price Differentiation for Communication Networks
41 CTJV541 Security and Privacy-Enhancing Multicloud Architectures
42 CTJV542 Sensitive Label Privacy Protection on Social
43 CTJV543 Supporting Privacy Protection in Personalized Web Search
44 CTJV544 Towards a Statistical Framework for Source Anonymity in Sensor Networks
45 CTJV545 Understanding the Performance and Potential of Cloud Computingfor Scientific Applications
46 CTJV546 Comparable Entity Mining from Comparative Questions