2017 - 2018 java projects bulk sale
S.No
|
Project
Title
|
1
|
Attribute-Based Storage
Supporting Secure Deduplication of Encrypted Data in Cloud
|
2
|
Audience Behavior Mining
Integrating TV Ratings with Multimedia Content
|
3
|
Cloud-Trust a Security Assessment Model for
Infrastructure as a Service (IaaS) Clouds
|
4
|
Collaborative
Filtering-Based Recommendation of Online Social Voting
|
5
|
Energy-Efficient
Query Processing in Web Search Engines
|
6
|
Secure
Data Sharing in Cloud Computing Using
|
7
|
Crawling
Hidden Objects with kNN Queries
|
8
|
Practical
Approximate k Nearest Neighbor
|
9
|
Customer-Satisfaction-Aware
Optimal Multi server Configuration for Profit Maximization in Cloud Computing
|
10
|
Privacy
Protection and Intrusion Avoidance forCloudlet-based Medical Data Sharing
|
11
|
Understand
Short Texts by Harvesting and Analyzing Semantic Knowledge
|
12
|
User
Vitality Ranking and Prediction
|
13
|
Routing
in Accumulative Multi-Hop Networks
|
14
|
Detecting
Mobile Malicious Webpages
|
15
|
NetSpam
a Network-based Spam Detection
|
16
|
Preventing
Distributed Denial-of-Service FloodingAttacks with Dynamic Path Identifiers
|
17
|
Collaborative
Filtering-Based Recommendation of Online Social Voting
|
18
|
Learning
to Rank Image Tags With Limited
|
19
|
Group
Key Agreement with Local Connectivity
|
20
|
A
Locality Sensitive Low-Rank Model for Image Tag Completion
|
21
|
A
Lightweight Secure Data Sharing Scheme
|
22
|
A
Novel Efficient Remote Data Possession
|
23
|
Achieving
secure, universal, and fine-grained
|
24
|
Efficient
and Expressive Keyword Search Over
|
25
|
Identity-Based
Data Outsourcing with Comprehensive Auditing in Clouds
|
26
|
Identity-based
Remote Data Integrity Checking
|
27
|
RAAC
Robust and Auditable Access Control with Multiple
|
28
|
Securing
Cloud Data under Key Exposure
|
29
|
Detecting
Stress Based on Social Interactions in Social Networks
|
30
|
Group
Key Agreement with Local Connectivity
|
31
|
Mining
Competitors from Large Unstructured Datasets
|
32
|
Mitigating
Cross-Site Scripting Attacks with a Content Security
Policy
|
33
|
Multi-Owner
Keyword Search over Shared Data without Secure Channels in the Cloud
|
34
|
N
- XSPath Navigation on XML Schemas Made Easy
|
35
|
NATERGM
A Model for Examining
|
36
|
Then
and Now On The Maturity of the Cybercrime Markets
|
37
|
Topic
Oriented Exploratory Search
|
38
|
TTSA
An Effective Scheduling Approach for
|
39
|
Analysis
of users’ behaviour in structured e-commerce websites
|
40
|
Aspect
Level Influence
|
41
|
Qos
recommendation in cloud services
|
42
|
Securing
Aggregate Queries for DNA Databases
|
43
|
Topic
Oriented Exploratory Search
|
44
|
Audience
Behavior Mining Integrating TV Ratings with Multimedia Content
|
45
|
Customer
Satisfaction Aware Optimal
|
46
|
Mitigating
Cross site scripting
|
47
|
Multi-owner
keyword search
|
48
|
Then
and Now On The Maturity of the Cybercrime Markets
|
49
|
Topic
Oriented Exploratory Search
|
50
|
Secure
Tensor Decomposition Using Fully Homomorphic Encryption
Scheme
|
51
|
Resource
Renting for Periodical Cloud Workflow Applications
|
52
|
Efficient
Keyword-aware Representative Travel
|
53
|
Achieving
Efficient and Secure Data Acquisition
|
54
|
A
New Service Mechanism for Profit Optimizations
|
55
|
QDA:
A Query-Driven Approach to Entity Resolution
|
56
|
A
robust reputation management mechanism in the federated cloud
|
57
|
Privacy
Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing
|
58
|
Provably
Secure Key-Aggregate Cryptosystems with Broadcast Aggregate Keys for Online
Data Sharing on the Cloud
|
59
|
Detecting
Mobile Malicious Web pages in Real Time
|
60
|
A
Distributed Publisher-Driven Secure Data Sharing Scheme for
Information-Centric IoT
|
61
|
Fast Phrase
Search for Encrypted Cloud Storage
|
62
|
SociRank
Identifying and Ranking Prevalent News Topics Using Social Media Factors
|
63
|
Generating
Query Facets using Knowledge Bases
|
64
|
Network
Capability in Localizing Node Failures via End-to-End Path Measurements
|
65
|
SUPERMAN:
Security Using Pre-Existing Routing for Mobile Ad hoc Networks
|
66
|
Privacy
Protection based Access Control Scheme in Cloud-based Services
|
67
|
A System
for Profiling and Monitoring Database Access Patterns
|
68
|
A Cross
Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification
and Verification
|
69
|
An Efficient
and Fine-grained Big Data
|
70
|
ProGuard:
Detecting Malicious Accounts in Social-Network-Based Online Promotions
|
71
|
A
Collaborative Key Management Protocol in Cipher text Policy Attribute Based
Encryption for Cloud Data Sharing
|
72
|
A Shoulder
Surfing Resistant Graphical Authentication System
|
73
|
An
Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud
Data
|
74
|
Finding
Related Forum Posts through Content Similarity over
Intention based
Segmentation
|
75
|
Publicly
Verifiable Boolean Query Over Outsourced Encrypted Data
|
76
|
Understand
Short Texts by Harvesting and Analyzing Semantic Knowledge
|
77
|
DeyPoS
Deduplicatable Dynamic Proof
|
78
|
A
Situational Analytic Method for User Behavior Pattern in
Multimedia
Social Networks
|
79
|
Enabling Personalized
Search over Encrypted Outsourced Data with Efficiency Improvement
|
80
|
|
81
|
Influential
Node Tracking on Dynamic SocialNetwork: An Interchange Greedy Approach
|
82
|
A Proxy
based Collaboration System to Minimize Content Download Time and Energy
Consumption
|
83
|
I injection
Toward effective collaborative filtering using uninteresting items
|
84
|
SWEET:
Serving the Web by Exploiting Email Tunnels
|
85
|
iASK: A
Distributed Q&A System Incorporating Social Community and Global
Collective Intelligence
|
86
|
Follow But
No Track Privacy Preserved Profile Publishing in Cyber Physical Social
Systems
|
87
|
FINE-GRAINED
TWO-FACTOR ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES
|
88
|
SocialQ&A
An Online Social Network Based Question and Answer System
|
89
|
Privacy and
Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks
|
90
|
Analyzing
Sentiments in One Go A Supervised Joint Topic Modeling Approach
|
91
|
Automatic
Generation of Social Event Storyboard from Image Click through Data
|
92
|
Rule based
method for entity recognzaation
|
93
|
Identity
based Encryption with Outsourced Revocation in Cloud Computing
|
94
|
SWEET:
Serving the Web by Exploiting Email Tunnels
|
95
|
Clustering
Data Streams Based on Shared Density between Micro-Clusters
|
thank you for your comment
pls call me on 8125424511