M.TECH JAVA PROJECTS
M.TECH JAVA 2016 PROJECTS

SL.NO

Name of The Project

Abstract

Year

DATA MINING
1 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data Download 2016
2 A New Algorithm for Inferring User Search Goals with Feedback Sessions Download 2016
3 M-Privacy for Collaborative Data Publishing Download 2016
4 Annotating Search Results from Web Databases Download 2016
5 Crowd sourcing Predictors of Behavioral Outcomes Download 2016
6 Anomaly Detection via Online Over-Sampling Principal Component Analysis Download 2016
7 Spatial Approximate String Search Download 2016
8 Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks Download 2016
9 Facilitating Document Annotation Using Content and Querying Value Download 2016
10 Protecting Sensitive Labels in Social Network Data Anonymization Download 2016
11 Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development Download 2016
12 A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia Download 2016
13 A System to Filter Unwanted Messages from OSN User Walls Download 2016
14 Anonymization of Centralized and Distributed Social Networks by Sequential Clustering Download 2016
15 Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection Download 2016
16 A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal Pairs Download 2016
17 Clustering Sentence-Level Text Using a Novel Fuzzy RelationalClustering Algorithm Download 2016
18 Intrusion Detection Technique by using K-means, Fuzzy Neural Network and SVM classifiers. Download 2016
19 Preventing Private Information Inference Attacks on Social Networks Download 2016
20 Multiparty Access Control for Online Social Networks Model and Mechanisms Download 2016
21 Incentive Compatible Privacy-Preserving Data Analysis Download 2016
22 Comparable Entity Mining from Comparative Questions. Download 2016
23 Facilitating Effective User Navigation through Website Structure Improvement. Download 2016
24 Focus Learning to Crawl Web Forums. Download 2016
25 PMSE A Personalized Mobile Search Engine. Download 2016
26 Robust Module Based Data Management. Download 2016
27 Sensitive Label Privacy Protection on Social Network Data. Download 2016
28 Privacy-Preserving Mining of Association Rules Download 2016
29 Supporting Search-As-You-Type Using SQL in Databases Download 2016
30 Creating Evolving User Behaviour Profiles Automatically Download 2016
CLOUD COMPUTING
1 A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems Download 2016
2 A Load Balancing Model Based on Cloud Partitioning for the Public Cloud Download 2016
3 CloudMoV: Cloud-based Mobile Social TV Download 2016
4 Privacy-Preserving Public Auditing for Secure Cloud Storage Download 2016
5 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment Download 2016
6 Error-Tolerant Resource Allocation and Payment Minimization for Cloud System Download 2016
7 Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations Download 2016
8 Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Download 2016
9 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System Download 2016
10 Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems Download 2016
11 Optimizing Cloud Resources for Delivering IPTV Services Through Virtualization Download 2016
12 Privacy Preserving Delegated Access Control in Public Clouds Download 2016
13 Attribute-Based Encryption With Verifiable Outsourced Decryption Download 2016
14 Mining Contracts for Business Events and Temporal Constraints in Service Engagements Download 2016
15 Winds of Change: From Vendor Lock-In to the Meta Cloud Download 2016
16 Privacy-Preserving Public Auditing for Secure Cloud Storage Download 2016
17 Ames-cloud: a framework of adaptive mobile video streaming and efficient social video sharing in the clouds Download 2016
18 Cloud Computing For Mobile Users: Can Offloading Computation Save Energy? Download 2016
19 A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud. Download 2016
SECURE COMPUTING
1 EAACK—A Secure Intrusion-Detection System for MANET Download 2016
2 Privacy Preserving Data Sharing With Anonymous ID Assignment Download 2016
3 Identity-Based Secure Distributed Data Storage Schemes Download 2016
4 Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks Download 2016
5 Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links Download 2016
6 SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems Download 2016
7 NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Download 2016
8 Securing Class Initialization in Java-like Languages Download 2016
9 WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream Download 2016
10 Two tales of privacy in online social networks Download 2016
11 Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs Download 2016
12 Twitsper: Tweeting Privately Download 2016
13 Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks Download 2016
14 Cross-Domain Privacy-Preserving Cooperative Firewall Optimization Download 2016
15 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring Download 2016
16 Extracting Spread-Spectrum Hidden Data from Digital Media Download 2016
17 Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach Download 2016
NETWORKING
1 A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks Download 2016
2 Delay-Based Network Utility Maximization Download 2016
3 Dynamic Control of Coding for Progressive Packet Arrivals in DTNs Download 2016
4 Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols Download 2016
5 On the Node Clone Detection in Wireless Sensor Networks Download 2016
6 Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power Download 2016
7 Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks Download 2016
8 Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm Download 2016
9 Participatory Privacy: Enabling Privacy in Participatory Sensing Download 2016
10 Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks Download 2016
11 Access Policy Consolidation for Event Processing Systems Download 2016
12 Fully Anonymous Profile Matching in Mobile Social Networks. Download 2016
13 Privacy-preserving distributed profile matching in proximity-based mobile social networks—net working Download 2016
14 A Decentralized Privacy Preserving Reputation Protocol For The Malicious Download 2016
MOBILE COMPUTING
1 Content Sharing over Smartphone-Based Delay-Tolerant Networks Download 2016
2 DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks Download 2016
3 Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks Download 2016
4 Efficient Rekeying Framework for Secure Multicast with Diverse- Subscription-Period Mobile Users Download 2016
5 Toward a Statistical Framework for Source Anonymity in Sensor Networks Download 2016
6 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks Download 2016
7 Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks Download 2016
8 Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System Download 2016
9 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data Download 2016
10 A Scalable Server Architecture for Mobile Download 2016
11 Distributed Cooperative Caching in Social Wireless Networks Download 2016
PARALLEL & DISTRIBUTED SYSTEMS
1 A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Download 2016
2 Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme Download 2016
3 IP-Geolocation Mapping for Moderately Connected Internet Regions Download 2016
4 Optimal Client-Server Assignment for Internet Distributed Systems Download 2016
5 SocialTube P2P-assisted Video Sharing in Online Social Networks Download 2016
6 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Download 2016
7 Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment Download 2016
8 Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. Download 2016
9 Towards Differential Query Services in Cost-Efficient Clouds Download 2016
SOFTWARE ENGINEERING
1 Whole Test Suite Generation Download 2016
2 Toward Secure Multikeyword Top-k Retrieval over Encrypted Cloud Data: Download 2016
SERVICE COMPUTING (WEB SERVICE)
1 A Decentralized Service Discovery Approach on Peer-to-Peer Networks Download 2016
2 Personalized QoS-Aware Web Service Recommendation and Visualization Download 2016
3 Privacy-Enhanced Web Service Composition Download 2016
PATTERN ANALYSIS & MACHINE INTELLIGENCE
1 A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data Download 2016
MULTI MEDIA
1 Understanding the External Links of Video Sharing Sites: Measurement and Analysis Download 2016
M.TECH JAVA 2015 PROJECTS
1 A Unified Probabilistic Framework for Name Disambiguation in Digital Library Download 2015
2 An object-oriented web model for testing web application Download 2015
3 A Novel Security Scheme for online banking Download 2015
4 Audio Cryptography System Download 2015
5 Active Visual Segmentation Download 2015
6 An Improved Geocast for mobile Ad Hoc networks Download 2015
7 Efficient Search for Educational Video Resources Using Linked data Approach to Support Distance Learning Download 2015
8 A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication Download 2015
9 Bootstrapping Ontologies Download 2015
10 Catching Packet Droppers and Modifiers Download 2015
11 A Cloud Computing Security From Single to Multi-Clouds Download 2015
12 A Secure Intrusion detection system against DDOS attack in Wireless Mobile. Download 2015
13 Defenses Against large Scale online Password Guessing Attacks by Using Persuasive click points Download 2015
14 Distributed Control Law For load Balancing in CDN Download 2015
15 Design and Implementation of TARF Download 2015
16 Distributed throughput maximization in wireless networks via random power allocation Download 2015
17 An efficient caching scheme and consistency maintenance in hybrid p2p system Download 2015
18 A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding Download 2015
19 E-Mili Energy minimizing idle listening in Wireless Networks Download 2015
20 Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data Download 2015
21 Ensuring Data Storage Security in Cloud Computing Download 2015
22 Ensuring Distributed Accontability for data sharing in clouds Download 2015
23 Footprint Detecting Sybil Attacks in Urban Vehicular Networks Download 2015
24 Local Greedy Approximation for Scheduling in Multihop Wireless Networks Download 2015
25 Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Download 2015
26 Organizing User Search Histories Download 2015
27 Latency Equalization as a New Network Service Primitive Download 2015
28 Traffic Light Mapping and Detection Download 2015
29 Load-Balancing Multipath Switching System with Flow Slice Download 2015
30 Multi-path Encrypted Data Security Architecture for Mobile Ad hoc Networks Download 2015
31 Nymble Blocking Misbehaving Users in Anonymizing Networks Download 2015
32 On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays Download 2015
33 Online System for Grid Resource Monitoring and Machine Learning-Based Prediction Download 2015
34 Robust video data hiding using forbidden zone data hiding And selective embedding Download 2015
35 SMS-A Study of the Short Message Service of a Nationwide Cellular Network Download 2015
36 Packet-Hiding Methods for Preventing Selective Jamming Download 2015
37 A Framework for Personal Mobile Commerce Pattern Mining and Prediction Download 2015
38 Privacy- and Integrity-Preserving Range Queries in Sensor Networks Download 2015
39 Publishing Search Logs—A Comparative Study of Privacy Guarantees Download 2015
40 Outsourced similarity search on Metric Data Assets Download 2015
41 Ranking Model Adaptation for Domain-Specific Search Download 2015
42 Risk-Aware_Mitigation for MANET routing attacks Download 2015
43 Slicing A New Approach for Privacy Preserving Data Publishing Download 2015
44 Privacy-Preserving_Updates_to_Anonymous_and_Confidential_Databases Download 2015
45 Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Download 2015
46 Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Download 2015
47 Understanding Node Localizability of Wireless Ad Hoc and Sensor Networks Download 2015
48 QoS Assurance for Dynamic Reconfiguration of Component-Based Software Systems Download 2015
49 Improving Various Reversible Data Hiding Schemes Via Optimal Codes for Binary Covers Download 2015
50 Privacy-Preserving Public Auditing for Secure Cloud Storage Download 2015
51 Clustering with Multiviewpoint Download 2015
52 Adaptive Opportunistic Routing for Wireless Ad Hoc Networks Download 2015
53 Effective Pattern Discovery for Text Mining Download 2015
54 Scalable and Secure Sharing of Personal Health Records in Cloud Computing usingAttribute-based Encryption Download 2015
55 A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group Download 2015
56 Towards Secure and Dependable Storage Services in Cloud Computing Download 2015
57 Anchor: A Versatile and Efficient Framework for Resource Management Download 2015
58 A Link-Based Cluster Ensemble Approach for Categorical Data Clustering Download 2015
59 Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems Download 2015
60 Mining Web Graphs for Recommendations Download 2015
61 Risk-Aware Mitigation for MANET Routing Attacks Download 2015
62 Detecting Spammers and Content Promoters in Online Video Social Networks Download 2015
63 Temporal Data Clustering via Weighted Clustering Ensemble Download 2015
64 Energy-Efficient Cooperative Video Distribution With Statistical Qos Provisions Over Wireless Netwokrs Download 2015
65 Going Back And Forth Efficient Multideployment And MultiSnapShotting On Clouds Download 2015
66 Ranking and Clustering Software Cost Estimation Models through a Multiple comparissions Algorithm Download 2015
67 A Distributed Control Law For load Balancing In CDN Download 2015
68 The Three-Tier Security Scheme In Wireless Sensor Networks With Mobile Sinks Download 2015
69 Mobile backbone network Download 2015
70 Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks Download 2015
71 Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks Download 2015
72 Creating Evolving User Behavior Profiles Automatically Download 2015
73 TAM A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks Download 2015