You are on page 1of 5

JAVA- PROJECTS LIST

MINI IEEE-B.TECH

JAVA MINI PROJECTS LIST -2023-24


S.No P.CODE MODIFIED TITLE
1 J1999 Detecting Spammers and Identifying Fake Users on Social Networks
Predicting Social Media Cyberbullying in the Big Data Era with Machine Learning
2 J1998
Algorithms
3 J1992 Robust Wireless Ad Hoc Network Selective Drop Attack Defense
4 J1991 New Vehicle Ad Hoc Network Multi-Hop Clustering Algorithm
5 J1979 Fuzzy Text Classification with Two-Stage Training for Ambiguous Instances
6 J1978 PersoNet: Big-Five Personality Traits and Hybrid Filtering Friend Recommendation System
7 J1977 Twitter Public Shaming: Detection, Analysis, and Mitigation
8 J1976 Equal Responsibility Game Model for Social Network Rumor Diffusion Prediction
9 J1973 Optimizing Geometric Range Query with Access Control on Encrypted Spatial Data
10 J1969 Location Selection: Ensuring Privacy with Aggregate Queries
11 J1967 Validated Medical Documents with Privacy and Release Control
12 J1966 Using click stream sequences to detect malicious social bots
Improving Security and Fairness: Detecting Bias in Airport Checkpoint Automated Decision
13 J1965
Making
14 J1962 Detecting DBMS Injection Attacks and Vulnerabilities with SEPTIC
15 J1961 Unveiling the Secrets: Web Text-Based Information Hiding
16 J1954 Effective load forecasting requires customer behavior learning.
17 J1953 Random Projection Forests K-nearest Neighbor Search
18 J1949 Locating Pickpockets in Large-Scale Public Transit Records
19 J1946 Active crisis management social media analysis training online
20 J1945 Recommendation for Hybrid E-learning Based on Learners' Influence
21 J1944 Crowd-tagging and HITS algorithm Instagram hash tag filtering
22 J1939 DCCR: Deep Collaborative Conjunctive Rating Prediction
23 J1935 A Social Contextual Image Recommendation Hierarchical Attention Model
24 J1934 Collective Filtering with Incentivized/Penalized Users via Clustering
25 J1930 Proof of Data Possession with Outsourced Transfer
26 J1927 Cloud computing's Secure Privilege-Based Multilevel Organizational Data-Sharing
27 J1924 Secure Cloud Storage Data Integrity Auditing without Private Key Storage
28 J1920 Verifying and Dynamic Ranked Search Over Outsourced Data
29 J1914 Protected Personal Data Storage How to Protect User Privacy from External Apps
30 J19112 Sentiment Similarity Analysis for E-Commerce Review Trust Mining
31 J19111 Detecting false online reviews using semi-supervised and supervised learning
32 J19110 Robust Image Steganography: A Path Forward
33 J19109 Privacy-Preserving Photo Sharing on Social Media: A Trust-Based Approach
34 J19100 Fast Density Clustering for Dynamic Data Streams: Ant Colony Stream Clustering
35 J1907 CHARON: Secure Cloud-of-Clouds for Big Data Storage and Sharing
36 J1906 Cloud Cryptologically Enforced Dynamic Access Control
37 J1864 IaaS Cloud Virtual Machine Redeploying Strategy
38 J1856 Efficiency and Security in Cloud-Assisted eHealth Deduplication
39 J1844 Emergency Room Visit Prediction using Hospitalization Data Mining

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MINI IEEE-B.TECH

40 J1834 The Long-Term Impact of Monitoring Health on Social Media


41 J1830 Specific and sophisticated user feedback retrieval for website modification
42 J1826 Use selected database projections to mine high-value item sets
43 J1815 Smart System Intelligent Decision Mining Algorithm Using Weighted Frequent Item Sets
44 J18120 The IoT: MDSClone Detection
45 J18119 Low-Overhead IoT Security and Data Origin Tracking in Multi-Hop Networks
46 J1792 ProGuard for Social Network Promotions Threat Account Identification
47 J1791 Verifying Top Cloud Search Results
48 J1790 Top-K Cloud Graph Encryption Keyword Searches
49 J1789 Keyword Searching Secure Cloud Data and Limiting Access
50 J1783 Q&A platform SocialQ&A uses social networks
51 J1782 Real Time Mobile Web Page Malware Detection
52 J1768 Similarity Computation for New Collaborative Filtering Service
53 J1766 The Rise of Google Play Malware and SEO Fraud
54 J1764 SUPERMAN: Using Existing Routing for Ad Hoc Network Security
55 J1752 Analysis of Social Media Photo Sharing
56 J1751 Detecting Social Media Spam using Net Spam
57 J1750 Short Text Knowledge Extraction and Analysis
58 J1747 Rapid Cloud-Based Encrypted Searching
59 J1738 Injecting irrelevant data improves collaborative filtering
60 J1733 Cloud Service Access Control with protection
61 J1730 Deduplicating encrypted data safely in the cloud with attribute-based storage
62 J1727 Numeric SQL Range Queries in a Two-Cloud Secure Database for Privacy
63 J1722 Finding entities via query-driven analysis
64 J1721 Modelling Social Network Information Diffusion to Predict Temporal Dynamics
65 J1716 Social Voting and Collaborative Filtering Content Recommendation
66 J1714 Finding the Best Routes for a Representative Travel Experience Using Relevant Keywords
67 J1713 Finding Effective Road Network Routes using Clues
68 J1712 Stress Indication from Network Social Interactions
69 J1709 Joint topic modeling in supervised emotional analysis
70 J1708 Dynamic facet ordering search engines for faceted products
71 J1707 Assessing and Forecasting the Significance of Social Media
72 J1702 Conceptual similarity calculation using knowledge graphs
73 J1701 Cleaning and categorizing huge data sets iteratively
74 J1679 Enhancing Cloud Security: Encrypted Data and Routine Language Search
75 J1678 Location and privacy are critical when utilizing k-nearest neighbor
76 J1677 Scalable peer-to-peer image retrieval utilizing content
77 J1676 Bug reporting involves detecting and documenting source code issues
78 J1675 Data Mining for Outsourced Frequent-Items-Set Mining: A Correctness Check
79 J1674 Dynamic Hash Table-Based Public Auditing for Cloud-Based Data Security
80 J1673 The Most Secret Items: Unveiling the Power of k-Neighbors
81 J1672 Cloud Primary Storage Deduplication
82 J1671 The cloud uses secured data management and deduplication
83 J1670 Large Scale P2P Image Content Retrieval

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MINI IEEE-B.TECH

84 J1668 Photo Search with Tags


85 J1667 Calculate several online image search distance measures automatically
86 J1656 Resolution of Multi-Party Social Media Privacy Issues
87 J1655 FRoDO Offline Micropayments Against Fraud
88 J1653 Public Click Analytics and Twitter Metadata for User Browsing History
89 J1652 Identifying Perilous Facebook Applications
90 J1651 Data is generated in hazardous environments
91 J1649 STAMP: Mobile Location Proofs for Privacy
92 J1644 Cloud Computing Attribute-Based Data Storage Is Flexible and Accurate
93 J1628 Cloud Armor: Enhancing Trust Management with Reputation-Based Approach
94 J1625 Protecting Your Privacy: An Efficient Ranked Keyword Search Method
95 J1620 Quantum-inspired relevance feedback algorithms
96 J1619 A Hashtag-Based Topic Model Reveals Microblogging's Hidden Semantic Network
97 J1618 Generating Star Ratings from Review Text User Opinions
98 J1617 Discovering the Optimal Datasets Containing a Targeted Keyword Set
99 J1616 Sentiment analysis embedding
100 J1615 Successful Road Trip Planning Using Cache Information
101 J1612 Enhancing Keyword Search with Document Proximity
102 J1611 Uncovering User-Aware Rare Sequential Topic Patterns in Document Streams
103 J1610 Partial Data Queries: A Key to Unlocking Insights
Enhancing Cyberbullying Detection: Auto-Encoder with Semantically-Enhanced
104 J1607
Marginalized Denoising
105 J1606 High-Dimensional Data Classifier
106 J1605 Social Media and E-Commerce for Cold-Start Purchase Decisions
107 J1604 Recommended products based on user preferences
108 J1603 Processing Top-K Queries with Uncertain Data through Crowd-Sourcing
109 J1602 Filter-Based Feature Selection Approach in Intrusion Detection System
110 J1558 Semantics-Based Friend Recommendation in a Social Network
111 J1553 Checking Facebook Apps for Risk
112 J1545 Validating Web-Based Digital Artifacts
113 J1541 Reducing Software Data: Effective Methods for Improving Bug Triage
114 J1538 Finding Nearest Neighbor Outliers Unsupervised
115 J1537 Steps for Duplicate Detection
116 J1536 Maintaining Confidentiality in Image Interpretation Social Media Posts
117 J1534 The Widespread Distribution of Malware
118 J1533 Discovery of Mobile App Ranking Fraud Case
Extracting Opinion Words and Targets from Online Reviews: A Word Alignment Model
119 J1531
Approach
120 J1528 Collaborative Filtering: Web Service Suggestions Derived from User Preferences
121 J1521 Context-aware cloud-based Mobi Context suggests locations
122 J1516 Regenerated codes and public auditing protect user privacy in cloud-based data storage
123 J1508 Hybrid Cloud-Based Verifiable Delegation Policy Circuit Cipher Encryption
124 J1507 Deniable attribute encryption and cloud-based data hiding provide audit immunity
Integrating Cloud and Sensor Networks with Authenticated Trust and Reputation
125 J1506
Calculation and Management
126 J1498 Online image reranking click prediction via multimodal sparse coding

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MINI IEEE-B.TECH

127 J1495 Wireless Sensor Network Cluster Information Transfer and Security
128 J1494 User-Specific Suggestions: A Personalized Recommendation
129 J1492 Exploring Distributed Mobile Sink Routing in Wireless Sensor Networks: A Survey
Congestion-Aware Nonlinear Elastic Optical Network Routing: Enhancing Efficiency and
130 J1490
Performance
131 J1484 The Power of Cellular Video Distribution and Wi-Fi
132 J1480 Reliable and Low-Energy Routing in Wireless Ad Hoc Networks
133 J1477 Simplified Authentication for Wireless/Wearable Devices
134 J1475 Incentivizing Mobile Data Offloading: A Pathway to Efficiency
135 J1467 Outsourced Attribute-Based Signatures
136 J1443 Ensuring Top-k Query Integrity in Hierarchical Sensor Networks
137 J1442 PROFILR: Safeguarding Identity in Geo-Social Networks and Active Relationships
138 J1440 Captcha: Visual Passwords for Robust Authentication through Difficult AI Tasks
139 J1431 Leveraging Personalized Search Engines for Enhanced Privacy Protection
140 J1429 Protecting Privacy in Location Queries
141 J1428 SEO techniques that emphasize keywords
142 J1427 Efficient Keyword-Based Neighbor Search
143 J1426 Value-Based Document Annotation
144 J1419 Guidance on the Integration of Travel Packages
145 J1411 Multiple keywords are used to get encrypted cloud data
146 J1408 Key aggregation for scalable cloud data sharing is the theme of this study
147 J1406 Enhancing Security for Multiple, Separate, and Concurrent Cloud-Hosted Datasets

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005
JAVA- PROJECTS LIST
MINI IEEE-B.TECH

ABOUT NEWZEN:
NEWZEN INFOTECH is a ISO Certified Organization for providing Academic
Projects, Corporate Training, Software Development & Placement Services since 2008. We
are successfully providing the services at Telangana and Andhrapradesh. NEWZEN is
quickly emerging as an innovative and essential business software applications
development resource.
OUR SERVICES:

✓ Software Development
✓ Internship’s
✓ Academic Projects for Diploma, B.Tech, M.Tech, MCA, MBA, M.Sc, M.Com
✓ Trainings (Online/Offline)
✓ CRT Services
✓ Research Works
✓ Ph.D Works
✓ Publications
✓ Patent Works
✓ Placements
✓ Conferences
✓ Workshop’s
100% JOB ASSURED TRAINING’S ON

✓ Java
✓ Python
✓ Ms.Net
✓ Android
✓ Mainframes
✓ Testing Tools
✓ Blockchain Technology
✓ Data Sciences
✓ Cyber Hacking
Note: Job Guarantee program valid for 3 Months, Limited Seats for every month enrollment.

2nd floor, Green Square Plaza, Opp: Geetha Bhavan, KARIMNAGAR-505 001.
Head Office: #201, 2nd Floor, Gyan Arcade, Ameerpet, HYDERABAD-500 082.
www.newzeninfotech.com , Ring on: +91 9030800005, +91 92938 00005

You might also like