Java / J2EE Project List
Sl. No. |
Java / J2EE Title |
1 |
Big Data Analysis Using Partition Technique |
2 |
Multi-Focus Image Fusion Based On Spatial Frequency In Discrete Cosine Transform Domain |
3 |
A Skewness Algorithm Scheduling Approach For The Energetic Distribution Of Resources For Cloud Computing Environment Using Virtual Machines |
4 |
Adaptive QOS For Mobile Web Services Through Cross-Layer Communication |
5 |
Bounding The Advantage Of Multicast Network Coding In General Network Models |
6 |
Cipherxray: Exposing Cryptographic Operations And Transient Secrets From Monitored Binary Execution |
7 |
Green Networking With Packet Processing Engines: Modeling And Optimization |
8 |
A Highly Secure Video Steganography Using Hamming Code (7, 4) |
9 |
Meet You – Social Networking On Android |
10 |
Scalable Distributed Service Integrity Attestation For Software-As-A-Service Clouds |
11 |
Semantic Link Network-Based Model For Organizing Multimedia Big Data |
12 |
Streaming Solutions For Fine-Grained Network Traffic Measurements And Analysis |
13 |
OCCT: A One-Class Clustering Tree For Implementing One-To-Many Data Linkage |
14 |
A Novel Joint Data-Hiding And Compression Scheme Based On SMVQ And Image Inpainting |
15 |
Automated Graph Regularized Projective Nonnegative Matrix Factorization For Document Clustering |
16 |
Behavioral Malware Detection In Delay Tolerant Networks |
17 |
Hierarchical String Cuts: A Translation, Rotation, Scale, And Mirror Invariant Descriptor For Fast Shape Retrieval |
18 |
Image Quality Assessment For Fake Biometric Detection: Application To Iris, Fingerprint, And Face Recognition |
19 |
Iris Image Classification Based On Hierarchical Visual Codebook |
20 |
Streaming Solutions For Fine-Grained Network |
21 |
Traffic Measurements And Analysis |
22 |
Supporting Privacy Protection In Personalized Web Search |
23 |
Transformation-Based Monetary Cost Optimizations For Workflows In The Cloud |
24 |
A New Algorithm For Inferring User Search Goals With Feedback Sessions |
25 |
A Load Balancing Model Based On Cloud Partitioning |
For The Public Cloud |
|
26 |
A New Algorithm For Inferring User Search Goals With Feedback Sessions |
27 |
Content Sharing Over Smartphone-Based Delay-Tolerant Networks |
28 |
DCIM: Distributed Cache Invalidation Method For Maintaining Cache Consistency In Wireless Mobile Networks |
29 |
Distributed Processing Of Probabilistic Top-K Queries In Wireless Sensor Networks |
30 |
Dynamic Control Of Coding For Progressive Packet Arrivals In Dtns |
31 |
Dynamic Resource Allocation Using Virtual Machines For Cloud Computing Environment |
32 |
Multiparty Access Control For Online Social Networks: Model And Mechanisms |
33 |
Nice: Network Intrusion Detection And Countermeasure |
34 |
Selection In Virtual Network Systems |
35 |
On The Node Clone Detection In Wireless Sensor Networks |
36 |
Participatory Privacy Enabling Privacy In Participatory Sensing |
37 |
Privacy-Preserving Public Auditing For Secure Cloud Storage |
38 |
Protecting Sensitive Labels In Social Network Data Anonymization |
39 |
Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks |
40 |
TW-K-Means: Automated Two-Level Variable Weighting Clustering Algorithm For Multiview Data |
41 |
Abacus: An Auction-Based Approach To Cloud Service Differentiation |
42 |
Distributed Processing Of Probabilistic Top-K Queries In Wireless Sensor Networks |
43 |
Optimizing Cloud Resources For Delivering Iptv Services Through Virtualization |
44 |
SPOC: A Secure And Privacy-Preserving Opportunistic Computing Framework For Mobile-Healthcare Emergency |
45 |
Warning bird: A Near Real-Time Detection System For Suspicious URLS In Twitter Stream |
46 |
A Survey Of Intrusion Detection Systems In Wireless Sensor Networks |
47 |
Mining The Situation: Spatiotemporal Traffic Prediction With Big Data |