IEEE JAVA PROJECT 2017-2018
Real Time Project Center is your gateway to a treasure trove of Java projects that capture the essence of 2017-2018. These projects cover a wide spectrum of topics, from web applications to mobile solutions, and even system-level programming. By working on these projects, you not only enhance your technical skills but also gain historical context and insight into the evolution of Java technology.
Our experienced team of mentors and instructors is dedicated to helping you navigate these projects. They provide guidance not only on the technical aspects but also on the significance of each project in the larger landscape of Java development. This approach ensures that your learning is holistic and comprehensive.
Join Real Time Project Center in Chennai and embark on a journey through time and technology. Explore the world of 2017-2018 Java IEEE projects, where you’ll find a wealth of knowledge and hands-on experience waiting for you. This is your chance to connect with the technology of the past and prepare for a successful future in the dynamic field of Java development.
Real Time Project Center in Chennai is your stepping stone into the realm of 2017-2018 Java IEEE projects. Discover how the technology of that era has influenced today’s innovations and chart your course for success in the ever-evolving tech industry. Enroll now to be part of this exciting journey.
INFORMATION FORENSICS AND SECURITY
SNO | Projects List |
---|---|
1 | NetSpam A Network-Based Spam Detection Framework for Reviews in Online Social Media |
2 | A Cross Tenant Access Control (CTAC) Model for Cloud Computing Formal Specification and Verification |
3 | A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage |
4 | Strong Key-Exposure Resilient Auditing for Secure Cloud Storage |
5 | Secure and Efficient Cloud Data Deduplication With Randomized Tag |
7 | Rating prediction using review texts with underlying sentiments |
8 | Efficiently Promoting Product Online Outcome An Iterative Rating Attack Utilizing Product and Market Property |
9 | Preventing Distributed Denial-of-Service Flooding Attacks With Dynamic Path Identifiers |
10 | Enabling Cloud Storage Auditing with Key-Exposure Resistance |
11 | Privacy Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data |
12 | An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data |
CLOUD COMPUTING
1 | Publicly Verifiable Boolean Query Over Outsourced Encrypted Data |
2 | Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption |
3 | A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing |
4 | Securing Cloud Data under Key Exposure |
5 | A Robust Reputation Management Mechanism in Federated Cloud |
7 | Privacy protection based access control scheme in cloud-based services |
8 | Data Security Framework for Secure Cloud Computing |
9 | Joint Optimization of Bandwidth for Provider and Delay for User in Software Defined Data Centers |
10 | Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories |
11 | Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud |
12 | A Buyer–Seller Watermarking Protocol Based on Secure Embedding |
13 | Application-Aware Big Data Deduplication in Cloud Environment |
14 | Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing |
DATA MINING
1 | Keyword Search on Temporal Graphs |
2 | Efficient Keyword-aware Representative Travel Route Recommendation |
3 | Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud |
4 | SocialQ&A An Online Social Network Based Question and Answer System |
5 | An Approach for Building Efficient and Accurate Social Recommender Systems using Individual Relationship Networks |
6 | DRIMUX Dynamic Rumor Influence Minimization with User Experience in Social Networks |
7 | User-Centric Similarity Search |
8 | Probabilistic Models For Ad Viewability Prediction On The Web |
9 | Understand Short Texts by Harvesting and Analyzing Semantic Knowledge |
10 | RAPARE A Generic Strategy for Cold-Start Rating Prediction Problem |
11 | l-Injection Toward Effective Collaborative Filtering Using Uninteresting Items |
12 | Towards Real-Time, Country-Level Location Classification of Worldwide Tweets |
13 | Temporal Conformance Analysis and Explanation of Clinical Guidelines Execution an Answer Set Programming approach |
14 | Dynamic Facet Ordering for Faceted Product Search Engines |
15 | SociRank Identifying and Ranking Prevalent News Topics Using Social Media Factors |
16 | Identifying Users Across Social Networks Based on Dynamic Core Interests |
17 | Improving the customer relationship management Using Data Mining |
18 | Finding Related Forum Posts through Content Similarity over Intention-Based Segmentation |
19 | Engagement and Popularity Dynamics of YouTube Videos and Sensitivity to Meta-Data |
20 | Novel Visual and Statistical Image Features for Microblogs News Verification |
21 | Prediction analysis of risky credit using Data mining classification models |
22 | Prediction of Cancer Risk in Perspective of Symptoms using Naïve Bayes Classifier |
23 | Public Interest Analysis Based on Implicit Feedback of IPTV Users |
24 | Detecting Stress Based on Social Interactions in Social Networks |
25 | A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method |
26 | Ensuring privacy of e-medical health records using triple- des algorithm |
SERVICES COMPUTING
1 | Location Sharing Systems With Enhanced Privacy in Mobile Online Social Networks |
2 | Collaborative Filtering Service Recommendation Based on a Novel Similarity Computation Method |
3 | Transactional Behavior Verification in Business Process as a Service Configuration |
4 | Enabling Semantic Search based on Conceptual Graphs over Encrypted Outsourced Data |
DEPENDABLE AND SECURE COMPUTING
1 | Privacy-Preserving Multi-keyword Top-k Similarity Search Over Encrypted Data |
2 | Cloud Data Auditing Techniques with a Focus on Privacy and Security |
3 | My Privacy My Decision Control of Photo Sharing on Online Social Networks |
4 | FastGeo Efficient Geometric Range Queries on Encrypted Spatial Data |
MOBILE COMPUTING
1 | Detecting Mobile Malicious Web Page Detection In Real Time |
2 | Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services |
3 | Mobile Cloud-Based Big Health care Data Processing in Smart Cities |
NETWORKING
1 | Cost Efficient Design of Fault Tolerant Geo-Distributed Data Centers |
2 | Joint Routing and Energy Management in UnderWater Acoustic Sensor Networks |
3 | Improved EAACK Develop Secure Intrusion Detection System for MANETs Using Hybrid Cryptography |
4 | Data-Driven Faulty Node Detection Scheme for Wireless Sensor Networks |
5 | Network Capability in Localizing Node Failures via End-to-End Path Measurements |
MULTIMEDIA
1 | SocialQ&A An Online Social Network Based Question and Answer System |
2 | Overlapping Community Detection for Multimedia Social Networks |
3 | Toward Encrypted Cloud Media Center With Secure Deduplication |
4 | Two-Stage Friend Recommendation Based on Network Alignment and Series-Expansion of Probabilistic Topic Model |
5 | When to Make a Topic Popular Again A Temporal Model for Topic Re-hotting Prediction in Online Social Networks |