Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) NEW TECHNOLOGY-HELP VIDEO BLOCK CHAIN TECH - BITCOIN
R - DATA SCIENCE - ML WEKA-Machine Learning Internet of things (IoT) BIG DATA - HADOOP PROJECTS
BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB PhD Projects JOBS CONSULTANCY - SOFT SKILLS
JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID
ANDOROID JSON PHP ANDROID APPS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects ASP.NET MVC Framework JAVA IEEE LATEST JAVA IEEE 2016-17
Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects
IEEE 2011-2012 Java Project Dot Net IEEE 2017-18 ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18
RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects
IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects Java Application Projects
Dotnet Application Projects Dotnet Mini Projects Struts Application Projects Java Mini Projects
SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS
BANKING PROJECTS RESTful Web services
 
PYTHON PROJECT - IEEE
PYTHON TRAINING WITH PROJECT
1. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
2. CYBER SECURITY
3. Automatic Sentiment Detection in Naturalistic Audio
4. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
5. Student Performance Analysis - PYTHON
6. E-assessment using image processing in ∞Exams
7. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
8. NLP - NATURAL LANGUAGE PROCESSING
9. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
10. Image Based Appraisal of Real Estate Properties-IEEE 2017
11. FOOD WASTE ORGANIZER
12. PYTHON PROJECT FLOW
13. PYTHON PROGRAM EXECUTION
14. PYTHON INSTALLATION


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
15. Speech Recognition in Social Care - NLP
16. Text-to-Speech (TTS)- NLP
17. Voice Scheduler - NLP
18. VOICE SEARCH ENGINE - NLP
19. LINEAR REGRESSION - PYTHON
20. LATENT DIRICHLET ALLOCATION
21. DIGITAL IMAGE PROCESSING - PYTHON
22. DECISION TREE LEARNING - ALGORITHM
23. NAIVE BAYES CLASSIFIER
24. K - MEANS CLUSTERING
25. Dengu Data Analysis Using R-program
26. Shopping Data set Analyse Using R Machine Learning
27. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
28. Polynomial Time Algorithm-PTA
29. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
30. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
31. K-Means For Clustering


NEW TECHNOLOGY-HELP VIDEO
IEEE PROJECT LIST
32. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
33. NAIVE BAYES CLASSIFIER
34. K - MEANS CLUSTERING
35. LINEAR REGRESSION - PYTHON
36. LATENT DIRICHLET ALLOCATION
37. DIGITAL IMAGE PROCESSING - PYTHON
38. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
39. MACHINE LEARNING-ML ALGORITHM
40. WHAT IS MACHINE LEARNING - AI
41. NATURAL LANGAUAGE PROCESSING - NLP
42. VISION - Visual Data


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
43. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
44. R - ADVANCE IMAGE PROCESSING
45. Dengu Data Analysis Using R-program
46. Shopping Data set Analysis Using R Machine Learning
47. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
48. R PROGRAM TRAINING
49. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
50. COMAPRISON OF VARIOUS DOCKING SCORES
51. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
52. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
53. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
54. MICRO ARRAY GENE EXPRESSION ANALYSIS
55. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
56. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
57. Diabetics Dataset
58. Excercise Dataset
59. MEDICAL DATA ANALYSES
60. WEKA PRIVACY DATA SET ANALYSES


Internet of things (IoT)
IoT Projects
61. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
62. Who Moved My Data? Privacy Protection in Smartphones
63. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
64. IOT Projects
65. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
66. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
67. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
68. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
69. MRSIM: Mitigating Reducer Skew In MapReduce
70. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
71. HADOOP WITH HEALTHCARE DATA ANALYSYS
72. HADOOP WEBLOG DATA ANALYSES
73. BANK DATA ANALYTIC WITH HADOOP
74. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
75. Bucket Based Data Deduplication Technique for Big Data Storage System
76. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
77. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
78. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
79. Efficient Recommendation of De-identification Policies using MapReduce
80. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
81. Big Scholarly Data: A Survey
82. SocialQ&A: An Online Social Network Based Question and Answer System
83. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
84. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
85. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
86. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
87. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
88. User-Centric Similarity Search
89. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
90. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
91. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
92. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
93. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
94. Processing Incomplete k Nearest Neighbor Search
95. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
96. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
97. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
98. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
99. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
100. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
101. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
102. Deduplication on Encrypted Big Data in Cloud
103. Dynamic Resource Allocation for MapReduce with Partitioning Skew
104. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
105. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
106. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
107. Self-Healing in Mobile Networks with Big Data
108. Secure Sensitive Data Sharing on a Big Data Platform
109. Big Data, Big Knowledge: Big Data for Personalized Healthcare
110. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
111. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
112. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
113. Differentially Private Frequent Itemset Mining via Transaction Splitting
114. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
115. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
116. Fast Best-Effort Pattern Matching in Large Attributed Graphs


PhD Projects
Developing PhD proposal
117. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
118. Diabetics Dataset
119. MEDICAL DATA ANALYSES
120. R IEEE PROJECTS
121. PhD Project Guidance
122. PhD Projects


JOBS CONSULTANCY - SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
123. E-assessment using image processing in ∞Exams
124. NLP - NATURAL LANGUAGE PROCESSING
125. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
126. Dengu Data Analysis Using R-program
127. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
128. Big Scholarly Data: A Survey
129. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
130. Big Data, Big Knowledge Big Data for Personalized Healthcare
131. Deduplication on Encrypted Big Data in Cloud
132. Secure Sensitive Data Sharing on a Big Data Platform
133. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
134. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
135. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
136. Self-Healing in Mobile Networks with Big Data
137. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
138. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
139. Child Monitoring - ANDROID APPS
140. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
141. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
142. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
143. Developing Apps for visually imapired people: Lessons learned from social network
144. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
145. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
146. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
147. Design of secure location and message sharing system for android platform
148. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
149. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
150. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
151. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
152. Privacy Protection based Access Control Scheme in Cloud-based Services
153. Privacy-Preserving Selective Aggregation of Online User Behavior Data
154. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
155. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
156. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
157. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
158. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
159. Who Moved My Data? Privacy Protection in Smartphones
160. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
161. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
162. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
163. Privacy-Preserving Aggregate Queries for Optimal Location Selection
164. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
165. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
166. Efficient Clue-based Route Search on Road Networks
167. Privacy-Preserving Location-Proximity for Mobile Apps
168. Cooperative Query Answer Authentication
169. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
170. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
171. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
172. ZapDroid: Managing Infrequently Used Applications on Smartphones
173. Searching Trajectories by Regions of Interest
174. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
175. A Classroom Scheduling Service for Smart Classes
176. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
177. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
178. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
179. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
180. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
181. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
182. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
183. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
184. Authentication of Smartphone Users Using Behavioral Biometrics
185. An Exploration of Geographic Authentication Schemes
186. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
187. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
188. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
189. Distributed secret sharing approach with cheater prevention
190. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
191. Efficient privacy preserving location based query over outsourced encrypted data
192. Utilizing the Cloud to Store Hijacked Camera Images
193. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
194. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
195. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
196. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
197. Enabling privacy preserving location proof for mobile users.
198. Optimizing User Experience in Choosing Android Applications
199. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
200. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
201. FoodForCare: An Android Application for Self-Care with Healthy Food
202. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
203. Silence is Golden: Enhancing Privacy of Location-Based Services
204. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
205. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
206. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
207. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
208. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
209. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
210. Adapting to User Interest Drift for POI Recommendation
211. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
212. Developing Apps for visually imapired people: Lessons learned from social network
213. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
214. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
215. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
216. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
217. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
218. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
219. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
220. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
221. Mobile cloud support for semantic enriched speech recognition in social care
222. Distributing secret sharing approach with cheater prevention based on QR code
223. Design of Secure Location and Message Sharing System for Android Platform
224. The impact of cloud technology on the automation of businesses
225. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
226. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
227. Rescue Management System
228. Android Army - Military Apps
229. Android Beauty Parlor
230. Android E Municipality
231. ANDROID NURSE AID
232. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
233. Human Resource (HR)- APPS
234. GPS Employee Tracking System
OUR MODERN SOCITY
235. RECYCLE APP WASTE COLLECTION REUSE
236. Bikes Rental - APPS
237. Location Based Alarm - GPS
238. ANDROID APPS FOR INSURANCE SYSTEM
239. BUDGET HOME DESIGN -ANDROID APPS
240. Former To Former Apps
241. Pets Care
ONLINE CONSUMERS PROCESSING
242. House Hold Appliancies Warranty Management
243. GPS Transport Packers and Movers
Android Apps
244. MY LIBRARY
245. FACULTY RATING SYSTEM
246. App for self organizer
247. ONLINE DOCTOR APPOINTMENT
248. Conference Event Mobile Assistant
249. Mobile Prescription
250. Metastore Application
251. Android SmartCampus
252. Android Shopping Mall
253. TOLL GATE -Barcode Billing System --ANDROID
254. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
255. Taste Hunt For Restaurants
256. POLICE APPS
257. Android Blood Bank
258. Mobile Expense Claim System Android
259. Android Intelligent Time Tracking System TICK
260. Android Course and Attendance Management System
261. Android Event Reminder
262. Android Attendance Assessment
263. Android Advance Shopping
264. Android CAR POOLING
265. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
266. Android HOSPITAL
267. ATHLETE MEET GUIDE
268. Android Apps PARKING MANAGER
269. Love and Care
270. Food Waste Management System
271. Travel Guide
272. Android Provisional Store
273. Best Baby Care with Vaccines Remainder
274. Android Assist for Lecturer and Student
275. Android Personal Assistance (PA)
276. Android Application for College Management System
277. Tollgate Payment system in android
278. Intelligence Quotient (IQ) Test
279. GPS LOCATION ALARM SYSTEM
280. Location Based Intelligent Mobile Organizer
281. BANK ACCOUNT TRACKER FOR ANDROID
282. UNIT CONVERTER
283. Tips and Tax Calculator in Android
284. TEXT EDITOR FOR ANDROID
285. Student Attendance Tracking System
286. Smart Money With Daily Expenses
287. Simple And Secure Android TO DO List Application
288. Restaurant Table Order Management System
289. Online Shopping
290. Online Examination System For Android
291. ANDROID SHOPPING LOCATION IDENTIFIER
292. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
293. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
294. MICRO CREDIT BANKING ON SMARTPHONE
295. LOCATION BASED ALARM
296. Insurance in android
297. GOOGLE PLACE FINDER
298. Friend Mapper on Mobiles - Friend Locator
299. EXPENSE MANAGER
300. Employee Diractory
301. Online job search
302. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
303. ANDROID STUDENT RESULT ANALYZING SYSTEM
304. CloudMoV : Cloud-based Mobile Social TV
305. Bus Reservation
306. Budget Planner
307. Android SMS Systems
308. ANDROID LEAVE MANAGEMENT SYSTEM
309. ANDROID EVENT SCHEDULER/REMINDER
310. Android Grocery Shopping List
311. Android Attack Application
312. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
313. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
314. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
315. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
316. Optimizing Display Advertising Markets
317. Using Knowledge Libraries to Transfer Expert Knowledge
318. Semantic Retrieval of Trademarks Based on Conceptual Similarity
319. Understanding and Predicting Question Subjectivity in Social Question and Answering
320. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
321. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
322. Fast Top-K Path-based Relevance Query on Massive Graphs
323. Web Image Search Re-ranking with Click-based Similarity and Typicality
324. Automatically Mining Facets for Queries from Their Search Results
325. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
326. Statistical Entity Extraction from Web
327. Question Answering System for an Effective Collaborative Learning
328. Lost in Translation: Improving Decoy Documents via Automated Translation
329. Learn to Personalized Image Search from the Photo Sharing Websites
330. In Tags We Trust Trust modeling in social tagging of multimedia content
331. Efficient Anonymous Message Submission
332. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
333. Employment Knowledge Database
334. Organise Corporate Training For Client Project s
335. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
336. ONLINE VEHICLE SHOWROOM SYSTEMS
337. Online Voting
338. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
339. School Management System
340. Secure Online Course Automation
341. School Automation System
342. Online Aquarum
343. Web Direct Recruitment Analysis
PHP Apps
344. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
345. TRADE / INDUSTRY WEB PORTAL
346. Feeding the poor from the supermarket
347. Application for recording your goals and habits
348. VISUAL WAY TO RAISE AWARENESS
349. Municipal Corporation
350. Online Polling For Publishers And Brands
351. Avoid Food Wastage
352. Web Doctor
353. ONLINE FOOD ORDERING SYSTEM
354. E-Tendering
355. Improving Rural Communities
356. Green Planet Awarness
357. Development of an Online Course Portal for a campus
358. Auxon Test
359. WEB BASED LEARNING SYSTEM
360. Tagging in online social networks
361. Secured file Downloading system
362. Cryptonite : A Secure and Performant Data Repository on Public Clouds
363. searching a image from websites
364. Online University
365. Online product Opinion and Ranking System
366. MNC LEAVE MANAGEMENT SYSTEM
367. Home appliances online purchase
368. Freelancer Job
369. E-Tutor Online Jobs
370. Statistical Entity Extraction from Web
371. Effective Collaborative Learning
372. Development of an e-Post Office System
373. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
374. Towards Effective Bug Triage with Software Data Reduction Techniques
375. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
376. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
377. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
378. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
379. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
380. Proof of retrievability with public verifiability resilient against related-key attacks
381. Secure Anonymous Key Distribution Scheme for Smart Grid
382. Converses For Secret Key Agreement and Secure Computing
383. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


JAVA IEEE LATEST
IEEE Transactions on Big Data
384. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
385. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
386. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
Services Computing
387. Two Layer Clustering model for Mobile Customer Analysis
388. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
389. Consumer oriented web services ranking and classification
390. Resource renting for periodical cloud workflow applications
IEEE Transactions on Security Computing
391. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
392. QoS Recommendation in Cloud Services
393. Securing Aggregate Queries for DNA Databases
394. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
395. A robust reputation management mechanism in the federated cloud
396. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
397. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
398. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
399. Energy-efficient Query Processing in Web Search Engines
400. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
401. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
402. BiRank: Towards Ranking on Bipartite Graphs
403. QoS Recommendation in Cloud Services
404. Public Interest Analysis Based on Implicit Feedback of IPTV Users
405. Search Rank Fraud and Malware Detection in Google Play
406. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
407. Influence Maximization in Trajectory Databases
408. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
409. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
410. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
411. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
412. Computing Semantic Similarity of Concepts in Knowledge Graphs
413. QDA: A Query-Driven Approach to Entity Resolution
414. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
415. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
416. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
417. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
418. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
419. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
420. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
421. Two-Factor Data Security Protection Mechanism for Cloud Storage System
422. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
423. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
424. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
425. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
426. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
427. Where You Are Is Who You Are User Identification by Matching Statistics
428. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
429. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
430. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
431. Online Subgraph Skyline Analysis Over Knowledge Graphs
432. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
433. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
434. ID2S Password-Authenticated Key Exchange Protocols
435. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
436. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
437. Classification model to predict the learners' academic performance using big data
438. Electronic Commerce Meets the Semantic Web
439. Mining High Utility Patterns in One Phase without Generating Candidates
440. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
441. Automatic Generation of Social Event Storyboard from Image Click-through Data
442. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
443. Understanding Deep Representations Learned in Modeling Users Likes
444. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
445. Topic-Oriented Exploratory Search Based on an Indexing Network
446. Relevance Feedback Algorithms Inspired By Quantum Detection
447. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
448. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
449. Efficiently Estimating Statistics of Points of Interests on Maps
450. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
451. Aspect-level Influence Discovery from Graphs
452. Sentiment Embeddings with Applications to Sentiment Analysis
453. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
454. Resolving Multi-party Privacy Conflicts in Social Media
455. Encrypted Data Management with Deduplication in Cloud Computing
456. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
457. Crawling Hidden Objects with kNN Queries
458. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
459. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
460. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
461. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
462. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
463. Nearest Keyword Set Search in Multi-dimensional Datasets
464. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
465. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
466. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
467. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
468. Immutable Authentication and Integrity Schemes for Outsourced Databases
469. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
470. Server-Aided Public Key Encryption with Keyword Search
471. Online Learning in Large-Scale Contextual Recommender Systems
472. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
473. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
474. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
475. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
476. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
477. Multi-Modal Event Topic Model for Social Event Analysis
478. Social friend recommendation on multiple network correlation
479. Tag Based Image Search by Social Re-ranking
480. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
481. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
482. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
483. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
484. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
485. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
486. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
487. Rank-Based Similarity Search: Reducing the Dimensional Dependence
488. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
489. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
490. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
491. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
492. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
493. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
494. On the Security of data access control for multiauthority cloud storage system
495. Trust-based Service Management for Social Internet of Things Systems
496. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
497. Formalization and Verification of Group Behavior Interactions
498. Group Key Agreement with Local Connectivity
499. Data Lineage in Malicious Environments
500. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
501. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
502. Enabling Cloud Storage Auditing with Key-Exposure Resistance
503. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
504. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
505. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
506. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
507. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
508. Quantitative Reasoning About Cloud Security Using Service Level Agreements
509. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
510. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
511. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
512. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
513. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
514. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
515. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
516. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
517. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
518. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
519. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
520. Enabling Cloud Storage Auditing with Key-Exposure Resistance
521. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
522. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
523. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
524. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
525. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
526. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
527. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
528. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
529. Secure Auditing and Deduplicating Data in Cloud
530. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
531. Towards reproducibility in online social network Research
532. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
533. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
534. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
535. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
536. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
537. Making Digital Artifacts on the Web Verifiable and Reliable
538. Anonymizing Collections of Tree-Structured Data
539. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
540. FOCS: Fast Overlapped Community Search
541. Sparsity Learning Formulations for Mining Time-Varying Data
542. The Impact of View Histories on Edit Recommendations
543. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
544. Discovery of Ranking Fraud for Mobile Apps
545. Towards Effective Bug Triage with Software Data Reduction Techniques
546. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
547. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
548. Auditing for Distributed Storage Systems
549. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
550. Uploader Intent for Online Video: Typology, Inference and Applications
551. YouTube Video Promotion by Cross-network
552. Semantic-Improved Color Imaging Applications: It Is All About Context
553. Geolocalized Modeling for Dish Recognition
554. Learning to Rank Image Tags with Limited Training Examples
555. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
556. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
557. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
558. Tracking Temporal Community Strength in Dynamic Networks
559. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
560. Towards Information Diffusion in Mobile Social Networks
561. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
562. An Efficient Privacy-Preserving Ranked Keyword Search Method
563. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
564. Dispersing Instant Social Video Service Across Multiple Clouds
565. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
566. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
567. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
568. A Computational Dynamic Trust Model for User Authorization
569. Secure Distributed Deduplication Systems with Improved Reliability
570. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
571. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
572. Leveraging the Tail Time for Saving Energy in Cellular Networks
573. Keylogging-resistant Visual Authentication Protocols
574. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
575. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
576. Preserving Location Privacy in Geo-Social Applications
577. Efficient Authentication for Mobile and Pervasive Computing
578. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
579. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
580. Typicality-Based Collaborative Filtering Recommendation
581. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
582. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
583. Keyword Search Over Probabilistic RDF Graphs
584. Efficient Prediction of Difficult Keyword Queries over Databases
585. Interpreting the Public Sentiment Variations on Twitter
586. An Efficient Recommendation Method for Improving Business Process Modeling
587. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
588. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
589. On the use of Side Information for Mining Text Data
590. Privacy Preserving and Content Protecting Location based Queries
591. Fast Nearest Neighbor Search with Keywords
592. Towards Differential Query Services in Cost-Efficient Clouds
593. Facilitating Document Annotation using Content and Querying Value
594. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
595. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
596. Secure Outsourced Attribute-Based Signatures
597. Supporting Privacy Protection in Personalized Web Search
598. Dealing With Concept Drifts in Process Mining
599. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
600. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
601. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
602. Active Learning of Constraints for Semi-Supervised Clustering
603. Best Keyword Cover Search
604. Personalized Recommendation Combining User Interest and Social Circle
605. Online Feature Selection and Its Applications
606. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
607. Incremental Affinity Propagation Clustering Based on Message Passing
608. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
609. Secure kNN Query Processing in Untrusted Cloud Environments
610. Malware Propagation in Large-Scale Networks
611. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
612. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
613. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
614. Efficient Ranking on Entity Graphs with Personalized Relationships
615. Task Trail: An Effective Segmentation of User Search Behavior
616. Privacy-Preserving Enhanced Collaborative Tagging
617. XSPath Navigation on XML Schemas Made Easy
618. Security Evaluation of Pattern Classifiers under Attack
619. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
620. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
621. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
622. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
623. Nothing is for Free: Security in Searching Shared and Encrypted Data
624. SocialTube: P2P-assisted Video Sharing in Online Social Networks
625. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
626. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
627. Behavioral Malware Detection in Delay Tolerant Networks
628. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
629. Private Searching on Streaming Data Based on Keyword Frequency
630. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
631. On the Security of Trustee-Based Social Authentications
632. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
633. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
634. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
635. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
636. A Two-stage Deanonymization Attack Against Anonymized Social Networks
637. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
638. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
639. Scalable architecture for multi-user encrypted SQL operations on cloud database services
640. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
641. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
642. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
643. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
644. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
645. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
646. Secure kNN Query Processing in Untrusted Cloud Environments
647. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
648. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
649. A Hybrid Cloud Approach for Secure Authorized Deduplication
650. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
651. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
652. A Novel Model for Competition and Cooperation Among Cloud Providers
653. CLOUDQUAL: A Quality Model for Cloud Services
654. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
655. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
656. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
657. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
658. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
659. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
660. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
661. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
662. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
663. Enhanced Security for Association Rule Mining to secure Transactional Databases
664. Operational Pattern Revealing Technique in Text Mining
665. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
666. Personalized web search using Browsing history and domain Knowledge
667. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
668. Data Security the Challenge of Cloud Computing
669. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
670. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
671. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
672. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
673. User Action Interpretation for Online Content Optimization
674. Spatial Query Integrity with Voronoi Neighbors
675. Spatial Approximate String Search
676. Sensitive Label Privacy Protection on Social Network Data
677. Secure Mining of Association Rules in Horizontally Distributed Databases
678. Secure Logging As a Service Delegating Log Management to the Cloud
679. Robust Module-based Data Management
680. Ranking on Data Manifold with Sink Points
681. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
682. Privacy-Enhanced Web Service Composition
683. Privacy against Aggregate Knowledge Attacks
684. Preventing Private Information Inference Attacks on Social Networks
685. PMSE: A Personalized Mobile Search Engine
686. Personalized QoS-Aware Web Service Recommendation and Visualization
687. Optimal Client-Server Assignment for Internet Distributed Systems
688. Online Search and Buying Behaviour in Consumer Markets
689. M-Privacy for Collaborative Data Publishing
690. Mining User Queries with Markov Chains: Application to Online Image Retrieval
691. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
692. Incentive Compatible Privacy-Preserving Data Analysis
693. Improving Security and Efficiency in Attribute-Based Data Sharing
694. FoCUS: Learning to Crawl Web Forums
695. Fast Nearest Neighbor Search with Keywords
696. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
697. Facilitating Effective User Navigation through Website Structure Improvement
698. Facilitating Document Annotation using Content and Querying Value
699. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
700. Efficient Evaluation of SUM Queries over Probabilistic Data*
701. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
702. Dynamic Query Forms for Database Queries
703. Dynamic Personalized Recommendation on Sparse Data
704. Distributed Strategies for Mining Outliers in Large Data Sets
705. Crowdsourcing Predictors of Behavioral Outcomes
706. Co-Occurrence-Based Diffusion for Expert Search on the Web
707. Comparable Entity Mining from Comparative Questions
708. CloudMoV: Cloud-based Mobile Social TV
709. Anomaly Detection via Online Oversampling Principal Component Analysis
710. Anomaly Detection Approach Using Hidden Markov Model
711. Annotating Search Results from Web Databases
712. A System to Filter Unwanted Messages from OSN User Walls
713. A Survey of XML Tree Patterns
714. A Probabilistic Approach to String Transformation
715. A New Algorithm for Inferring User Search Goals with Feedback Sessions
716. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
717. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
718. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
719. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
720. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
721. Towards Differential Query Services in Cost-Efficient Clouds
722. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
723. SocialTube: P2P-assisted Video Sharing in Online Social Networks
724. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
725. QoS Ranking Prediction for Cloud Services
726. Priority-Based Consolidation of Parallel Workloads in the Cloud
727. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
728. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
729. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
730. Load Rebalancing for Distributed File Systems in Clouds
731. Label-Embedding for Attribute-Based Classification
732. IP-Geolocation Mapping for Moderately Connected Internet Regions
733. Identity-Based Secure Distributed Data Storage Schemes
734. Hint-based Execution of Workloads in Clouds with Nefeli
735. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
736. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
737. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
738. Efficient Two-Server Password-Only Authenticated Key Exchange
739. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
740. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
741. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
742. Winds of Change: From Vendor Lock-In to the Meta Cloud
743. Supporting the Migration of Applications to the Cloud through a Decision Support System
744. Storing Shared Data on the Cloud via Security-Mediator
745. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
746. Privacy-Preserving Public Auditing for Secure Cloud Storage
747. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
748. Outsourcing Privacy-Preserving Social Networks to a Cloud
749. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
750. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
751. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
752. Efficient Security Solution for Privacy-Preserving Cloud Services
753. Collaboration in Multicloud Computing Environments: Framework and Security Issues
754. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
755. Cloud-based DDoS Attacks and Defenses
756. Cloud computing for mobile users can offloading compution save energy
757. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
758. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
759. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
760. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
761. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
762. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
763. Two tales of privacy in online social networks
764. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
765. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
766. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
767. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
768. Security and Privacy-Enhancing Multicloud Architectures
769. Security Using Colors and Armstrong Numbers
770. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
771. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
772. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
773. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
774. Privacy Preserving Data Analytics for Smart Homes
775. On Inference-Proof View Processing of XML Documents
776. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
777. Extracting Spread-Spectrum Hidden Data from Digital Media
778. Efficiently Outsourcing Multiparty Computation under Multiple Keys
779. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
780. Craigslist Scams and Community Composition: Investigating Online Fraud
781. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
782. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
783. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
784. Super-Resolution-based Inpainting
785. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
786. Image Authentication Using Stochastic Diffusion
787. Hierarchical Super-Resolution-Based Inpainting
788. Circular Reranking for Visual Search
789. Bootstrapping Visual Categorization With Relevant Negatives
790. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
791. An extended visual cryptography scheme without pixel expansion for halftone images
792. An Adaptive Cloud Downloading Service
NETWORKING
793. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
794. Topological Conditions for In-Network Stabilization of Dynamical Systems
795. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
796. Price Differentiation for Communication Networks
797. Participatory Privacy: Enabling Privacy in Participatory Sensing
798. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
799. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
800. On the Role of Mobility for Multi-message Gossip
801. Fully Anonymous Profile Matching in Mobile Social Networks
802. Fault Node Recovery Algorithm for a Wireless Sensor Network
803. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
804. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
805. Access Policy Consolidation for Event Processing Systems
806. A Fast Re-Route Method
SOFTWARE ENGINEERING
807. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
808. Vampire attacks: Draining life from wireless ad-hoc sensor networks
809. Towards a Statistical Framework for Source Anonymity in Sensor Networks
810. Search Me If You Can: Privacy-preserving Location Query Service
811. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
812. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
813. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
814. Distributed Cooperative Caching in Social Wireless Networks
815. Community-Aware Opportunistic Routing in Mobile Social Networks
816. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
817. The Devils Behind Web Application Vulnerabilities
818. Security Architecture for Cloud Networking
819. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
820. Secure Overlay Cloud Storage with Access Control and Assured Deletion
821. Risk-Aware Mitigation for MANET Routing Attacks
822. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
823. Privacy-preserving Enforcement of Spatially Aware RBAC
824. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
825. pCloud: A Distributed System for Practical PIR
826. Packet-Hiding Methods for Preventing Selective Jamming Attacks
827. Online Modeling of Proactive Moderation System for Auction Fraud Detection
828. Fast and accurate annotation of short texts with Wikipedia pages
829. FADE: Secure Overlay Cloud Storage with File Assured Deletion
830. Ensuring Distributed Accountability for Data Sharing in the Cloud
831. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
832. Direct and Indirect Discrimination Prevention Methods
833. Detecting Spam Zombies by Monitoring Outgoing Messages
834. Detecting Anomalous Insiders in Collaborative Information Systems
835. Data-Provenance Verification For Secure Hosts
836. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
837. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
838. Payments for Outsourced Computations
839. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
840. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
841. Toward Private Joins on Outsourced Data
842. Statistical Entity Extraction from Web
843. Slicing: A New Approach to Privacy Preserving Data Publishing
844. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
845. Resilient Identity Crime Detection
846. Ranking Model Adaptation for Domain-Specific Search
847. Organizing User Search Histories
848. On the Spectral Characterization and Scalable Mining of Network Communities
849. Multiparty Access Control for Online Social Networks: Model and Mechanisms
850. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
851. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
852. How do Facebookers use Friendlists
853. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
854. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
855. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
856. Enabling Multilevel Trust in Privacy Preserving Data Mining
857. Enabling cross-site interactions in social networks
858. Efficient Similarity Search over Encrypted Data
859. Efficient Extended Boolean Retrieval
860. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
861. Efficient Anonymous Message Submission
862. Effective Pattern Discovery for Text Mining
863. DDD: A New Ensemble Approach for Dealing with Concept Drift
864. Credibility Ranking of Tweets during High Impact Events
865. Creating Evolving User Behavior Profiles Automatically
866. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
867. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
868. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
869. Anomaly Detection for Discrete Sequences: A Survey
870. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
871. Advance Mining of Temporal High Utility Itemset
872. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
873. Reliable Re-encryption in Unreliable Clouds
874. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
875. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
876. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
877. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
878. Gossip-based Resource Management for Cloud Environments
879. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
880. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
881. Cloud Data Protection for the Masses
882. Cloud Computing Security: From Single to Multi-Clouds
883. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
884. In Tags We Trust Trust modeling in social tagging of multimedia content
885. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
886. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
887. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
888. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
889. Cut Detection in Wireless Sensor Networks
890. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
891. TrickleDNS: Bootstrapping DNS Security using Social Trust
892. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
893. Policy-by-Example for Online Social Networks
894. Packet Loss Control Using Tokens at the Network Edge
895. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
896. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
897. Independent Directed Acyclic Graphs for Resilient Multipath Routing
898. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
899. Game-Theoretic Pricing for Video Streaming in Mobile Networks
900. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
901. Auditing for Network Coding Storage
902. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
903. Privacy Preserving Cloud Data Access With Multi-Authorities
904. Movie Rating and Review Summarization in Mobile Environment
905. IDSaaS: Intrusion Detection System as a Service in Public Clouds
906. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
907. BibPro: A Citation Parser Based on Sequence Alignment Techniques
908. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
909. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
910. RITAS: Services for Randomized Intrusion Tolerance
911. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
912. Nymble: Blocking Misbehaving Users in Anonymizing Networks
913. Modeling and Detection of Camouflaging Worm
914. Coding for Cryptographic Security Enhancement using Stopping Sets
915. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
916. Wireless Sensor Network Security model using Zero Knowledge Protocol
917. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
918. Throughput Optimization in Mobile Backbone Networks
919. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
920. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
921. Fast Data Collection in Tree-Based Wireless Sensor Networks
922. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
923. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
924. SPAF: Stateless FSA-based Packet Filters
925. Selfish Overlay Network Creation and Maintenance
926. ProgME: Towards Programmable Network MEasurement
927. Locating Equivalent Servants over P2P Networks
928. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
929. Buffer Sizing for 802.11 Based Networks
930. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
931. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
932. Improving Utilization of Infrastructure Clouds
933. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
934. CloudTPS: Scalable Transactions for Web Applications in the Cloud
935. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
936. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
937. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
938. Ranking Spatial Data by Quality Preferences
939. Making Aggregation Work in Uncertain and Probabilistic Databases
940. Load Shedding in Mobile Systems with MobiQual
941. Group Enclosing Queries
942. Extended XML Tree Pattern Matching: Theories and Algorithms
943. Effective Navigation of Query Results Based on Concept Hierarchies
944. Discovering Conditional Functional Dependencies
945. Decision Trees for Uncertain Data
946. Data Leakage Detection
947. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
948. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
949. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
950. Privacy Protection based Access Control Scheme in Cloud-based Services
951. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
952. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
953. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
954. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
955. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
956. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
957. Explaining Missing Answers to Top-k SQL Queries
958. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
959. Continuous Top-k Monitoring on Document Streams
960. Generating Query Facets using Knowledge Bases
961. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
962. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
963. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
964. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
965. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
966. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
967. Generating Query Facets using Knowledge Bases
968. Private Over-threshold Aggregation Protocols over Distributed Datasets
969. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
970. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
971. Privacy Protection based Access Control Scheme in Cloud-based Services
972. Dynamic Facet Ordering for Faceted Product Search Engines
973. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
974. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
975. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
976. A Forecasting Methodology for Workload Forecasting in Cloud Systems
977. Optimal Shipping Strategy and Return Service Charge Under No-Reason
978. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
979. A Recommendation System to Facilitate Business Process Modeling
980. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
981. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
982. User Differentiated Verifiable File Search on the Cloud
983. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
984. Statistical Features Based Real-time Detection of Drifted Twitter Spam
985. Incremental Consolidation of Data-Intensive Multi-flows
986. Service Pattern: An Integrated Business Process Model for Modern Service Industry
987. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
988. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
989. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
990. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
991. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
992. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
993. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
994. TagBook: A Semantic Video Representation without Supervision for Event Detection
995. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
996. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
997. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
998. The Impact of Review Environment on Review Credibility
999. Private Over-threshold Aggregation Protocols over Distributed Datasets
1000. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1001. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1002. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1003. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1004. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1005. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1006. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1007. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1008. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1009. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1010. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1011. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1012. What Is Happening in The Video Annotate Video by Sentence
1013. Two level QR code for private message sharing and document authentication.
1014. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1015. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1016. Mining Health Examination Records A Graph-based Approach
1017. A Credibility Analysis System for Assessing Information on Twitter
1018. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1019. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1020. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1021. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1022. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1023. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1024. Predicting Personalized Image Emotion Perceptions in Social Networks
1025. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1026. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1027. Explaining Missing Answers to Top-k SQL Queries
1028. Bilevel Feature Extraction Based Text Mining
1029. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1030. Privacy-Preserving Outsourced Media Search
1031. Modeling and Verification of Online Shopping Business Processes
1032. User Preference Learning for Online Social Recommendation
1033. Steganalysis Features for Content-Adaptive JPEG Steganography
1034. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1035. PiCode: a New Picture-Embedding 2D Barcode
1036. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1037. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1038. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1039. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1040. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1041. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1042. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1043. Cloud workflow scheduling with deadlines and time slot availability
1044. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1045. Path-Based Epidemic Spreading in Networks
1046. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1047. On the Resiliency of Static Forwarding Tables
1048. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1049. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1050. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1051. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1052. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1053. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1054. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1055. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1056. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1057. Hacking is not random: a case-control study of webser ver-compromise risk
1058. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1059. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1060. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1061. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1062. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1063. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1064. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1065. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1066. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1067. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1068. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1069. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1070. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1071. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1072. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1073. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1074. Cross-Domain Feature Learning in Multimedia
1075. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1076. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1077. Saliency-based color accessibility
1078. Contextual Online Learning for Multimedia Content Aggregation
1079. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1080. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1081. An Attribute-assisted Reranking Model for Web Image Search
1082. RRW - A Robust and Reversible Watermarking
1083. Steganography Using Reversible Texture Synthesis
1084. Single Image Super-Resolution Based on Gradient Profile Sharpness
1085. Detection and Rectification of Distorted Fingerprints
1086. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1087. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1088. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1089. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1090. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1091. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1092. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1093. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1094. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1095. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1096. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1097. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1098. Authenticated Key Exchange Protocols for Parallel Network File Systems
1099. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1100. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1101. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1102. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1103. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1104. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1105. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1106. Context-based Diversification for Keyword Queries over XML Data
1107. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1108. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1109. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1110. Tweet Segmentation and Its Application to Named Entity Recognition
1111. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1112. Automatic Group Happiness Intensity Analysis
1113. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1114. Query Aware Determinization of Uncertain Objects
1115. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1116. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1117. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1118. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1119. Efficient Community Formation for Web Services
1120. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1121. Secure Mining of Association Rules in Hor izontally Distributed Databases
1122. Dynamic Query Forms for Database Queries
1123. Secure kNN Query Processing in Untrusted Cloud Environments
1124. An Empirical Performance Evaluation of Relational Keyword Search Systems
1125. Keyword Query Routing
1126. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1127. Demand Bidding Program and Its Application in Hotel Energy Management
1128. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1129. Incremental Detection of Inconsistencies in Distributed Data
1130. A Cocktail Approach for Travel Package Recommendation
1131. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1132. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1133. Analysis of Field Data on Web Security Vulnerabilities
1134. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1135. A Reliability Improvement Method for SOA-Based Applications
1136. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1137. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1138. Web Service Recommendation via Exploiting Location and QoS Information
1139. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1140. Exploiting Rateless Codes in Cloud Storage Systems
1141. COMIC:Cost Optimization for Internet Content Multihoming
1142. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1143. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1144. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1145. Uniform Embedding for Efficient JPEG Steganography
1146. Secure Deduplication with Efficient and Reliable Convergent Key Management
1147. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1148. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1149. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1150. Location Aware Keyword Query Suggestion Based on Document Proximity
1151. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1152. A secure data self-destructing scheme in cloud computing
1153. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1154. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1155. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1156. Secure kNN Query Processing in Untrusted Cloud Environments
1157. Exploiting Rateless Codes in Cloud Storage Systems
1158. Fuzzy Authorization for Cloud Storage
1159. Planning vs. dynamic control Resource allocation in corporate clouds
1160. Automatic Scaling of Internet Applications for Cloud Computing Services
1161. Strategy-proof Pricing for Cloud Service Composition
1162. Privacy Preserving Delegated Access Control in Public Clouds
1163. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1164. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1165. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1166. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1167. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1168. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1169. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1170. A Scientometric Analysis of Cloud Computing Literature
1171. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1172. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1173. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1174. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1175. FeatureMatch: A General ANNF Estimation Technique and its Applications
1176. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1177. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1178. As-Projective-As-Possible Image Stitching with Moving DLT
1179. Sharing Visual Secrets in Single Image Random Dot Stereograms
1180. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1181. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1182. A New Iterative Triclass Thresholding Technique in Image Segmentation
1183. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1184. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1185. An Iranian License Plate Recognition System Based on Color Features
1186. Learning Layouts for Single-Page Graphic Designs
1187. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1188. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1189. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1190. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1191. Fingerprint Compression Based on Sparse Representation
1192. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1193. LBP-Based Edge-Texture Features for Object Recoginition
1194. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1195. Toward Experiential Mobile Media Processing
1196. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1197. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1198. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1199. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1200. Designing Truthful Spectrum Double Auctions with Local Markets
1201. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1202. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1203. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1204. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1205. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1206. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1207. A Study on Clinical Prediction Using Data Mining Techniques
1208. Online Payment System using Steganography and Visual Cryptography
1209. Efficient Instant-Fuzzy Search with Proximity Ranking
1210. Attribute Based Encryption with Privacy Preserving In Clouds
1211. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1212. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1213. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1214. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1215. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1216. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1217. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1218. The Target Tracking in Mobile Sensor Networks
1219. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1220. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1221. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1222. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1223. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1224. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1225. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1226. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1227. SUSIE: Search Using Services and Information Extraction
1228. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1229. Secure Mining of Association Rules in Horizontally Distributed Databases
1230. Sampling Online Social Networks
1231. Privacy Preserving Delegated Access Control in Public Clouds
1232. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1233. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1234. Ginix : Generalized Inverted Index for Keyword Search
1235. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1236. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1237. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1238. Dynamic Query Forms for Database Queries
1239. Cost-Based Optimization of Service Compositions
1240. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1241. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1242. Automatic Extraction of Top-k Lists from the Web
1243. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1244. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1245. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1246. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1247. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1248. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1249. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1250. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1251. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1252. Privacy Preserving Data Sharing With Anonymous ID Assignment
1253. Non-Cooperative Location Privacy
1254. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1255. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1256. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1257. Cloud based emails boundaries and vulnerabilities
1258. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1259. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1260. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1261. Optimal Content Downloading in Vehicular Networks
1262. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1263. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1264. View-invariant action recognition based on Artificial Neural Networks
1265. User-aware Image Tag Refinement via Ternary Semantic Analysis
1266. Separable Reversible Data Hiding in Encrypted Image
1267. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1268. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1269. Robust Face-Name Graph Matching for Movie Character Identification
1270. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1271. Improving Color Constancy by Photometric Edge Weighting
1272. Exploring the design space of social network-based Sybil defenses
1273. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1274. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1275. AnnoSearch: Image Auto-Annotation by Search
1276. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1277. Scalable Scheduling of Updates in Streaming Data Warehouses
1278. Scalable Learning of Collective Behavior
1279. Ranking Model Adaptation for Domain-Specific Search
1280. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1281. Outsourced Similarity Search on Metric Data Assets
1282. Organizing User Search Histories
1283. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1284. Mining Web Graphs for Recommendations
1285. Joint Top K Spatial Keyword Query Processing
1286. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1287. Identifying Content for Planned Events Across Social Media Sites
1288. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1289. Generative Models for Item Adoptions Using Social Correlation
1290. Efficient Data Mining for XML Queries Answering Support
1291. Efficient audit service outsourcing for data integrity in clouds
1292. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1293. Effective Pattern Discovery for Text Mining
1294. Combined Mining: Discovering Informative Knowledge in Complex Data
1295. Decentralized Probabilistic Text Clustering
1296. Computing Structural Statistics by Keywords in Databases
1297. Bridging Social and Data Networks
1298. Answering General Time-Sensitive Queries
1299. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1300. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1301. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1302. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1303. Resource-Aware Application State Monitoring
1304. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1305. Query Access Assurance in Outsourced Databases
1306. Linear and Differential Cryptanalysis
1307. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1308. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1309. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1310. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1311. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1312. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1313. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1314. ROAuth: Recommendation Based Open Authorization
1315. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1316. Recommendation Models for Open Authorization
1317. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1318. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1319. On Privacy of Encrypted Speech Communications
1320. OAuth Web Authorization Protocol
1321. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1322. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1323. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1324. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1325. Fast Matrix Embedding by Matrix Extending
1326. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1327. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1328. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1329. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1330. Measuring Code Quality to Improve Specification Mining
1331. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1332. Towards Secure and Dependable Storage Services in Cloud Computing
1333. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1334. Remote Display Solutions for Mobile Cloud Computing
1335. Privacy Preserving Delegated Access Control in Public Clouds
1336. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1337. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1338. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1339. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1340. Load-Balancing Multipath Switching System with Flow Slice
1341. Assessing the Veracity of Identity Assertions via OSNs
1342. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1343. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1344. A New Cell-Counting-Based Attack Against Tor
1345. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1346. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1347. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1348. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1349. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1350. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1351. Fast Release Capture Sampling in Large-Scale Sensor Networks
1352. Cooperative download in vehicular environments
1353. Cooperative Data Dissemination via Roadside WLANs
1354. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1355. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1356. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1357. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1358. Hiding Sensitive Association Rule for Privacy Preservation
1359. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1360. Development of Certificate Authority Services for Web Applications
1361. Detecting and Validating Sybil Groups in theWild
1362. Association Rule Extracting Knowledge Using Market Basket Analysis
1363. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1364. Valuable Detours: Least-Cost Anypath Routing
1365. Self-Reconfigurable Wireless Mesh Networks
1366. Reliability in Layered Networks with Random Link Failures
1367. NABS:Novel Approaches for Biometric Systems
1368. Live Streaming with Receiver-based Peer-division Multiplexing
1369. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1370. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1371. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1372. Virtualized Screen: A Third Element for CloudMobile Convergence
1373. Steganographic Embedding in JPEG Images with Visual Criterion
1374. On the Typical Statistic Features for Image Blind Steganalysis
1375. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1376. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1377. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1378. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1379. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1380. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1381. Vulnerability Analysis in SOA-Based Business Processes
1382. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1383. Service-Centric Framework for a Digital Government Application
1384. Server-Side Streaming Processing of WS-Security
1385. OWLPath: An OWL Ontology-Guided Query Editor
1386. Monitoring Service Systems from a Language-Action Perspective
1387. Extracting Product Features and Sentiments from Chinese Customer Reviews
1388. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1389. Automated Certification for Compliant Cloud-based Business Processes
1390. Addressing Dependability throughout the SOA Life Cycle
1391. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1392. The Geometric Efficient Matching Algorithm for Firewalls
1393. Secure Service-Oriented Architecture for Mobile Transactions
1394. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1395. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1396. Privacy-Preserving Updates to Anonymous and Confidential Databases
1397. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1398. IPAS: Implicit Password Authentication System
1399. Improving Security and Performance in the Tor Network through Tunable Path Selection
1400. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1401. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1402. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1403. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1404. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1405. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1406. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1407. Data Delivery Properties of Human Contact Networks
1408. Converge-Cast: On the Capacity and Delay Tradeoffs
1409. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1410. USHER: Improving Data Quality with Dynamic Forms
1411. The World in a Nutshell: Concise Range Queries
1412. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1413. Scalable Scheduling of Updates in Streaming Data Warehouses
1414. Scalable Learning of Collective Behavior
1415. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1416. Publishing Search Logs A Comparative Study of Privacy Guarantees
1417. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1418. Optimal Service Pricing for a Cloud Cache
1419. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1420. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1421. Mining Web Graphs for Recommendations
1422. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1423. Integration of Sound Signature Authentication System
1424. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1425. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1426. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1427. Exploring Application-Level Semantics for Data Compression
1428. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1429. Data Leakage Detection
1430. Cost-aware rank join with random and sorted access
1431. Collaborative Filtering with Personalized Skylines
1432. Bridging Socially-Enhanced Virtual Communities
1433. Automatic Discovery of Personal Name Aliases from the Web
1434. A Personalized Ontology Model for Web Information Gathering
1435. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1436. A Query Formulation Language for the Data Web
1437. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1438. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1439. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1440. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1441. Towards Secure and Dependable Storage Services in Cloud Computing
1442. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1443. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1444. Data Integrity Proofs in Cloud Storage
1445. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1446. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1447. Feature-level Sentiment Analysis for Chinese Product Reviews
1448. Equal-sized Cells Mean Equal-sized Packets in Tor?
1449. Customer Relationship Management Based on Data Mining Technique
1450. Authentication Schemes for Session Passwords using Color and Images
1451. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1452. Young Talent Tracker
1453. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1454. International Plant Import and Export
OUR MODERN SOCITY
1455. Trained Volunteers Create A Successful Social Campaign
1456. Finger thump Based Shopping Cart
1457. Finger Print E-Voting Systems
1458. Create a Successful Anti- Nuclear Campaign
1459. Crowding Funding Mobilization
1460. People Power of India
1461. Modern Finger Print Voting System
1462. Election Commission Management
1463. Online Painting Auction
1464. Reality Show Ticket Booking System
1465. Online Broadway Motel Food Ordering System
1466. Fashion Studio Model Management
1467. Women's Selfhelp Group
Advance Health Care System
1468. Organizing medical camp for public health development
1469. Homeopathy Health Record
1470. Consumer Legal Advicer
1471. Raw Requried Online Medicine
1472. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1473. I School
1474. Job fair section process
1475. Advertising in E-Book
1476. Students Skills With Modern Industries
1477. College Placement And College Event
1478. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1479. Cloud Storage Public Digital Certificate
ERP PROJECTS
1480. Customer Relationship Management
1481. Corporate Trouble Shooter
1482. Corporate Event Organisation
1483. Engnering Lab Maintenance
1484. Select Your Age(Business Motivation all age group)
1485. Software Requirements Analysis for Client Side
1486. ERP System (Enterprint Resource Plan
LATEST BANKING
1487. User Opinion For Indian Banking Service And Cashless Economy
1488. Advanced Banking System
1489. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1490. Economic Usage of Solar Energy
1491. Gps Consumers Complients
1492. Online Softskills Tracks
1493. Online Buy And Sale Software
1494. Budget Home Design
1495. Online Product Exchange
1496. Jewellery Management
1497. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1498. Moderate Robatics System with Public Opinion
Java Apps
1499. Online overview of skills really used in jobs
1500. Land Bank for Nursery
1501. Developing Rural Economy
1502. ECOPS - Electronics Police Record Management System
1503. Website Evaluation Using Opinion Mining
1504. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1505. INSURANCE MANAGEMENT SYSTEM
1506. e-Fraud Prevention based on the Self- Authentication of e-Documents
1507. Hope Center
1508. Exam crazy
1509. BUGS REPORTING SYSTEM
1510. LOCATION BASED CONSUMER COMPLAINT
1511. Speed Racing
1512. ROADSTER
1513. META CAFE
1514. ONLINE VIDEO LOCKER
1515. Management System in Metro Train
1516. Plant Shopping on Web
1517. Reporting Online Media News Systems
1518. Informative Content Extraction
1519. E-commerce Complaint Management System
1520. Modern Agriculture Development System
1521. Loan Online Application
1522. Rural Community Developement
1523. LOVE AND CARE
1524. GREEN PLANT
1525. Advance Couier Service
1526. Community Awarness
1527. E_Music
1528. Staff Management System
1529. E-TENDERING
1530. Hotel Management
1531. Crime File Management System
1532. Cloud Cyber Attack
1533. Cloud Cost Management for Customer Sensitive Data
1534. Advance Web based Multimedia Answer Generation
1535. Commaunity Awareness
1536. E-Commerce Complaints
1537. Modern Agriculture Development System
1538. Plant Shopping on Web
1539. ONLINE VIDEO LOCKER
1540. ONLINE VIDEO LOCKER
1541. Reporting Online Media News Systems
1542. Online Plant Shopping
1543. Community Awareness
1544. Loan Online Application
1545. Modern Agriculture Development System
1546. Online Digital Library
1547. Geo Base Services
1548. Civil Supplies and Consumer Protection Department
1549. Citizen Opinions vs Government Policies
1550. Protecting Used Data Privacy for Attackers
1551. Web Hospital Management
1552. Easy SQL Query for Non-IT Manager
1553. Online Shopping with Fraud detection
1554. Efficient Spatial Query Processing
1555. Cryptographic Key Exchange Authentication
1556. Online Global Information Service Center
1557. Contracts Business Events Management
1558. Online Secure image Social Networks
1559. Outsourcing of Online Image Reconstruction
1560. Trust based Profile Matching Secure Social Network
1561. Secure and Distance based Online Social Network (OSN)
1562. Efficient Online Image Retrieval System
1563. Data Sharing In Cloud Storage by Using Key-Aggregate
1564. Multicast Key Management for Cloud
1565. Face-to-face contact on Mobile Social Networks
1566. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1567. Dynamically Growing Online Survey for Behavioral Outcomes
1568. Advance Web based Multimedia Answer Generation
1569. College Result Analysis with Horizontally Distributed Databases
1570. Feedback Decision Support for mHealth monitoring
1571. Exchange Secrete Key for Data Producers and Consumers
1572. Efficient Information Retrieval Using Ranked Query (EIRQ)
1573. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1574. Web Hosting On Cloud
1575. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1576. Web Server Security with Web Client Management System
1577. Web Parser on Sequence Alignment Techniques
1578. Web Page re-Ranking System for Library
1579. Web Eye
1580. Voting System for Web Library
1581. VIRTUAL CLASSROOM SYSTEM
1582. Unique Web Resources Utilization Monitoring System
1583. Transport Management System
1584. Pre-paid Recharging System on Banking
1585. Tollgate Management
1586. Time To Time Stock Market Updater and Monitoring System
1587. Sql Tuner
1588. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1589. SMS Based Mobile Banking with Security
1590. Sms Topup
1591. Vendor Information System For Shipping
1592. Sequential Anomaly Detection from User Behaviour
1593. Secure SMS Transaction System on banking
1594. Secure Online Documents Management System in Cloud
1595. Secure File Uploading Server with Advance Protecting System
1596. Secure File Monitoring System on Cloud
1597. Relational Logic Search Engine On Healthcare
1598. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1599. Quick Customer decision support on Web Sales Portal
1600. Query Response System for File Management
1601. Quality Visualization on Web TV
1602. Project Work Tracking System
1603. Product Market Manipulations on Asian stock market
1604. Predicting Top Company Share Based on High Utility Data
1605. Automation of Analysis and Development Management
1606. Pharmacy Information System
1607. Personalize Your News on Web
1608. Online University
1609. Online tagging for multimedia content
1610. Online Search Ranking On Multiple Domain
1611. Online Rental House Web Portal
1612. Online Recruitment System
1613. Online Real Estate Property Management
1614. Online Multi Type Documents Search Engine
1615. ONLINE MOBILE BILLING SYSTEM
1616. Online Jewelry Management
1617. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1618. Online Examination System
1619. Online Ensemble Learning Approach
1620. Online Banking With Fraud Detecting
1621. Online Auction Bit
1622. ONLINE ADVERTISING SYSTEM
1623. Nutraceuticals Management System
1624. Nearest Shopping Location Identification Systems
1625. Multilevel Images Authentication Systems
1626. Multi New Product Survey Management
1627. Movie Recommender Systems via User- Item Subgroups
1628. Movie Rating and Recommendation on Mobile
1629. Modern Municipal Corporation
1630. Mobile TV Quality Management
1631. Mobile Banking WAP
1632. Manifold Entrust Scheme
1633. Management System in Train
1634. Secure Mailing System
1635. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1636. LEAVE MANAGEMENT SYSTEM FOR MNC
1637. Knowledge Based Decision Support System(KMS)
1638. Key Management for Content Integration
1639. Inter Bank Fund Transfer in Distributed Network
1640. Information and Knowledge Extracting from a large amount of data
1641. Industry Standard Authorization For Sensitive Resources
1642. Implementation and Validating Environmental and Health
1643. iKnoweb Extracting and Integrating Entity Information System
1644. HUMAN ASSURANCE ADMINISTRATION
1645. High_level network Security Using Packet Filtering
1646. High and Low Level SQL Query Executor
1647. GLOBAL COUNSELLING SYSTEM
1648. A Game Theory for Online Security
1649. Distributed Transaction Proxy
1650. Freelancer Job
1651. File Security With Multi Database System
1652. FILE SEARCH ENGINE
1653. Fertilizer Management System
1654. Fast Web Information Gathering with Alias Detection
1655. E-Tutor Online Jobs
1656. Enterprise Stock and Accounting System
1657. Ensuring Data Storage Security in Cloud Computing
1658. Encrypted IT Auditing on Cloud Computing
1659. Encrypted Data Storage Vs Data Against illegal Access
1660. Enabling Site Interaction In Social Community
1661. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1662. E-Music world
1663. Employee Resource Management
1664. Employee Management System
1665. E-Learning
1666. E Fraud Prevention based on the Self Authentication of e Documents
1667. Distribution System for Discount Sales
1668. Distributed Data Integration on Electricity Board
1669. Disease Information Hiding on Publishing Healthcare Data
1670. Digital Documents Attestation Systems
1671. Defending Against Web Application Vulnerabilities
1672. Defects Analysis Systems
1673. Data theft detection mobile cloud computing
1674. Data Base Fraud Detection Systems
1675. Customer Information Hiding for Data Mismanagement in Banking
1676. Company Security Reporting System(CSRS)
1677. E -Crime File Management System
1678. Credit Card Management System
1679. Corporate Requirement System
1680. Consumer Sales Online Fake Product Detection and Deletion
1681. Company Information Tracking System
1682. Cloud Policy-Based File Assure Deletion
1683. Cloud Data Theft Attacks
1684. Cloud Cyber Attacks against Social Networks
1685. Cloud Cost Management for Customer Sensitive Data
1686. Client Favorite Photo Search Engine on Web
1687. Citizen Card System
1688. Card Management System
1689. Design &Development of Car Parking and Automation Billing Systems
1690. Customer Care Service
1691. BPO Call Center
1692. Automation of IT Process Management
1693. Modeling and Automated Containment of Worms
1694. Attribute Key Based Data Security System
1695. As Needed Basis Accountability for Cloud Data Sharing
1696. Annotation of short texts With Wikipedia pages
1697. AIRLINE RESERVATION SYSTEM
1698. Advance User Management on Social Website
1699. A Semantic Web Based Scientific News Aggregator


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1700. Online Trends Management Service in It Industry
1701. Session Management System in It Industry
1702. Tools for Non IT Expert Developer
ERP PROJECTS
1703. New Company Policy Clearance System
1704. Recommend To Friend
1705. Consultanting About the Foreign Peoples
1706. Performance System Analysis In Industry
1707. Non It People Performance
MODERN AGRICULTURE
1708. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1709. Agriculture Marketing in Generation
1710. Agriculture Assist
1711. Sponsor For Agriculture
SPORTS
1712. Play Ground Booking
OUR MODERN SOCITY
1713. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1714. RAILWAY SEAT RESERVATION SYSTEM
1715. Railway Management Service
1716. It Park Media
1717. Automation Transport Maintance
1718. Yell Help For Children
1719. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1720. Apartment Maintenance
1721. Power Consumption Monitoring House Hold Electronic Device
1722. Direct Q Less Reservation System in train
Advance Health Care System
1723. MAC Sensing Protocol
1724. World Wide Cloud Inter Hospital Acess Health Care System
1725. Live Doctor
Dotnet Apps
1726. TELEVISION CHANNEL PROGRAM MANAGEMENT
1727. WIN THE TRUST OF AN INDIAN CONSUMER
1728. ONLINE ACCOUNT MANAGEMENT
1729. SMART CAB BOOKING SYSTEM
1730. ONLINE FAST FOOD ORDER
1731. Travel Mate Add Module
1732. Work Order System Call Centre
1733. SPORTS MANAGEMENT SYSTEM
1734. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1735. Pick-It Courier Service
1736. Online Taxi Booking
1737. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1738. INCOMETAX MAINTAINANCE SYSTEM
1739. Hotel Reservation
1740. ERP System
1741. Bug Tracking System
1742. Vendor Information System For Shiping
1743. Top-K ranking System
1744. Secure Medical Image Archive System
1745. Business Activity Coordination Using Web Services
1746. Management Portal
1747. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1748. Secure Data Filtering Recommendation System
1749. Online Resources Sharing via Social Networks
1750. Secure self-destructing in Cloud Computing
1751. Web Resourecs File Authorization Management
1752. Click based image re-ranking system
1753. Tree Structure Data Analiysis Mining
1754. Web Resource Allocation for CorPerate
1755. Web Vulnerabilities and Security
1756. Fuzzy Cloud Search Using XML
1757. Cloud Data Supporting Secure Query Search
1758. Tour Recommender Systems on Web
1759. Distributed Interactive Web Applications
1760. Secure Query Processing for Cloud
1761. Online Data Storage with less pricing
1762. Cost Based Web Content Managemnts
1763. Web Hospital Management
1764. Online Data storage with low price
1765. Secure Online Data Block Authorization
1766. Profitable Onlin web Server System
1767. Online Economies File Manager for Multi Keying
1768. Online Community Management
1769. Key based Online Data Managements
1770. Critical Workflow Management for Web Documents
1771. Secure Online Documents Managements for Group Sharing
1772. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1773. Online Marketing Automation System
1774. Internal organization change management System
1775. Secure confirmation of sensitive transaction data in modern Internet banking services
1776. Privacy security with TPA in cloud computing
1777. Company Information Tracking System
1778. Online Virtualized screen Processing
1779. Web Service for Airline Management
1780. Web Social Club
1781. Quantum Key Cryptography
1782. Patient Data Management Based On Hospital Location
1783. Online Software Developer Community
1784. Online Developed Software sales
1785. Avoid repeated measurements On Genetics Dataset
1786. College Lab Maintenance System
1787. Industrial Manpower Resource Organizer
1788. Web Query Construction and Search on Complex Data
1789. Hospital Emergency Data Management
1790. Data confidentiality On Health-care Information System
1791. Secure Online Trading
1792. Fast Real-Time Event Alert Using social Network
1793. Secure E-Mail Organizer
1794. Web User Service Management System
1795. Easy SQL Query for Non-IT Manager
1796. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1797. Customer Relationship Management (CRM) on Banking
1798. Online Company ERP System
1799. Constructing E-Tourism
1800. Web based Multi Service Ranking System
1801. Dynamic Customer Data Hiding in Banking
1802. Online Distributed Social Clubs
1803. Virtual Shopping with Negative Feedback Reputation Systems
1804. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1805. Web Service Oriented Query Authentication Technique
1806. Web Based Customer Favorite vehicle Search Engine
1807. Web Based Book Publishing System
1808. Virtual Energy- Based Encryption and Keying
1809. Video Fraud Detecting On social Network
1810. Video Compression with Data hiding & Data Extraction
1811. Vendor Information System for Shipping
1812. VALUE ADDED TAX (VAT)
1813. Universal Smart Card
1814. Ultimate Location Information Systems
1815. Top K Ranking System
1816. Techno Task Manager
1817. Supply Chain Management
1818. Substitution-Permutation cryptanalysis System
1819. Streaming Data Warehouse Updations
1820. Step by Step Monitoring for Product Purchasing System
1821. Steganography for Data Reading and Writing AVI files
1822. SQL TUNER
1823. SMS Transaction Security
1824. Session Authentication Passwords using Color
1825. Service Availability Guarantees on Virtual Economy
1826. Server Fraud Detection on Cloud
1827. Sentence Based Search on Cloud
1828. Semantic Web Search Engines
1829. Secured Image communicator
1830. Secure smart application on web application
1831. Secure Service-Oriented Smartcard systems
1832. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1833. Secure Location Identification System
1834. Secure and Cloud Based Patient Information Systems
1835. Reduce the Password Guessing Attacks using Click Point
1836. Recommendation System Based on Graph
1837. Quantum Key Cryptography
1838. Quality Controller
1839. Public Web Status Monitoring System
1840. Project Trade Pool
1841. Product Marketing Analysis On Public Opinion
1842. Predicting Users Behaviors Using Web Mining
1843. Personal Health Information on M-Healthcare Emergency
1844. Optimum Online Knowledge Base
1845. Online Training Program
1846. Online Time sensitive queries
1847. Online Tag Based Image Retrieval and Effective Management
1848. Online Social networks controls using cloud
1849. Online Rental System
1850. Online product Opinion and Ranking System
1851. Online Dynamic form creation for Non-IT Peoples
1852. Online Digital Contract Signing in Mistrusted Parities
1853. Online Aventure
1854. Online Shopping
1855. News Ticker Project
1856. Net Bank in Recharge
1857. Multi User Public Auditing System of Data Storage Security
1858. Multi Location Networked Mobile Auto Intimates
1859. Modern Distributed Business Applications for Supply Chain Management
1860. Market Intelligence Based Public Sentiment Analysis
1861. Leave Management System
1862. Joint processing of spatial keyword queries
1863. Intelligence Missing Items in Shopping Cart
1864. Information Leak Detection and Prevention
1865. Industrial Manpower Resource Organizer
1866. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1867. Human Expertise Search Engine
1868. Home appliances online Purchase
1869. High Secure Corporate Web Search Engine
1870. High Degree Patient Privacy on Secure Data Outsourcing
1871. Group Movement Pattern Discovery
1872. Graph Based Share Market Data Updating
1873. Generic Business Portal
1874. Flight Booking Portal
1875. Firewall using Packet Filtering
1876. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1877. Ethical and Social issues in File sharing system
1878. Enterprener Sales Report Management
1879. Encyclopedia for Computer Science
1880. Employee Based Performance Monitoring and Action Systems
1881. Emerging Patient Health Information Exchange System On Cloud
1882. Efficient Search on Outsourced data using Cloud
1883. Efficient and Secure Data Processing on Queries Similarity
1884. Distributed Database Optimization on HealthCare
1885. Digital Asset Management Systems (DAMS) Using Watermarking
1886. Detecting Fraud on Vehicle Insurance System
1887. Defeating Lazy Servers Database Vs Query Access Assurance
1888. Data Processing for Disease-Treatment Relations
1889. Data Mining Analysis on EB bill system
1890. Data confidential against untrusted servers using attribute-based encryption (ABE)
1891. Data Aggregation using SQL clustering
1892. Customer Sales Analysis System Based On Purchasing
1893. Cryptography on Personal confidential information
1894. Cost Based Secure Cloud Data Systems
1895. Market Based Analysis for consumer correct decision
1896. Construction Company Work Order System
1897. Complete Medical Transcription System(Mts)
1898. Company Security Reporting System(CSRS)
1899. College Result Analysis
1900. Cloud Economic Benefit On Scientific Computing
1901. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1902. Centralized Event Planer across Social Media Sites
1903. Call Center Management
1904. A Reservation-Based Coordination Protocol for Web Services
1905. Building construction and cost estimation
1906. Budget Planner
1907. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1908. Automatically identifying query groups on Web Search Engine
1909. Auditing Data integrity and data storage using cloud
1910. Application layer blocker for preventing on cyber security
1911. Advanced One-Click User Web Search Engine
1912. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
1913. VALUE ADDED TAX (VAT)
1914. User Oriented Network Attacks
1915. Secure Back Up
1916. Screen Capture And Mouse I/O
1917. Sales Bill Printing System using Excel
1918. Password Security
1919. Online User Mobile Rating
1920. Online Sensex Graph System
1921. Online Book Publishing
1922. NEWS TICKER PROJECT
1923. Multi Storage file
1924. Message Chating
1925. Medical Equipment in WAP
1926. Login Authentication Scheme
1927. Information Alert System
1928. Image Encryption And Decryption
1929. Generic Business Portal
1930. Flight Booking Portal
1931. File Transfer using Cryptography Techniques
1932. File Splitting
1933. Excel Format in Report
1934. EB Management System
1935. Dynamic Web Form Creation
1936. Android Image Search


Struts Application Projects
Struts Apps
1937. Public Sentiment Analysis with Online Shopping Using Struts
1938. Modern distributed business for supply-chain management
1939. High Confidential Personal Disease Reporting System
1940. Distributor Sensitive Data Management Using Struts
1941. Development of Certificate Authority Services for Web Applications
1942. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1943. Website Tracking System
1944. Website Ranking System
1945. Treasure Warehouse
1946. Student Information System
1947. Storage security
1948. PRISON MANAGEMENT SYSTEM
1949. E-Licence Investigation System
1950. Online Secure File Transfer System
1951. Online Medicine Purchase
1952. ONLINE EDUCATION
1953. Online Agriculture System
1954. Mobile Survey
1955. ISSUE TRACKING SYSYTEM
1956. HOSPITAL MANAGEMENT SYSYTEMS
1957. HealthCare Management System
1958. Global Employee Acclaimer
1959. E-VOTING FOR ASSOCIATION
1960. Encrypted Register Form
1961. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1962. E INSURANCE
1963. Courier Tracking Systems
1964. corporate Transportation
1965. Collectorate Communication Systems
1966. Budget Approval System
1967. BLOOD BANK MANAGEMENT SYSTEMS
1968. ATTENDANCE MANAGEMENT SYSTEM
1969. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1970. Sponsor For Agriculture
1971. Agriculture Assist
1972. Agriculture Marketing in Generation
1973. International Plant Import and Export
MODERN EDUCATION SYSTEM
1974. Old In Gold
1975. I School
1976. College Placement And Events
1977. Rural Area Educational Trouble Shooter
1978. Web Direct Recruitment Analysis
1979. Online Aquarum
1980. School Automation System
1981. Secure Online Course Automation
1982. Session Management System in It Industry
1983. Tools for Non IT Expert Developer
1984. Students Skills With Modern Industries
MODERN TECHNOLOGY
1985. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1986. Customer Favarate Greeting Card Design
1987. GPS Transport Packers and Movers
1988. House Hold Appliancies Warranty Management
1989. Direct Q Less Reservation System in train
1990. Power Consumption Monitoring House Hold Electronic Device
1991. Apartment Maintenance
1992. Budget Home Design
1993. Online Buy And Sale Software
1994. Online Softskills Tracks
1995. Gps Consumers Complients
1996. Economic Usage of Solar Energy
Advance Health Care System
1997. Organizing medical camp for public health development
1998. LIVE WEB DOCTOR CONSULTATION
1999. World Wide Cloud Inter Hospital Acess Health Care System
2000. MAC Sensing Protocol
2001. Medical Record Authentication
2002. Raw Requried Online Medicine
2003. Consumer Legal Advicer
2004. Homeopathy Health Record
SPORTS
2005. Play Ground Booking
2006. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2007. Cloud Storage Public Digital Certificate
ERP PROJECTS
2008. Corporate Trouble Shooter
2009. Entrepreneur Fault Analysis
2010. Organise Corporate Training For Client Projects
2011. Employment Knowledge Database
2012. GPS Employee Tracking System
2013. Non It People Performance
2014. Performance System Analysis In Industry
2015. Consultanting About the Foreign Peoples
2016. Recommend To Friend
2017. New Company Policy Clearance System
2018. ERP System (Enterprint Resource Plan
2019. Software Requirements Analysis for Client Side
2020. Select Your Age(Business Motivation all age group)
2021. Engnering Lab Maintenance
2022. Corporate Event Organisation
LATEST BANKING
2023. EyeBank Management System
2024. Advanced Banking System
OUR MODERN SOCIETY
2025. Trained Volunteers Create A Successful Social Campaign
2026. Finger thump Based Shopping Cart
2027. Railway Management Service
2028. Create a Successful Anti- Nuclear Campaign
2029. Crowding Funding Mobilization
2030. People Power of India
2031. Pets Care
2032. Feature in Best Potitical Leader in India
2033. Yell Help For Children
2034. Automation Transport Maintance
2035. It Park Media
2036. Online Painting Auction
2037. Election Commission Management
2038. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2039. ANDROID APPS FOR INSURANCE SYSTEM
2040. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2041. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2042. ANDROID APPS FOR DOCTOR APPOINTMENT
2043. LIVE WEB DOCTOR CONSULTATION
2044. ANDROID APPS ON DOCTOR WITH NURSE
2045. HOSPITAL ANDROID APPS
2046. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2047. Fertilizer Management System -Java, JSP, MySQL
2048. Land Bank for Nursery -Java, JSP, MySQL
2049. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2050. FORMER APPS - ANDROID
2051. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2052. Online Banking with Fraud Detecting- Java JSP, MySQL
2053. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2054. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2055. Big Scholarly Data: A Survey
2056. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved