LIST OF
JAVA APPLICATION PROJECTS
S.NO PROJECT TITLES
1 online shopping
2 online banking
3 Lic management system
4 Online Exam
5 Airline Reservation
6 Hospital Management System
7 Library Management System
8 Bus Scheduling And Booking System
9 Fashion Model Management System
10 Online Passport
11 Internet Voting
12 Advertisement Agency Management System
13 Lan Based Server Side Sniff
14 Code analyzer
15 Converting relational db into xml
16 Credit card fraud detection using hidden markov model
17 Effective data base encoding
18 Progressive quantized projection approach to data hiding
19 Dynamic data mining
20 Enhanced web cache sharing protocol
21 Face recognition using laplacian faces
22 Fuzzy clustering
23 Group registration with local anchor for location tracking in mobile networks
24 Implementation of tdes on virtual private network
25 Lane reservation for highways
26 Mining sequential patterns from multidimensional sequence data
27 New algorithm for computing cube on very large compressed data sets
28 A randomized algorithm for duplicate elimination in peer-to-peer networks
29 Neural network techniques for proactive password checking
30 Query by image content using mobile information device profile
31 Extraction of printed text from image files using edge detection technique
32 Password-based two-server authentication system
33 Watermarking relational databases using optimization-based techniques
34 Work time management in a small company as example of usage the Web Technologies
35 A Weighted Utility Framework for Mining Association Rules
36 A Utility-based Dynamic Bandwidth Allocation Algorithm in IEEE 802.16 Networks to Minimize Average Queuing Delay
37 Techniques for Efficient Road-Network-Based Tracking of Moving Objects
38 Storing and Indexing Spatial Data in P2P Systems
39 Discovery of Periodic Patterns in Spatiotemporal Sequences
40 Securing Credit card Transaction using Hidden Markov Model
41 Innovative Integration by Interattribute Dependencies using enhanced Graphs of Schema Matching
42 Evaluating the Effectiveness of Personalized Web Search
43 A New Scheduling Algorithm for Differentiated Services Networks
44 Network Monitoring System
45 Agent based architecture for secure access from multiple hospitals
46 Mining Weighted Association Rules without Preassigned Weights
47 Interactive Correction and Recommendation for Computer Language Learning and Training
48 Incentive-Based Scheduling for Market-Like Computational Grids
49 Index Support for Item Set Mining
50 Image Compression Based On Fuzzy Clustering
51 HMM Word and Phrase Alignment for Statistical Machine Translation
52 Generating User Acceptance Test Plans from Test Cases
53 A Relation-Based Page Rank Algorithm for Semantic Web Search Engines
54 A Novel Method for Adaptation Web Pages for Mobile Applications
55 An Adaptive School Web Site Construction Algorithm
Using Association Rules
56 Building a Multiple-Criteria Negotiation Support System
57 Code normalization For self-mutating malware
58 Controlling ip spoofing through interdomain packet filters
59 Online Training Management and Feedback System
60 A Data Cleaning Method Based on Association Rules
61 Protection of Database Security via Collaborative Inference Detection
62 A Distributed Cycle Minimization Protocol for Peer-to-Peer Networks
63 Resilient Scheduling to Counter Application Layer Attacks
64 Dynamic data mining
65 File Monitoring System
66 Generating User Acceptance Test Plans from Test Cases
67 HMM Word and Phrase Alignment for Statistical Machine Translation
68 Image Compression Based On Fuzzy Clustering
69 Index Support for Item Set Mining
70 Incentive-Based Scheduling for Market-Like Computational Grids
71 Interactive Correction and Recommendation for Computer Language Learning and Training
72 Mining Weighted Association Rules without Preassigned Weights
73 Agent based architecture for secure access from multiple hospitals
74 Network Monitoring System
75 A New Scheduling Algorithm for Differentiated Services Networks
76 Evaluating the Effectiveness of Personalized Web Search
77 Neural Network Techniques for Proactive Password Checking
78 Innovative Integration by Interattribute Dependencies using enhanced Graphs of Schema Matching
79 Innovative Integration by Interattribute Dependencies using enhanced Graphs of Schema Matching
80 Securing Credit card Transaction using Hidden Markov Model
81 Similarity-Profiled Temporal Association
82 Storing and Indexing Spatial Data in P2P Systems
83 Techniques for Efficient Road-Network-Based Tracking of Moving Objectsrch Engine