Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
8 views

Java Mini Topics

Hi sppm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Java Mini Topics

Hi sppm
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

JAVA MINI TOPICS

Project
Project Title
Code

CLOUD COMPUTING
Automated Security Assessment and Approval for Conveyed registering Including
MJCC01
Graphical Models for Security

MJCC02 Cloud and Fog Environment using Data Integrity Audit

MJCC03 Cloud Split : Enhancing and Security with Data Division and Replication

A Blended Cloud Email Looking and Separating Plan thinking about Stowed away
MJCC04
System

Protection Saving Information Digging Plan for Negative Union Principles: An


MJCC05
Application to Clinical advantages Informatics

MJCC06 Dynamic Security Task Distribution Strategy for Heterogeneous Cloud Platform

MJCC07 Privacy-Preserving Data Share with Secure Group Management

MJCC08 Microservices Planning for Additional created Help Partaking in IoT Edge Conditions

A Particle Large Number Improvement with Outing for Organization Putting away and
MJCC09
Task Offloading in Edge-Appropriated registering

MJCC10 Hybrid Ranking Method for Cloud Services Based on User Requirements

MJCC11 Efficient Access Control for Cloud-Based User Data Storage and Sharing

DATA MINING
Obtain Patient Health Data Priority Classification in a Remote e-Healthcare System
MJDM01
While Maintaining Privacy

MJDM02 Frequent and High Utility Patterns for Mining Transactional Databases

MJDM03 Trapdoor Privacy Data in PKE With Keyword Search

Security Saving Brand Name Centered Anonymization Plan for Clinical advantages
MJDM04
Information Dispersing

Further made Re-linearization Evaluation of the Multikey Homomorphic Encryption


MJDM05
Plan

MJDM06 Students’ Academic Based on Educational Data Mining

MJDM07 An Efficient Data Search with Match Keyword with Encrypted Data

projects@vertilinktech.com +91-95810 22022


MJDM08 Predict Student Execution Considering Even and Text based Data

MJDM09 A Deliberate Survey Towards Huge Information Examination in Virtual Entertainment

MJDM10 Movie Recommender System Using Combined Correlation Methodology

MJDM11 A Symmetric Encryption Search Data

Inconceivably Randomized Trees with Insurance Preservation for Appropriated


MJDM12
Coordinated Prosperity Data

MJDM13 Authorized Searchable Framework for e-Healthcare System

Normalized Storage Model Construction and Query Optimization of Book using


MJDM14
MongoDB

MJDM15 Dynamic keyword search scheme over encrypted Cloud Environment

NETWORK SECURITY
MJNS01 Methodology for Endpoint Careful Assessment in an Association Security Game plan

MJNS02 Data Transfer and Deletion from Bloom Filter

MJNS03 An Identity Based Proxy Re-Encryption Data Sharing

MJNS04 Improvement of Security Plan for Radio Environment Guide Under Gigantic Pursuing

MJNS05 An Algorithm for Safe Optimization Routing in Mobile Ad Hoc Networks

MJNS06 A New Architecture for Network Intrusion Detection and Prevention

MJNS07 Security Awareness of University in Network Information

MJNS08 Dynamic Virtual Machine Hardening Estimation considering Changing Energy Use

MJNS09 Multilayered Networks for Emotion Analysis and Graphical Representation of Tweets

MJNS10 On Accelerating Source Code Analysis at Massive Scale

MJNS11 Quick Mart: Fast and Convenient Shopping for Customers

NETWORKING
MJNW01 NDPsec: Security Mechanism for Neighbor Discovery Protocol

MJNW02 Analysis of Network Attacks in Cloud Environment

MJNW03 A Verifiable Data Deduplication of a Database with Proof

MJNW04 Secret Key by Steady Encryption Before Quantization

projects@vertilinktech.com +91-95810 22022


MJNW05 Effective Unknown-ID Verification for Wireless Body Area Networks

MJNW06 Research on Data Routing Strategy in Cloud Environment

MJNW07 Patient’s Healthcare Records Data Share with Privacy in a Database

MJNW08 Careful DDoS Secluding with Quick LPM

MJNW09 Localization of Injection Attacks Using Distributed M-Estimation

MJNW10 Network Multipathing in Software-Defined Data Center Networks

Identification and Preventive Measures for Flooding Attacks with Collusive Interest in
MJNW11
Named Data Networking

MJNW12 A Sharing Question and Answers in A Web Application Using Database

BLOCK CHAIN
MJBC01 Engaging Trust and Security Saving e-KYC System Using Blockchain

MJBC02 User Data-Centric Authentication for Network Data Retrieval

MJBC03 Identity-Based Data Checking with a Designated Verifier on Database

MJBC04 Orderly Survey of Safety Weaknesses in Ethereum Blockchain Brilliant Agreement

Electronic Success Records Giving Model thinking about Blockchain to Checkable State
MJBC05
PBFT Figuring out Calculation

MJBC06 Blockchain Technology using Data Security and Integrity Audit Schem

MJBC07 A Decentralized Data Using a Block Chain Technique

MJBC08 A User Data Sharing with Secure Data in Block chain

MJBC09 Secure deduplication with efficient user revocation in cloud storage

MJBC10 A blockchain-based approach for data accountability and provenance tracking

IMAGE PROCESSING
MJIM01 Privacy Enhanced and Verifiable for Medical Image Processing on the Cloud

MJIM02 A Medical Image Encryption Data Sharing

MJIM03 Image Watermark Embedding Method Based on Security Service Secure

projects@vertilinktech.com +91-95810 22022

You might also like