Project Description

Fortuna is a diverse WordPress theme suitable for a wide variety of websites and online solutions.

Fortuna will blow your mind with its virtually unlimited customization options it offers.

What Our team provided

Fully customized Visual Composer
Easy to import Demos
More than 1200 Icons at your disposal
Theme Options that provide uniqueness
Visit Site
CODE Java Project Titles Domain
 JPJ1601  A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data  CLOUD COMPUTING
 JPJ1602A  Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud  CLOUD COMPUTING
 JPJ1603  An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing  CLOUD COMPUTING
 JPJ1604  An Efficient Privacy-Preserving Ranked Keyword Search Method  CLOUD COMPUTING
 JPJ1605  CDA Generation and Integration for Health Information Exchange Based on Cloud Computing System  CLOUD COMPUTING
 JPJ1606  Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing  CLOUD COMPUTING
 JPJ1607  CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services  CLOUD COMPUTING
 JPJ1608  Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email  CLOUD COMPUTING
 JPJ1609  Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds  CLOUD COMPUTING
 JPJ1610  DiploCloud: Efficient and Scalable Management of RDF Data in the Cloud  CLOUD COMPUTING
 JPJ1611  Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage  CLOUD COMPUTING
 JPJ1612  Dynamic and Public Auditing with Fair Arbitration for Cloud Data  CLOUD COMPUTING
 JPJ1613  Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates  CLOUD COMPUTING
 JPJ1614  Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services  CLOUD COMPUTING
 JPJ1615  Geometric Range Search on Encrypted Spatial Data  CLOUD COMPUTING
 JPJ1616  Identity-Based Encryption with Cloud Revocation Authority and Its Applications  CLOUD COMPUTING
 JPJ1617  Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud  CLOUD COMPUTING
 JPJ1618  Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud  CLOUD COMPUTING
 JPJ1619  Real-Time Semantic Search Using Approximate Methodology for Large-Scale Storage Systems  CLOUD COMPUTING
 JPJ1620  Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption  CLOUD COMPUTING
 JPJ1621  Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming  CLOUD COMPUTING
 JPJ1622  TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage  CLOUD COMPUTING
 JPJ1623  A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing  CLOUD COMPUTING
 JPJ1624  DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments  CLOUD COMPUTING
 JPJ1625  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing  CLOUD COMPUTING
 JPJ1626  SecRBAC: Secure data in the Clouds  CLOUD COMPUTING
 JPJ1627  A Novel Recommendation Model Regularized with User Trust and Item Ratings  DATA MINING
 JPJ1628  Automatically Mining Facets for Queries from Their Search Results  DATA MINING
 JPJ1629  Booster in High Dimensional Data Classification  DATA MINING
 JPJ1630  Building an intrusion detection system using a filter-based feature selection algorithm  DATA MINING
 JPJ1631  Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information  DATA MINING
 JPJ1632  Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings  DATA MINING
 JPJ1633  Crowdsourcing for Top-K Query Processing over Uncertain Data  DATA MINING
 JPJ1634  Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder  DATA MINING
 JPJ1635  Domain-Sensitive Recommendation with User-Item Subgroup Analysis  DATA MINING
 JPJ1636  Efficient Algorithms for Mining Top-K High Utility Itemsets  DATA MINING
 JPJ1637  Efficient Cache-Supported Path Planning on Roads  DATA MINING
 JPJ1638  Mining User-Aware Rare Sequential Topic Patterns in Document Streams  DATA MINING
 JPJ1639  Nearest Keyword Set Search in Multi-Dimensional Datasets  DATA MINING
 JPJ1640  Rating Prediction based on Social Sentiment from Textual Reviews  DATA MINING
 JPJ1641  Location Aware Keyword Query Suggestion Based on Document Proximity  DATA MINING
 JPJ1642  Using Hashtag Graph-based Topic Model to Connect Semantically-related Words without Co-occurrence in Microblogs  DATA MINING
 JPJ1643  Quantifying Political Leaning from Tweets, Retweets, and Retweeters  DATA MINING
 JPJ1644  Relevance Feedback Algorithms Inspired By Quantum Detection  DATA MINING
 JPJ1645  Sentiment Embeddings with Applications to Sentiment Analysis  DATA MINING
 JPJ1646  Top-Down XML Keyword Query Processing  DATA MINING
 JPJ1647  TopicSketch: Real-time Bursty Topic Detection from Twitter  DATA MINING
 JPJ1648  Top-k Dominating Queries on Incomplete Data  DATA MINING
 JPJ1649  Understanding Short Texts through Semantic Enrichment and Hashing  DATA MINING
 JPJ1650  A Stable Approach for Routing Queries in Unstructured P2P Networks  NETWORKING
 JPJ1651  iPath: Path Inference in Wireless Sensor Networks  NETWORKING
 JPJ1652  Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks  NETWORKING
 JPJ1653  Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks  NETWORKING
 JPJ1654  STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users  NETWORKING
 JPJ1655  Energy and Memory Efficient Clone Detection in Wireless Sensor Networks  MOBILE COMPUTING
 JPJ1656  EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data  MOBILE COMPUTING
 JPJ1657  Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach  MOBILE COMPUTING
 JPJ1658  Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach  MOBILE COMPUTING
 JPJ1659  A Hop-by-Hop Routing Mechanism for Green Internet  PARALLEL & DISTRIBUTED  SYSTEMS
 JPJ1660  Continuous Answering Holistic Queries over Sensor Networks  PARALLEL & DISTRIBUTED  SYSTEMS
 JPJ1661  Dictionary Based Secure Provenance Compression for Wireless Sensor Networks  PARALLEL & DISTRIBUTED  SYSTEMS
 JPJ1662  The Server Provisioning Problem for Continuous Distributed Interactive Applications  PARALLEL & DISTRIBUTED  SYSTEMS
 JPJ1663  Contributory Broadcast Encryption with Efficient Encryption and Short Cipher texts  SECURE COMPUTING
 JPJ1664  Data Lineage in Malicious Environments  SECURE COMPUTING
 JPJ1665  Detecting Malicious Facebook Applications  SECURE COMPUTING
 JPJ1666  FRoDO: Fraud Resilient Device for Off-Line Micro-Payments  SECURE COMPUTING
 JPJ1667  Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata  SECURE COMPUTING
 JPJ1668  Resolving Multi-party Privacy Conflicts in Social Media  SECURE COMPUTING
 JPJ1669  Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions  INFORMATION FORENSICS  & SECURITY
 JPJ1670  Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data  INFORMATION FORENSICS  & SECURITY
 JPJ1671  Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms  INFORMATION FORENSICS  & SECURITY
 JPJ1672  Profiling Online Social Behaviors for Compromised Account Detection  INFORMATION FORENSICS  & SECURITY
 JPJ1673  A Locality Sensitive Low-Rank Model for Image Tag Completion  IMAGE PROCESSING
 JPJ1674  A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks  IMAGE PROCESSING
 JPJ1675  Learning of Multimodal Representations with Random Walks on the Click Graph  IMAGE PROCESSING
 JPJ1676  Online Multi-Modal Distance Metric Learning with Application to Image Retrieval  IMAGE PROCESSING
 JPJ1677  Tag Based Image Search by Social Re-ranking  IMAGE PROCESSING
 JPJ1678  Social Friend Recommendation Based on Multiple Network Correlation  MULTIMEDIA  (Social Networking)
 JPJ1679  User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors  MULTIMEDIA  (Social Networking)
 JPJ1680  Mapping Bug Reports to Relevant Files: A Ranking Model, a Fine-Grained Benchmark, and Feature Evaluation  SOFTWARE ENGINEERING
 JPJ1681  Metamorphic Testing for Software Quality Assessment: A Study of Search Engines  SOFTWARE ENGINEERING
 JPJ1683  Answering Approximate Queries over XML Data  FUZZY SYSTEMS