0% found this document useful (0 votes)
68 views

Java Major 2023

We Provide all B.Tech(CSE,ECE,EEE,CIV,MECH, IOT, AI &ML, DATA SCIENCES) M.Tech, MCA, M.Sc, M.Com Projects with plagiarism & Grammar Check at reasonable price. Feel free to contact/ Whatsapp on : +91 9030800005, +91 9293800005.

Uploaded by

New Zen Infotech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

Java Major 2023

We Provide all B.Tech(CSE,ECE,EEE,CIV,MECH, IOT, AI &ML, DATA SCIENCES) M.Tech, MCA, M.Sc, M.Com Projects with plagiarism & Grammar Check at reasonable price. Feel free to contact/ Whatsapp on : +91 9030800005, +91 9293800005.

Uploaded by

New Zen Infotech
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

JAVA- PROJECTS LIST

MAJOR IEEE-B.TECH

* JAVA MAJOR PROJECTS LIST *

S.NO P.CODE PROJECT TITLE NAME


1 J2101 RACE Resource Aware Cost-Efficient Scheduler for Cloud Fog Environment
2 J2102 Detecting Suspicious File Migration or Replication in the Cloud
3 J2111 Certificateless public integrity checking of group shared data on cloud storage
4 J2113 Multi authority Attribute Based Keyword Search over Encrypted Cloud Data
5 J2116 A Statistical Inference Attack on Privacy-Preserving Biometric Identification Scheme
6 J2118 Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing
7 J2125 Dual Access Control for Cloud-Based Data Storage and Sharing
An Efficient Ciphertext Index Retrieval Scheme based on Edge Computing
8 J2128
Framework
9 J2129 Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
10 J2131 Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud
Blockchain Assisted Collaborative Service Recommendation Scheme With Data
11 J2132
Sharing
12 J2133 A Blockchain-based Approach for Drug Traceability in Healthcare Supply Chain
Data Trust Framework Using Blockchain Technology and Adaptive Transaction
13 J2134
Validation
14 J2135 A Blockchain based Autonomous Decentralized Online Social Network
15 J2136 Blockchain Based Accounts Payable Platform for Goods Trade
A Trusted Blockchain-Based Traceability System for Fruit and Vegetable
16 J2138
Agricultural Products
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things
17 J2140
Based on Blockchain
Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of
18 J2141
Things
Toward Detection and Attribution of Cyber-Attacks in IoT-enabled Cyber-physical
19 J2150
Systems
Personality aware Product Recommendation System based on User Interests Mining
20 J2154 and Meta path Discovery
Discovering Hidden Topical Hubs and Authorities Across Multiple Online Social
21 J2157
Networks
22 J2161 Query Expansion with Local Conceptual Word Embeddings in Microblog Retrieval
Enabling Secure and Space-Efficient Metadata Management in Encrypted
23 J2164
Deduplication
Hybrid Recommender System for Tourism Based on Big Data and AI A Conceptual
24 J2165
Framework
Detecting Mental Disorders in Social Media Through Emotional Patterns The case of
25 J2168 Anorexia and Depression

26 J2176 Protecting Your Shopping Preference with Differential Privacy


27 J2178 BullyNet: Unmasking Cyberbullies on Social Networks
28 J2002 Cashless Society Managing Privacy and Security in the Technological Age
29 J2004 Efficiently Processing Spatial and Keyword Queries in Indoor Venues
30 J2008 Feature-Level Rating System Using Customer Reviews and Review Votes

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MAJOR IEEE-B.TECH

31 J2009 Online Pricing with Reserve Price Constraint for Personal Data Markets
Personalized Long and Short term Preference Learning for Next POI
32 J2013
Recommendation
Authentication and Key Agreement Based on Anonymous Identity for Peer to-Peer
33 J2018
Cloud
Designing Secure and Efficient Biometric-Based Secure Access Mechanism for
34 J2019
Cloud Services
35 J2022 Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud
36 J2023
Storage
37 J2024 Development and Examination of Fog Computing-Based Encrypted Control System.
Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data
38 J2025
Sharing

39 J2026 A Secure and Efficient Cloud-Centric Internet of Medical Things-Enabled Smart


Healthcare System with Public Verifiability
Scalable and Secure Big Data IoT System Based on Multifactor Authentication and
40 J2027
Lightweight Cryptography
Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in
41 J2029
Public Cloud.
Secure Data Transfer and Deletion from Counting Bloom Filter in Cloud
42 J2030
Computing.
Secure Cloud Storage with Data Dynamics Using Secure Network Coding
43 J2035
Techniques
44 J2036 Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing
LEVER Secure Deduplicated Cloud Storage with Encrypted Two-Party Interactions
45 J2037
in Cyber-Physical Systems
46 J2038 Efficient Decentralized Attribute Based Access Control for Mobile Clouds

47 J2045 Characterizing the Propagation of Situational Information in Social Media During


COVID-19 Epidemic A Case Study on Weibo
User Behavior Prediction of Social Hotspots Based on Multi message Interaction
48 J2052
and Neural Network
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT
49 J2053
Systems
An Efficient Privacy Preserving Message Authentication Scheme for Internet-of-
50 J2055
Things
Decentralized Lightweight Group Key Management for Dynamic Access Control in
51 J2057
IoT Environments
Secure IoT Data Outsourcing With Aggregate Statistics and Fine- Grained Access
52 J2058
Control
53 J2059 Benchmarking Image Retrieval Diversification Techniques for Social Media
54 J2067 Detection of Social Network Spam Based on Improved Extreme Learning Machine
55 J2072 Crisis-Critical Intellectual Property Findings From the COVID-19 Pandemic
Block chain based Data Storage with Privacy and Authentication in Internet of
56 J2073
Things
57 J2074 Block chain-Based Secure Computation Offloading in Vehicular Networks

58 J2076 Secure Channel Free Certificate-Based Searchable Encryption Withstanding


Outside and Inside Keyword Guessing Attacks
59 J2077 Detecting and Characterizing Extremist Reviewer Groups in Online Product Reviews

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MAJOR IEEE-B.TECH

60 J2082 Fake News, Disinformation, and Deep fakes: Leveraging Distributed Ledger
Technologies and Blockchain to Combat Digital Deception and Counterfeit Reality
61 J1906 Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
62 J1907 CHARON: A Secure Cloud-of-Clouds System for Storing and Sharing Big Data
Ant Colony Stream Clustering: A Fast Density Clustering Algorithm for Dynamic
63 J19100
Data Streams
64 J19109 Trust-based Privacy-Preserving Photo Sharing in Online Social Networks
65 J19110 Towards Robust Image Steganography
66 J19111 Detection of fake online reviews using semi-supervised and supervised learning
Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity
67 J19112
Analysis
Privacy-aware Personal Data Storage (P-PDS) Learning how to Protect User Privacy
68 J1914
from External Applications
69 J1920 Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data
70 J1924 Data Integrity Auditing without Private Key Storage for Secure Cloud Storage
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud
71 J1927
Computing
72 J1930 Provable Data Possession with Outsourced Data Transfer
Clustering-Based Collaborative Filtering Using an Incentivized/Penalized User
73 J1934
Model
74 J1935 A Hierarchical Attention Model for Social Contextual Image Recommendation
75 J1939 DCCR: Deep Collaborative Conjunctive Recommender for Rating Prediction
76 J1944 Filtering Instagram hash tags through crowd tagging and the HITS algorithm
A Hybrid E-learning Recommendation Approach Based on Learners’ Influence
77 J1945
Propagation
78 J1946 Active Online Learning for Social Media Analysis to Support Crisis Management
79 J1949 Detecting Pickpocket Suspects from Large-Scale Public Transit Records
80 J1953 K-nearest Neighbor Search by Random Projection Forests
81 J1954 Learning Customer Behaviors for Effective Load Forecasting
82 J1961 Coverless Information Hiding Method Based on Web Text
83 J1962 SEPTIC Detecting Injection Attacks and Vulnerabilities Inside the DBMS
Automated Decision Making in Airport Checkpoints: Bias Detection Toward Smarter
84 J1965
Security and Fairness
85 J1966 Detecting Malicious Social Bots Based on Click stream Sequences
Authenticated Medical Documents Releasing with Privacy Protection and Release
86 J1967
Control
87 J1969 Privacy-Preserving Aggregate Queries for Optimal Location Selection
Enabling Efficient and Geometric Range Query with Access Control over Encrypted
88 J1973
Spatial Data
Social Network Rumor Diffusion Predication Based on Equal Responsibility Game
89 J1976
Model
90 J1977 Online Public Shaming on Twitter: Detection, Analysis and Mitigation
PersoNet: Friend Recommendation System Based on Big-Five Personality Traits and
91 J1978
Hybrid Filtering
A Fuzzy Approach to Text Classification with Two Stage Training for Ambiguous
92 J1979
Instances

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MAJOR IEEE-B.TECH

93 J1991 New Multi-Hop Clustering Algorithm for Vehicular Ad Hoc Networks


94 J1992 Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks

95 J1998 Predicting Cyberbullying on Social Media in the Big Data Era Using Machine
Learning Algorithms: Review of Literature and Open Challenges
96 J1999 Spammer Detection and Fake User Identification on Social Networks

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MAJOR IEEE-B.TECH

ABOUT NEWZEN:
NEWZEN INFOTECH is a ISO Certified Organization for providing Academic
Projects, Corporate Training, Software Development & Placement Services since 2008.
We are successfully providing the services at Telangana and Andhrapradesh. NEWZEN is
quickly emerging as an innovative and essential business software applications
development resource.
OUR SERVICES:

 Software Development
 Internship’s
 Academic Projects for Diploma, B.Tech, M.Tech, MCA, MBA, M.Sc, M.Com
 Trainings (Online/Offline)
 CRT Services
 Research Works
 Ph.D Works
 Publications
 Patent Works
 Placements
 Conferences
 Workshop’s
100% JOB ASSURED TRAINING’S ON

 Java
 Python
 Ms.Net
 Android
 Mainframes
 Testing Tools
 Blockchain Technology
 Data Sciences
 Cyber Hacking
Note: Job Guarantee program valid for 3 Months, Limited Seats for every month enrollment.

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005

You might also like