Local Seach Optimization Services

Java Application Projects

S.No
Code
Title
Category
1
JPJ001
A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
Web Application
2
JPJ002
A Secure Cloud Server System using Proxy Re-Encryption Mode
Web Application
3
JPJ003
A Secure payment System for banking transactions
Web Application
4
JPJ004
An efficient Mailing System for Detecting Spam Mails
Web Application
5
JPJ005
Annotating Search Results from Web Databases
Web Application
6
JPJ006
Anonymization for Secure Data in Web
Web Application
7
JPJ007
Attribute-based Encryption System for Secured Data Storage
Web Application
8
JPJ008
Automatic Testing System for Web Application
Web Application
9
JPJ009
Boolean Retrieval for Medical datas
Web Application
10
JPJ010
Cloud Data Protection for the Masses
Web Application
11
JPJ011
CloudMov: Cloud based Video Streaming System
Web Application
12
JPJ012
Clustering Sentence-Level Text Using a Novel Fuzzy Relational Clustering Algorithm
Web Application
13
JPJ013
Continuous query processing system for location based services
Web Application
14
JPJ014
Cooperative Secure Multi-Cloud Verification System
Web Application
15
JPJ015
Detecting Complaints in Online Product Purchase
Web Application
16
JPJ016
Detecting false users in Online Rating system & Securing Reputation
Web Application
17
JPJ017
Distributed data integration on electricity board
Web Application
18
JPJ018
Dynamic Assignments of Clients to Servers based on Load
Web Application
19
JPJ019
Dynamic Resource allocation in Cloud
Web Application
20
JPJ020
Earthquake Reporting System using Social Networking Site
Web Application
21
JPJ021
Efficient and secure search on encrypted medical data
Web Application
22
JPJ022
E-Fraud Prevention based on the Self-Authentication of e- Documents
Web Application
23
JPJ023
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems
Web Application
24
JPJ024
Enhanced Security Scheme in Social Networking using XML
Web Application
25
JPJ025
Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
Web Application
26
JPJ026
Facilitating Effective User Navigation through backtracking
Web Application
27
JPJ027
Filtering Unwanted Messages in Online Social Networking User walls
Web Application
28
JPJ028
Get your Campus
Web Application
29
JPJ029
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Web Application
30
JPJ030
Identity-Based Secure Distributed Data Storage Schemes
Web Application
31
JPJ031
Information leak detection and prevention system
Web Application
32
JPJ032
Intrusion Detection and Prevention in Web Servers
Web Application
33
JPJ033
IPTV Portal System
Web Application
34
JPJ034
Load balancing model for Cloud Data Center
Web Application
35
JPJ035
Location Based Search System
Web Application
36
JPJ036
Multi-Cloud System to avoid server failures
Web Application
37
JPJ037
Multiparty Access Control for Online Social Networks
Web Application
38
JPJ038
Personalised Search Engine from user click-through logs
Web Application
39
JPJ039
Personalized Image Search System
Web Application
40
JPJ040
Personalized QoS-Aware Web Service Recommendation and Visualization
Web Application
41
JPJ041
Portable Cloud System
Web Application
42
JPJ042
Predicting BMI using Behavioral Outcomes
Web Application
43
JPJ043
Preserving data and identity privacy from an untrusted cloud by Multi- Owner Data Sharing
Web Application
44
JPJ044
Preventing Intrusion in Web and Database Servers
Web Application
45
JPJ045
Preventing Private Information Inference Attacks on Social Networks
Web Application
46
JPJ046
Privacy Preserving Data Sharing With Anonymous ID Assignment
Web Application
47
JPJ047
Privacy Preserving Delegated Access Control in Cloud Computing
Web Application
48
JPJ048
Privacy Protection Scheme in Location Information System
Web Application
49
JPJ049
Privacy-Preserving Public Auditing For Secure Cloud Storage
Web Application
50
JPJ050
Protecting Sensitive Labels in Social Network Data Anonymization
Web Application
51
JPJ051
PUBMED: an efficient biomedical based hierarchical search engine
Web Application
52
JPJ052
Ranking and feedback model in search engines
Web Application
53
JPJ053
Ranking system for web library
Web Application
54
JPJ054
Scalable and Secure Sharing of Personal Health Records
Web Application
55
JPJ055
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
Web Application
56
JPJ056
Secure Access Control System in Cloud using Attribute based encryption technique
Web Application
57
JPJ057
Secure and practical outsourcing of linear programming in cloud computing
Web Application
58
JPJ058
Secure cloud access system using JAR
Web Application
59
JPJ059
Secure Key based Privacy Preserving Access Control System
Web Application
60
JPJ060
Secure personal information system in Medical System
Web Application
61
JPJ061
Security Enhanced Facebook like Social Networking Sites
Web Application
62
JPJ062
Security key based Video Uploading and viewing System
Web Application
63
JPJ063
Self diagnosing with identifying disease treatment with online doctor precautionary
Web Application
64
JPJ064
SocialTube: P2P-assisted Video Sharing in Online Social NetworksSocialTube: P2P-assisted Video Sharing in Onlin
Web Application
65
JPJ065
Spatial Approximate String Search
Web Application
66
JPJ066
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
Web Application
67
JPJ067
Twitsper Tweeting Privately
Web Application
68
JPJ068
Two tales of privacy in online social networks
Web Application
69
JPJ069
Vertical Search Engine
Web Application
70
JPJ070
Video Sharing Website
Web Application
71
JPJ071
A Decentralized Service Discovery Approach on Peer-to-Peer Networks
Desktop Application (Networking)
72
JPJ072
A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks
Desktop Application (Networking)
73
JPJ073
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
Desktop Application (Networking)
74
JPJ074
A System for Denial-of-Service Attack Detection
Desktop Application (Networking)
75
JPJ075
An enhanced model for achieving high throughput using variant buffer size methodology
Desktop Application (Networking)
76
JPJ076
Anomaly based intrusion detection system
Desktop Application (Networking)
77
JPJ077
Back-Pressure-Based Packet-by-Packet Adaptive Routing in Communication Networks
Desktop Application (Networking)
78
JPJ078
Bandwidth estimation systems in networks
Desktop Application (Networking)
79
JPJ079
Blocking intruders for secured network maintenance
Desktop Application (Networking)
80
JPJ080
Cache based User Location Querying System
Desktop Application (Networking)
81
JPJ081
Caching techniques in MANET and various routing protocols in MANET
Desktop Application (Networking)
82
JPJ082
Capacity of Data Collection in Arbitrary Wireless sensor networks
Desktop Application (Networking)
83
JPJ083
CFR: an efficient congestion free router
Desktop Application (Networking)
84
JPJ084
Channel allocation system in mobile networks
Desktop Application (Networking)
85
JPJ085
Clone Node Detection in Wireless Sensor Networking
Desktop Application (Networking)
86
JPJ086
Coding for cryptographic security enhancement using stopping sets
Desktop Application (Networking)
87
JPJ087
Content based image retrieval system
Desktop Application (Networking)
88
JPJ088
Content Sharing in Peer-to-Peer Networks
Desktop Application (Networking)
89
JPJ089
Cut detection in Wireless Sensor Network
Desktop Application (Networking)
90
JPJ090
Data Transmission Using Multi-Tasking-Sockets
Desktop Application (Networking)
91
JPJ091
Delay-Based Network Utility Maximization
Desktop Application (Networking)
92
JPJ092
Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks
Desktop Application (Networking)
93
JPJ093
Distributed Processing of Probabilistic Top-k Queries in Wireless Sensor Networks
Desktop Application (Networking)
94
JPJ094
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs
Desktop Application (Networking)
95
JPJ095
Efficient and Dynamic Routing Topology Inference
Desktop Application (Networking)
96
JPJ096
Efficient load balancing system in SIP Servers
Desktop Application (Networking)
97
JPJ097
Efficient load distribution scheme to avoid congestion in servers
Desktop Application (Networking)
98
JPJ098
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm
Desktop Application (Networking)
99
JPJ099
Fault Node Recovery Algorithm for a Wireless Sensor Network
Desktop Application (Networking)
100
JPJ100
FEC based cryptography for secured data communication
Desktop Application (Networking)
101
JPJ101
Finding latency in data transmission
Desktop Application (Networking)
102
JPJ102
Geometric Routing Protocol in MANET
Desktop Application (Networking)
103
JPJ103
Homophonic cryptography technique for data security
Desktop Application (Networking)
104
JPJ104
Hop-by-Hop routing in Wireless Network
Desktop Application (Networking)
105
JPJ105
Impact of denial of service attacks on servers
Desktop Application (Networking)
106
JPJ106
Intrusion detection system in wireless sensor networks
Desktop Application (Networking)
107
JPJ107
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols
Desktop Application (Networking)
108
JPJ108
Mobility management schemes in wireless networks using agent forwarding methods
Desktop Application (Networking)
109
JPJ109
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links
Desktop Application (Networking)
110
JPJ110
Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
Desktop Application (Networking)
111
JPJ111
Optimized Software Release Planner
Desktop Application (Networking)
112
JPJ112
Packet monitoring based multicasting system
Desktop Application (Networking)
113
JPJ113
Preventing attackers in WSN from collecting datas
Desktop Application (Networking)
114
JPJ114
Protecting location information in Wireless Sensor Network
Desktop Application (Networking)
115
JPJ115
Puzzle based secure data transmission scheme to avoid intruders
Desktop Application (Networking)
116
JPJ116
Recovery from link failure in wireless networks
Desktop Application (Networking)
117
JPJ117
Reducing the costly forward using band-based directional broadcast
Desktop Application (Networking)
118
JPJ118
Reducing the number of transmission in Wireless Networks
Desktop Application (Networking)
119
JPJ119
Routing in Wireless Adhoc Network
Desktop Application (Networking)
120
JPJ120
Secure and efficient video distribution scheme using variant bandwidth system
Desktop Application (Networking)
121
JPJ121
Secure communication by hiding packets in intermediate router system
Desktop Application (Networking)
122
JPJ122
Secure Content Distribution using Network Coding Algorithm
Desktop Application (Networking)
123
JPJ123
Secure Overlay Cloud Storage with Access Control
Desktop Application (Networking)
124
JPJ124
Secured data communication system in wireless mesh networks
Desktop Application (Networking)
125
JPJ125
Selfish overlay network creation and maintenance
Desktop Application (Networking)
126
JPJ126
Single-source shortest path algorithm with nonnegative edge path
Desktop Application (Networking)
127
JPJ127
Supporting data transfer and movements of mobile terminal between different locations
Desktop Application (Networking)
128
JPJ128
Ticket based secured mobile banking scheme for detecting frauds
Desktop Application (Networking)
129
JPJ129
Ticket based security system for banking applications
Desktop Application (Networking)
130
JPJ130
Trace back scheme on finding attackers in Routing
Desktop Application (Networking)
131
JPJ131
Traffic flow analysis system based on a novel concept of flow set
Desktop Application (Networking)
132
JPJ132
Trust aware routing in MANET
Desktop Application (Networking)
133
JPJ133
Trust based Peer-to-Peer System for Secure Data Transmission
Desktop Application (Networking)
134
JPJ134
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service
Desktop Application (Networking)
135
JPJ135
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks
Desktop Application (Networking)
136
JPJ136
Virus Spread in Network
Desktop Application (Networking)
137
JPJ137
Virus spread in P2P network
Desktop Application (Networking)
138
JPJ138
Automatic Vehicle Detection in Surveillance Video
Desktop Application
139
JPJ139
Data embedding using Pixel-pair matching technique
Desktop Application
140
JPJ140
Digital image processing filters for image filtering methods
Desktop Application
141
JPJ141
Efficient steganography embedding methodology for secret data preservation
Desktop Application
142
JPJ142
Handwritten Chinese Character Recognition
Desktop Application
143
JPJ143
License Plate Recognition System
Desktop Application
144
JPJ144
Reducing noises in images
Desktop Application
145
JPJ145
Video steganography for secure data preservation
Desktop Application
146
JPJ146
Visual cryptography system for secret image sharing
Desktop Application
147
JPJ147
A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Signal
Desktop Application
148
JPJ148
Credit card fraud detection system using genetic algorithm
Desktop Application
149
JPJ149
Crime Detection in Credit Card Fraud
Desktop Application
150
JPJ150
Criminal Face Detection
Desktop Application
151
JPJ151
Decision trees for uncertain data
Desktop Application
152
JPJ152
Document clustering
Desktop Application
153
JPJ153
Efficient search on XML data
Desktop Application
154
JPJ154
Efficient searching technique in xml data
Desktop Application
155
JPJ155
Feature Selection based Fast Clustering Algorithm with Minimum Spanning Tree in Medical Data
Desktop Application
156
JPJ156
Finding File Duplication
Desktop Application
157
JPJ157
High efficient location monitoring system
Desktop Application
158
JPJ158
Mobile alert based intruder blocking system in cloud computing
Desktop Application
159
JPJ159
Monitoring cloud resources for better resource utilization
Desktop Application
160
JPJ160
Project Management System
Desktop Application
161
JPJ161
Student Management System
Desktop Application

Our case studies

See all projects
Contact: 09952649690 / Email: jpinfotechprojects@gmail.com