Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) NEW TECHNOLOGY-HELP VIDEO BLOCK CHAIN TECH - BITCOIN
R - DATA SCIENCE - ML WEKA-Machine Learning Internet of things (IoT) BIG DATA - HADOOP PROJECTS
BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB PhD Projects JOBS CONSULTANCY - SOFT SKILLS
JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID
ANDOROID JSON PHP ANDROID APPS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects ASP.NET MVC Framework JAVA IEEE LATEST JAVA IEEE 2016-17
Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects
IEEE 2011-2012 Java Project Dot Net IEEE 2017-18 ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18
RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects
IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects Java Application Projects
Dotnet Application Projects Dotnet Mini Projects Struts Application Projects Java Mini Projects
SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS
BANKING PROJECTS RESTful Web services
 
PYTHON PROJECT - IEEE
MORE PYTHON IEEE
1. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
2. Opinion Mining using Ontological Spam Detection
3. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
4. Phishing Web Sites Features Classification
5. using data mining to predict hospital admissions from the emergency department
6. Correlated Matrix Factorization for Recommendation with Implicit Feedback
7. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
8. Currency Recognition System
PYTHON TRAINING WITH PROJECT
9. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
10. Opinion Mining using Ontological Spam Detection
11. Predicting the top-N popular videos via cross-domain hybrid model
12. Fraquent itemsets mining with differential privacy over large scale data
13. Phishing Web Sites Features Classification
14. Dynamic Facet Ordering for Faceted Product Search Engines
15. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
16. Machine Learning and Deep Learning Methods for Cybersecurity
17. Linear Regression Algorithm Predict the volution of Community in Future
18. A User-Centric Machine Learning Framework for Cyber Security Operations Center
19. Linear Regression Algorithm
20. A Machine Learning Approach to Routing
21. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
22. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
23. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
24. CYBER SECURITY
25. Automatic Sentiment Detection in Naturalistic Audio
26. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
27. Student Performance Analysis - PYTHON
28. E-assessment using image processing in ∞Exams
29. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
30. NLP - NATURAL LANGUAGE PROCESSING
31. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
32. Image Based Appraisal of Real Estate Properties-IEEE 2017
33. FOOD WASTE ORGANIZER
34. PYTHON PROJECT FLOW
35. PYTHON PROGRAM EXECUTION
36. PYTHON INSTALLATION
PYTHON APPLICATION
37. BOOK RECOMMENDATION SYSTEM PYTHON
38. Web Scraping Using PYTHON
39. MULTIMEDIA CONTENT PROTECTION
40. Student Performance Analysis - PYTHON
41. HOTEL MANAGEMENT
42. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
43. Speech Recognition in Social Care - NLP
44. Text-to-Speech (TTS)- NLP
45. Voice Scheduler - NLP
46. VOICE SEARCH ENGINE - NLP
47. LINEAR REGRESSION - PYTHON
48. LATENT DIRICHLET ALLOCATION
49. DIGITAL IMAGE PROCESSING - PYTHON
50. DECISION TREE LEARNING - ALGORITHM
51. NAIVE BAYES CLASSIFIER
52. K - MEANS CLUSTERING
53. Dengu Data Analysis Using R-program
54. Shopping Data set Analyse Using R Machine Learning
55. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
56. Polynomial Time Algorithm-PTA
57. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
58. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
59. K-Means For Clustering


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
60. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
61. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
62. NAIVE BAYES CLASSIFIER
63. K - MEANS CLUSTERING
64. LINEAR REGRESSION - PYTHON
65. LATENT DIRICHLET ALLOCATION
66. DIGITAL IMAGE PROCESSING - PYTHON
67. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
68. MACHINE LEARNING-ML ALGORITHM
69. WHAT IS MACHINE LEARNING - AI
70. NATURAL LANGAUAGE PROCESSING - NLP
71. VISION - Visual Data


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
72. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
73. R - ADVANCE IMAGE PROCESSING
74. Dengu Data Analysis Using R-program
75. Shopping Data set Analysis Using R Machine Learning
76. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
77. R PROGRAM TRAINING
78. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
79. COMAPRISON OF VARIOUS DOCKING SCORES
80. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
81. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
82. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
83. MICRO ARRAY GENE EXPRESSION ANALYSIS
84. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
85. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
86. Diabetics Dataset
87. Excercise Dataset
88. MEDICAL DATA ANALYSES
89. WEKA PRIVACY DATA SET ANALYSES


Internet of things (IoT)
IoT Projects
90. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
91. Who Moved My Data? Privacy Protection in Smartphones
92. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
93. IOT Projects
94. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
95. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
96. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
97. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
98. MRSIM: Mitigating Reducer Skew In MapReduce
99. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
100. HADOOP WITH HEALTHCARE DATA ANALYSYS
101. HADOOP WEBLOG DATA ANALYSES
102. BANK DATA ANALYTIC WITH HADOOP
103. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
104. Bucket Based Data Deduplication Technique for Big Data Storage System
105. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
106. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
107. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
108. Efficient Recommendation of De-identification Policies using MapReduce
109. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
110. Big Scholarly Data: A Survey
111. SocialQ&A: An Online Social Network Based Question and Answer System
112. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
113. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
114. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
115. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
116. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
117. User-Centric Similarity Search
118. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
119. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
120. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
121. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
122. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
123. Processing Incomplete k Nearest Neighbor Search
124. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
125. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
126. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
127. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
128. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
129. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
130. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
131. Deduplication on Encrypted Big Data in Cloud
132. Dynamic Resource Allocation for MapReduce with Partitioning Skew
133. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
134. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
135. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
136. Self-Healing in Mobile Networks with Big Data
137. Secure Sensitive Data Sharing on a Big Data Platform
138. Big Data, Big Knowledge: Big Data for Personalized Healthcare
139. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
140. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
141. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
142. Differentially Private Frequent Itemset Mining via Transaction Splitting
143. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
144. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
145. Fast Best-Effort Pattern Matching in Large Attributed Graphs


PhD Projects
Developing PhD proposal
146. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
147. Diabetics Dataset
148. MEDICAL DATA ANALYSES
149. R IEEE PROJECTS
150. PhD Project Guidance
151. PhD Projects


JOBS CONSULTANCY - SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
152. E-assessment using image processing in ∞Exams
153. NLP - NATURAL LANGUAGE PROCESSING
154. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
155. Dengu Data Analysis Using R-program
156. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
157. Big Scholarly Data: A Survey
158. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
159. Big Data, Big Knowledge Big Data for Personalized Healthcare
160. Deduplication on Encrypted Big Data in Cloud
161. Secure Sensitive Data Sharing on a Big Data Platform
162. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
163. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
164. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
165. Self-Healing in Mobile Networks with Big Data
166. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
167. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
168. Child Monitoring - ANDROID APPS
169. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
170. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
171. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
172. Developing Apps for visually imapired people: Lessons learned from social network
173. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
174. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
175. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
176. Design of secure location and message sharing system for android platform
177. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
178. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
179. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
180. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
181. Privacy Protection based Access Control Scheme in Cloud-based Services
182. Privacy-Preserving Selective Aggregation of Online User Behavior Data
183. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
184. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
185. FISHING DISASTER MANAGEMENT SYSTEM
186. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
187. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
188. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
189. Who Moved My Data? Privacy Protection in Smartphones
190. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
191. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
192. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
193. Privacy-Preserving Aggregate Queries for Optimal Location Selection
194. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
195. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
196. Efficient Clue-based Route Search on Road Networks
197. Privacy-Preserving Location-Proximity for Mobile Apps
198. Cooperative Query Answer Authentication
199. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
200. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
201. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
202. ZapDroid: Managing Infrequently Used Applications on Smartphones
203. Searching Trajectories by Regions of Interest
204. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
205. A Classroom Scheduling Service for Smart Classes
206. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
207. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
208. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
209. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
210. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
211. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
212. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
213. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
214. Authentication of Smartphone Users Using Behavioral Biometrics
215. An Exploration of Geographic Authentication Schemes
216. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
217. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
218. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
219. Distributed secret sharing approach with cheater prevention
220. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
221. Efficient privacy preserving location based query over outsourced encrypted data
222. Utilizing the Cloud to Store Hijacked Camera Images
223. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
224. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
225. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
226. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
227. Enabling privacy preserving location proof for mobile users.
228. Optimizing User Experience in Choosing Android Applications
229. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
230. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
231. FoodForCare: An Android Application for Self-Care with Healthy Food
232. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
233. Silence is Golden: Enhancing Privacy of Location-Based Services
234. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
235. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
236. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
237. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
238. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
239. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
240. Adapting to User Interest Drift for POI Recommendation
241. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
242. Developing Apps for visually imapired people: Lessons learned from social network
243. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
244. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
245. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
246. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
247. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
248. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
249. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
250. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
251. Mobile cloud support for semantic enriched speech recognition in social care
252. Distributing secret sharing approach with cheater prevention based on QR code
253. Design of Secure Location and Message Sharing System for Android Platform
254. The impact of cloud technology on the automation of businesses
255. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
256. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
257. Rescue Management System
258. Android Army - Military Apps
259. Android Beauty Parlor
260. Android E Municipality
261. ANDROID NURSE AID
262. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
263. Human Resource (HR)- APPS
264. GPS Employee Tracking System
OUR MODERN SOCITY
265. GENERIC MEDICINE
266. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
267. RECYCLE APP WASTE COLLECTION REUSE
268. Bikes Rental - APPS
269. Location Based Alarm - GPS
270. ANDROID APPS FOR INSURANCE SYSTEM
271. BUDGET HOME DESIGN -ANDROID APPS
272. Former To Former Apps
273. Pets Care
ONLINE CONSUMERS PROCESSING
274. House Hold Appliancies Warranty Management
275. GPS Transport Packers and Movers
Android Apps
276. MY LIBRARY
277. FACULTY RATING SYSTEM
278. App for self organizer
279. ONLINE DOCTOR APPOINTMENT
280. Conference Event Mobile Assistant
281. Mobile Prescription
282. Metastore Application
283. Android SmartCampus
284. Android Shopping Mall
285. TOLL GATE -Barcode Billing System --ANDROID
286. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
287. Taste Hunt For Restaurants
288. POLICE APPS
289. Android Blood Bank
290. Mobile Expense Claim System Android
291. Android Intelligent Time Tracking System TICK
292. Android Course and Attendance Management System
293. Android Event Reminder
294. Android Attendance Assessment
295. Android Advance Shopping
296. Android CAR POOLING
297. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
298. Android HOSPITAL
299. ATHLETE MEET GUIDE
300. Android Apps PARKING MANAGER
301. Love and Care
302. Food Waste Management System
303. Travel Guide
304. Android Provisional Store
305. Best Baby Care with Vaccines Remainder
306. Android Assist for Lecturer and Student
307. Android Personal Assistance (PA)
308. Android Application for College Management System
309. Tollgate Payment system in android
310. Intelligence Quotient (IQ) Test
311. GPS LOCATION ALARM SYSTEM
312. Location Based Intelligent Mobile Organizer
313. BANK ACCOUNT TRACKER FOR ANDROID
314. UNIT CONVERTER
315. Tips and Tax Calculator in Android
316. TEXT EDITOR FOR ANDROID
317. Student Attendance Tracking System
318. Smart Money With Daily Expenses
319. Simple And Secure Android TO DO List Application
320. Restaurant Table Order Management System
321. Online Shopping
322. Online Examination System For Android
323. ANDROID SHOPPING LOCATION IDENTIFIER
324. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
325. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
326. MICRO CREDIT BANKING ON SMARTPHONE
327. LOCATION BASED ALARM
328. Insurance in android
329. GOOGLE PLACE FINDER
330. Friend Mapper on Mobiles - Friend Locator
331. EXPENSE MANAGER
332. Employee Diractory
333. Online job search
334. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
335. ANDROID STUDENT RESULT ANALYZING SYSTEM
336. CloudMoV : Cloud-based Mobile Social TV
337. Bus Reservation
338. Budget Planner
339. Android SMS Systems
340. ANDROID LEAVE MANAGEMENT SYSTEM
341. ANDROID EVENT SCHEDULER/REMINDER
342. Android Grocery Shopping List
343. Android Attack Application
344. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
345. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
346. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
347. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
348. Optimizing Display Advertising Markets
349. Using Knowledge Libraries to Transfer Expert Knowledge
350. Semantic Retrieval of Trademarks Based on Conceptual Similarity
351. Understanding and Predicting Question Subjectivity in Social Question and Answering
352. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
353. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
354. Fast Top-K Path-based Relevance Query on Massive Graphs
355. Web Image Search Re-ranking with Click-based Similarity and Typicality
356. Automatically Mining Facets for Queries from Their Search Results
357. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
358. Statistical Entity Extraction from Web
359. Question Answering System for an Effective Collaborative Learning
360. Lost in Translation: Improving Decoy Documents via Automated Translation
361. Learn to Personalized Image Search from the Photo Sharing Websites
362. In Tags We Trust Trust modeling in social tagging of multimedia content
363. Efficient Anonymous Message Submission
364. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
365. Employment Knowledge Database
366. Organise Corporate Training For Client Project s
367. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
368. ONLINE VEHICLE SHOWROOM SYSTEMS
369. Online Voting
370. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
371. School Management System
372. Secure Online Course Automation
373. School Automation System
374. Online Aquarum
375. Web Direct Recruitment Analysis
PHP Apps
376. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
377. TRADE / INDUSTRY WEB PORTAL
378. Feeding the poor from the supermarket
379. Application for recording your goals and habits
380. VISUAL WAY TO RAISE AWARENESS
381. Municipal Corporation
382. Online Polling For Publishers And Brands
383. Avoid Food Wastage
384. Web Doctor
385. ONLINE FOOD ORDERING SYSTEM
386. E-Tendering
387. Improving Rural Communities
388. Green Planet Awarness
389. Development of an Online Course Portal for a campus
390. Auxon Test
391. WEB BASED LEARNING SYSTEM
392. Tagging in online social networks
393. Secured file Downloading system
394. Cryptonite : A Secure and Performant Data Repository on Public Clouds
395. searching a image from websites
396. Online University
397. Online product Opinion and Ranking System
398. MNC LEAVE MANAGEMENT SYSTEM
399. Home appliances online purchase
400. Freelancer Job
401. E-Tutor Online Jobs
402. Statistical Entity Extraction from Web
403. Effective Collaborative Learning
404. Development of an e-Post Office System
405. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
406. Towards Effective Bug Triage with Software Data Reduction Techniques
407. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
408. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
409. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
410. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
411. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
412. Proof of retrievability with public verifiability resilient against related-key attacks
413. Secure Anonymous Key Distribution Scheme for Smart Grid
414. Converses For Secret Key Agreement and Secure Computing
415. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


JAVA IEEE LATEST
IEEE Transactions on Big Data
416. Improving Instance Selection Methods for Big Data Classification
417. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
418. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
419. A Web Service Discovery Approach Based on Common Topic Groups Extraction
420. Dynamic Facet Ordering for Faceted Product Search Engines
421. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
422. Flexible Wildcard Searchable Encryption System
423. QoS Recommendation in Cloud Services
424. Securing Aggregate Queries for DNA Databases
425. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
426. A robust reputation management mechanism in the federated cloud
427. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
428. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
429. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
430. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
431. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
432. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
433. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
434. Energy-efficient Query Processing in Web Search Engines
435. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
436. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
437. BiRank: Towards Ranking on Bipartite Graphs
438. QoS Recommendation in Cloud Services
439. Public Interest Analysis Based on Implicit Feedback of IPTV Users
440. Search Rank Fraud and Malware Detection in Google Play
441. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
442. Influence Maximization in Trajectory Databases
443. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
444. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
445. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
446. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
447. Computing Semantic Similarity of Concepts in Knowledge Graphs
448. QDA: A Query-Driven Approach to Entity Resolution
449. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
450. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
451. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
452. CONTENT BASED IMAGE RETRIEVAL
453. Identifying At Risk Students for Early Interventions A Time Series Clustering
454. Two Layer Clustering model for Mobile Customer Analysis
455. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
456. Consumer oriented web services ranking and classification
457. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
458. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
459. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
460. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
461. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
462. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
463. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
464. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
465. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
466. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
467. Two-Factor Data Security Protection Mechanism for Cloud Storage System
468. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
469. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
470. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
471. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
472. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
473. Where You Are Is Who You Are User Identification by Matching Statistics
474. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
475. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
476. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
477. Online Subgraph Skyline Analysis Over Knowledge Graphs
478. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
479. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
480. ID2S Password-Authenticated Key Exchange Protocols
481. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
482. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
483. Classification model to predict the learners' academic performance using big data
484. Electronic Commerce Meets the Semantic Web
485. Mining High Utility Patterns in One Phase without Generating Candidates
486. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
487. Automatic Generation of Social Event Storyboard from Image Click-through Data
488. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
489. Understanding Deep Representations Learned in Modeling Users Likes
490. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
491. Topic-Oriented Exploratory Search Based on an Indexing Network
492. Relevance Feedback Algorithms Inspired By Quantum Detection
493. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
494. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
495. Efficiently Estimating Statistics of Points of Interests on Maps
496. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
497. Aspect-level Influence Discovery from Graphs
498. Sentiment Embeddings with Applications to Sentiment Analysis
499. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
500. Resolving Multi-party Privacy Conflicts in Social Media
501. Encrypted Data Management with Deduplication in Cloud Computing
502. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
503. Crawling Hidden Objects with kNN Queries
504. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
505. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
506. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
507. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
508. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
509. Nearest Keyword Set Search in Multi-dimensional Datasets
510. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
511. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
512. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
513. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
514. Immutable Authentication and Integrity Schemes for Outsourced Databases
515. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
516. Server-Aided Public Key Encryption with Keyword Search
517. Online Learning in Large-Scale Contextual Recommender Systems
518. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
519. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
520. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
521. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
522. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
523. Multi-Modal Event Topic Model for Social Event Analysis
524. Social friend recommendation on multiple network correlation
525. Tag Based Image Search by Social Re-ranking
526. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
527. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
528. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
529. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
530. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
531. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
532. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
533. Rank-Based Similarity Search: Reducing the Dimensional Dependence
534. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
535. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
536. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
537. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
538. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
539. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
540. On the Security of data access control for multiauthority cloud storage system
541. Trust-based Service Management for Social Internet of Things Systems
542. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
543. Formalization and Verification of Group Behavior Interactions
544. Group Key Agreement with Local Connectivity
545. Data Lineage in Malicious Environments
546. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
547. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
548. Enabling Cloud Storage Auditing with Key-Exposure Resistance
549. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
550. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
551. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
552. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
553. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
554. Quantitative Reasoning About Cloud Security Using Service Level Agreements
555. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
556. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
557. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
558. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
559. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
560. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
561. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
562. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
563. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
564. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
565. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
566. Enabling Cloud Storage Auditing with Key-Exposure Resistance
567. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
568. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
569. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
570. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
571. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
572. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
573. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
574. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
575. Secure Auditing and Deduplicating Data in Cloud
576. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
577. Towards reproducibility in online social network Research
578. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
579. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
580. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
581. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
582. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
583. Making Digital Artifacts on the Web Verifiable and Reliable
584. Anonymizing Collections of Tree-Structured Data
585. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
586. FOCS: Fast Overlapped Community Search
587. Sparsity Learning Formulations for Mining Time-Varying Data
588. The Impact of View Histories on Edit Recommendations
589. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
590. Discovery of Ranking Fraud for Mobile Apps
591. Towards Effective Bug Triage with Software Data Reduction Techniques
592. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
593. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
594. Auditing for Distributed Storage Systems
595. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
596. Uploader Intent for Online Video: Typology, Inference and Applications
597. YouTube Video Promotion by Cross-network
598. Semantic-Improved Color Imaging Applications: It Is All About Context
599. Geolocalized Modeling for Dish Recognition
600. Learning to Rank Image Tags with Limited Training Examples
601. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
602. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
603. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
604. Tracking Temporal Community Strength in Dynamic Networks
605. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
606. Towards Information Diffusion in Mobile Social Networks
607. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
608. An Efficient Privacy-Preserving Ranked Keyword Search Method
609. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
610. Dispersing Instant Social Video Service Across Multiple Clouds
611. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
612. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
613. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
614. A Computational Dynamic Trust Model for User Authorization
615. Secure Distributed Deduplication Systems with Improved Reliability
616. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
617. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
618. Leveraging the Tail Time for Saving Energy in Cellular Networks
619. Keylogging-resistant Visual Authentication Protocols
620. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
621. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
622. Preserving Location Privacy in Geo-Social Applications
623. Efficient Authentication for Mobile and Pervasive Computing
624. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
625. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
626. Typicality-Based Collaborative Filtering Recommendation
627. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
628. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
629. Keyword Search Over Probabilistic RDF Graphs
630. Efficient Prediction of Difficult Keyword Queries over Databases
631. Interpreting the Public Sentiment Variations on Twitter
632. An Efficient Recommendation Method for Improving Business Process Modeling
633. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
634. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
635. On the use of Side Information for Mining Text Data
636. Privacy Preserving and Content Protecting Location based Queries
637. Fast Nearest Neighbor Search with Keywords
638. Towards Differential Query Services in Cost-Efficient Clouds
639. Facilitating Document Annotation using Content and Querying Value
640. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
641. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
642. Secure Outsourced Attribute-Based Signatures
643. Supporting Privacy Protection in Personalized Web Search
644. Dealing With Concept Drifts in Process Mining
645. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
646. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
647. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
648. Active Learning of Constraints for Semi-Supervised Clustering
649. Best Keyword Cover Search
650. Personalized Recommendation Combining User Interest and Social Circle
651. Online Feature Selection and Its Applications
652. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
653. Incremental Affinity Propagation Clustering Based on Message Passing
654. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
655. Secure kNN Query Processing in Untrusted Cloud Environments
656. Malware Propagation in Large-Scale Networks
657. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
658. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
659. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
660. Efficient Ranking on Entity Graphs with Personalized Relationships
661. Task Trail: An Effective Segmentation of User Search Behavior
662. Privacy-Preserving Enhanced Collaborative Tagging
663. XSPath Navigation on XML Schemas Made Easy
664. Security Evaluation of Pattern Classifiers under Attack
665. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
666. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
667. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
668. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
669. Nothing is for Free: Security in Searching Shared and Encrypted Data
670. SocialTube: P2P-assisted Video Sharing in Online Social Networks
671. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
672. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
673. Behavioral Malware Detection in Delay Tolerant Networks
674. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
675. Private Searching on Streaming Data Based on Keyword Frequency
676. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
677. On the Security of Trustee-Based Social Authentications
678. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
679. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
680. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
681. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
682. A Two-stage Deanonymization Attack Against Anonymized Social Networks
683. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
684. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
685. Scalable architecture for multi-user encrypted SQL operations on cloud database services
686. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
687. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
688. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
689. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
690. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
691. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
692. Secure kNN Query Processing in Untrusted Cloud Environments
693. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
694. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
695. A Hybrid Cloud Approach for Secure Authorized Deduplication
696. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
697. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
698. A Novel Model for Competition and Cooperation Among Cloud Providers
699. CLOUDQUAL: A Quality Model for Cloud Services
700. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
701. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
702. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
703. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
704. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
705. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
706. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
707. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
708. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
709. Enhanced Security for Association Rule Mining to secure Transactional Databases
710. Operational Pattern Revealing Technique in Text Mining
711. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
712. Personalized web search using Browsing history and domain Knowledge
713. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
714. Data Security the Challenge of Cloud Computing
715. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
716. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
717. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
718. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
719. User Action Interpretation for Online Content Optimization
720. Spatial Query Integrity with Voronoi Neighbors
721. Spatial Approximate String Search
722. Sensitive Label Privacy Protection on Social Network Data
723. Secure Mining of Association Rules in Horizontally Distributed Databases
724. Secure Logging As a Service Delegating Log Management to the Cloud
725. Robust Module-based Data Management
726. Ranking on Data Manifold with Sink Points
727. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
728. Privacy-Enhanced Web Service Composition
729. Privacy against Aggregate Knowledge Attacks
730. Preventing Private Information Inference Attacks on Social Networks
731. PMSE: A Personalized Mobile Search Engine
732. Personalized QoS-Aware Web Service Recommendation and Visualization
733. Optimal Client-Server Assignment for Internet Distributed Systems
734. Online Search and Buying Behaviour in Consumer Markets
735. M-Privacy for Collaborative Data Publishing
736. Mining User Queries with Markov Chains: Application to Online Image Retrieval
737. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
738. Incentive Compatible Privacy-Preserving Data Analysis
739. Improving Security and Efficiency in Attribute-Based Data Sharing
740. FoCUS: Learning to Crawl Web Forums
741. Fast Nearest Neighbor Search with Keywords
742. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
743. Facilitating Effective User Navigation through Website Structure Improvement
744. Facilitating Document Annotation using Content and Querying Value
745. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
746. Efficient Evaluation of SUM Queries over Probabilistic Data*
747. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
748. Dynamic Query Forms for Database Queries
749. Dynamic Personalized Recommendation on Sparse Data
750. Distributed Strategies for Mining Outliers in Large Data Sets
751. Crowdsourcing Predictors of Behavioral Outcomes
752. Co-Occurrence-Based Diffusion for Expert Search on the Web
753. Comparable Entity Mining from Comparative Questions
754. CloudMoV: Cloud-based Mobile Social TV
755. Anomaly Detection via Online Oversampling Principal Component Analysis
756. Anomaly Detection Approach Using Hidden Markov Model
757. Annotating Search Results from Web Databases
758. A System to Filter Unwanted Messages from OSN User Walls
759. A Survey of XML Tree Patterns
760. A Probabilistic Approach to String Transformation
761. A New Algorithm for Inferring User Search Goals with Feedback Sessions
762. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
763. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
764. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
765. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
766. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
767. Towards Differential Query Services in Cost-Efficient Clouds
768. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
769. SocialTube: P2P-assisted Video Sharing in Online Social Networks
770. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
771. QoS Ranking Prediction for Cloud Services
772. Priority-Based Consolidation of Parallel Workloads in the Cloud
773. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
774. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
775. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
776. Load Rebalancing for Distributed File Systems in Clouds
777. Label-Embedding for Attribute-Based Classification
778. IP-Geolocation Mapping for Moderately Connected Internet Regions
779. Identity-Based Secure Distributed Data Storage Schemes
780. Hint-based Execution of Workloads in Clouds with Nefeli
781. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
782. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
783. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
784. Efficient Two-Server Password-Only Authenticated Key Exchange
785. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
786. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
787. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
788. Winds of Change: From Vendor Lock-In to the Meta Cloud
789. Supporting the Migration of Applications to the Cloud through a Decision Support System
790. Storing Shared Data on the Cloud via Security-Mediator
791. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
792. Privacy-Preserving Public Auditing for Secure Cloud Storage
793. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
794. Outsourcing Privacy-Preserving Social Networks to a Cloud
795. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
796. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
797. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
798. Efficient Security Solution for Privacy-Preserving Cloud Services
799. Collaboration in Multicloud Computing Environments: Framework and Security Issues
800. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
801. Cloud-based DDoS Attacks and Defenses
802. Cloud computing for mobile users can offloading compution save energy
803. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
804. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
805. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
806. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
807. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
808. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
809. Two tales of privacy in online social networks
810. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
811. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
812. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
813. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
814. Security and Privacy-Enhancing Multicloud Architectures
815. Security Using Colors and Armstrong Numbers
816. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
817. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
818. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
819. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
820. Privacy Preserving Data Analytics for Smart Homes
821. On Inference-Proof View Processing of XML Documents
822. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
823. Extracting Spread-Spectrum Hidden Data from Digital Media
824. Efficiently Outsourcing Multiparty Computation under Multiple Keys
825. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
826. Craigslist Scams and Community Composition: Investigating Online Fraud
827. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
828. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
829. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
830. Super-Resolution-based Inpainting
831. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
832. Image Authentication Using Stochastic Diffusion
833. Hierarchical Super-Resolution-Based Inpainting
834. Circular Reranking for Visual Search
835. Bootstrapping Visual Categorization With Relevant Negatives
836. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
837. An extended visual cryptography scheme without pixel expansion for halftone images
838. An Adaptive Cloud Downloading Service
NETWORKING
839. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
840. Topological Conditions for In-Network Stabilization of Dynamical Systems
841. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
842. Price Differentiation for Communication Networks
843. Participatory Privacy: Enabling Privacy in Participatory Sensing
844. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
845. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
846. On the Role of Mobility for Multi-message Gossip
847. Fully Anonymous Profile Matching in Mobile Social Networks
848. Fault Node Recovery Algorithm for a Wireless Sensor Network
849. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
850. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
851. Access Policy Consolidation for Event Processing Systems
852. A Fast Re-Route Method
SOFTWARE ENGINEERING
853. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
854. Vampire attacks: Draining life from wireless ad-hoc sensor networks
855. Towards a Statistical Framework for Source Anonymity in Sensor Networks
856. Search Me If You Can: Privacy-preserving Location Query Service
857. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
858. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
859. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
860. Distributed Cooperative Caching in Social Wireless Networks
861. Community-Aware Opportunistic Routing in Mobile Social Networks
862. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
863. The Devils Behind Web Application Vulnerabilities
864. Security Architecture for Cloud Networking
865. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
866. Secure Overlay Cloud Storage with Access Control and Assured Deletion
867. Risk-Aware Mitigation for MANET Routing Attacks
868. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
869. Privacy-preserving Enforcement of Spatially Aware RBAC
870. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
871. pCloud: A Distributed System for Practical PIR
872. Packet-Hiding Methods for Preventing Selective Jamming Attacks
873. Online Modeling of Proactive Moderation System for Auction Fraud Detection
874. Fast and accurate annotation of short texts with Wikipedia pages
875. FADE: Secure Overlay Cloud Storage with File Assured Deletion
876. Ensuring Distributed Accountability for Data Sharing in the Cloud
877. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
878. Direct and Indirect Discrimination Prevention Methods
879. Detecting Spam Zombies by Monitoring Outgoing Messages
880. Detecting Anomalous Insiders in Collaborative Information Systems
881. Data-Provenance Verification For Secure Hosts
882. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
883. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
884. Payments for Outsourced Computations
885. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
886. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
887. Toward Private Joins on Outsourced Data
888. Statistical Entity Extraction from Web
889. Slicing: A New Approach to Privacy Preserving Data Publishing
890. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
891. Resilient Identity Crime Detection
892. Ranking Model Adaptation for Domain-Specific Search
893. Organizing User Search Histories
894. On the Spectral Characterization and Scalable Mining of Network Communities
895. Multiparty Access Control for Online Social Networks: Model and Mechanisms
896. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
897. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
898. How do Facebookers use Friendlists
899. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
900. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
901. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
902. Enabling Multilevel Trust in Privacy Preserving Data Mining
903. Enabling cross-site interactions in social networks
904. Efficient Similarity Search over Encrypted Data
905. Efficient Extended Boolean Retrieval
906. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
907. Efficient Anonymous Message Submission
908. Effective Pattern Discovery for Text Mining
909. DDD: A New Ensemble Approach for Dealing with Concept Drift
910. Credibility Ranking of Tweets during High Impact Events
911. Creating Evolving User Behavior Profiles Automatically
912. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
913. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
914. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
915. Anomaly Detection for Discrete Sequences: A Survey
916. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
917. Advance Mining of Temporal High Utility Itemset
918. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
919. Reliable Re-encryption in Unreliable Clouds
920. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
921. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
922. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
923. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
924. Gossip-based Resource Management for Cloud Environments
925. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
926. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
927. Cloud Data Protection for the Masses
928. Cloud Computing Security: From Single to Multi-Clouds
929. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
930. In Tags We Trust Trust modeling in social tagging of multimedia content
931. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
932. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
933. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
934. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
935. Cut Detection in Wireless Sensor Networks
936. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
937. TrickleDNS: Bootstrapping DNS Security using Social Trust
938. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
939. Policy-by-Example for Online Social Networks
940. Packet Loss Control Using Tokens at the Network Edge
941. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
942. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
943. Independent Directed Acyclic Graphs for Resilient Multipath Routing
944. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
945. Game-Theoretic Pricing for Video Streaming in Mobile Networks
946. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
947. Auditing for Network Coding Storage
948. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
949. Privacy Preserving Cloud Data Access With Multi-Authorities
950. Movie Rating and Review Summarization in Mobile Environment
951. IDSaaS: Intrusion Detection System as a Service in Public Clouds
952. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
953. BibPro: A Citation Parser Based on Sequence Alignment Techniques
954. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
955. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
956. RITAS: Services for Randomized Intrusion Tolerance
957. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
958. Nymble: Blocking Misbehaving Users in Anonymizing Networks
959. Modeling and Detection of Camouflaging Worm
960. Coding for Cryptographic Security Enhancement using Stopping Sets
961. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
962. Wireless Sensor Network Security model using Zero Knowledge Protocol
963. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
964. Throughput Optimization in Mobile Backbone Networks
965. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
966. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
967. Fast Data Collection in Tree-Based Wireless Sensor Networks
968. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
969. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
970. SPAF: Stateless FSA-based Packet Filters
971. Selfish Overlay Network Creation and Maintenance
972. ProgME: Towards Programmable Network MEasurement
973. Locating Equivalent Servants over P2P Networks
974. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
975. Buffer Sizing for 802.11 Based Networks
976. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
977. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
978. Improving Utilization of Infrastructure Clouds
979. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
980. CloudTPS: Scalable Transactions for Web Applications in the Cloud
981. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
982. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
983. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
984. Ranking Spatial Data by Quality Preferences
985. Making Aggregation Work in Uncertain and Probabilistic Databases
986. Load Shedding in Mobile Systems with MobiQual
987. Group Enclosing Queries
988. Extended XML Tree Pattern Matching: Theories and Algorithms
989. Effective Navigation of Query Results Based on Concept Hierarchies
990. Discovering Conditional Functional Dependencies
991. Decision Trees for Uncertain Data
992. Data Leakage Detection
993. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
994. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
995. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
996. Privacy Protection based Access Control Scheme in Cloud-based Services
997. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
998. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
999. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1000. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1001. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1002. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1003. Explaining Missing Answers to Top-k SQL Queries
1004. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1005. Continuous Top-k Monitoring on Document Streams
1006. Generating Query Facets using Knowledge Bases
1007. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1008. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1009. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1010. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1011. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1012. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1013. Generating Query Facets using Knowledge Bases
1014. Private Over-threshold Aggregation Protocols over Distributed Datasets
1015. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1016. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1017. Privacy Protection based Access Control Scheme in Cloud-based Services
1018. Dynamic Facet Ordering for Faceted Product Search Engines
1019. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1020. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1021. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1022. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1023. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1024. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1025. A Recommendation System to Facilitate Business Process Modeling
1026. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1027. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1028. User Differentiated Verifiable File Search on the Cloud
1029. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1030. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1031. Incremental Consolidation of Data-Intensive Multi-flows
1032. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1033. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1034. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1035. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1036. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1037. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1038. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1039. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1040. TagBook: A Semantic Video Representation without Supervision for Event Detection
1041. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1042. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1043. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1044. The Impact of Review Environment on Review Credibility
1045. Private Over-threshold Aggregation Protocols over Distributed Datasets
1046. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1047. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1048. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1049. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1050. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1051. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1052. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1053. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1054. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1055. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1056. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1057. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1058. What Is Happening in The Video Annotate Video by Sentence
1059. Two level QR code for private message sharing and document authentication.
1060. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1061. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1062. Mining Health Examination Records A Graph-based Approach
1063. A Credibility Analysis System for Assessing Information on Twitter
1064. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1065. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1066. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1067. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1068. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1069. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1070. Predicting Personalized Image Emotion Perceptions in Social Networks
1071. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1072. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1073. Explaining Missing Answers to Top-k SQL Queries
1074. Bilevel Feature Extraction Based Text Mining
1075. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1076. Privacy-Preserving Outsourced Media Search
1077. Modeling and Verification of Online Shopping Business Processes
1078. User Preference Learning for Online Social Recommendation
1079. Steganalysis Features for Content-Adaptive JPEG Steganography
1080. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1081. PiCode: a New Picture-Embedding 2D Barcode
1082. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1083. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1084. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1085. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1086. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1087. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1088. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1089. Cloud workflow scheduling with deadlines and time slot availability
1090. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1091. Path-Based Epidemic Spreading in Networks
1092. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1093. On the Resiliency of Static Forwarding Tables
1094. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1095. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1096. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1097. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1098. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1099. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1100. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1101. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1102. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1103. Hacking is not random: a case-control study of webser ver-compromise risk
1104. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1105. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1106. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1107. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1108. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1109. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1110. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1111. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1112. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1113. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1114. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1115. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1116. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1117. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1118. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1119. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1120. Cross-Domain Feature Learning in Multimedia
1121. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1122. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1123. Saliency-based color accessibility
1124. Contextual Online Learning for Multimedia Content Aggregation
1125. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1126. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1127. An Attribute-assisted Reranking Model for Web Image Search
1128. RRW - A Robust and Reversible Watermarking
1129. Steganography Using Reversible Texture Synthesis
1130. Single Image Super-Resolution Based on Gradient Profile Sharpness
1131. Detection and Rectification of Distorted Fingerprints
1132. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1133. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1134. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1135. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1136. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1137. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1138. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1139. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1140. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1141. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1142. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1143. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1144. Authenticated Key Exchange Protocols for Parallel Network File Systems
1145. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1146. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1147. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1148. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1149. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1150. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1151. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1152. Context-based Diversification for Keyword Queries over XML Data
1153. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1154. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1155. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1156. Tweet Segmentation and Its Application to Named Entity Recognition
1157. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1158. Automatic Group Happiness Intensity Analysis
1159. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1160. Query Aware Determinization of Uncertain Objects
1161. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1162. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1163. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1164. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1165. Efficient Community Formation for Web Services
1166. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1167. Secure Mining of Association Rules in Hor izontally Distributed Databases
1168. Dynamic Query Forms for Database Queries
1169. Secure kNN Query Processing in Untrusted Cloud Environments
1170. An Empirical Performance Evaluation of Relational Keyword Search Systems
1171. Keyword Query Routing
1172. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1173. Demand Bidding Program and Its Application in Hotel Energy Management
1174. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1175. Incremental Detection of Inconsistencies in Distributed Data
1176. A Cocktail Approach for Travel Package Recommendation
1177. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1178. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1179. Analysis of Field Data on Web Security Vulnerabilities
1180. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1181. A Reliability Improvement Method for SOA-Based Applications
1182. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1183. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1184. Web Service Recommendation via Exploiting Location and QoS Information
1185. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1186. Exploiting Rateless Codes in Cloud Storage Systems
1187. COMIC:Cost Optimization for Internet Content Multihoming
1188. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1189. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1190. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1191. Uniform Embedding for Efficient JPEG Steganography
1192. Secure Deduplication with Efficient and Reliable Convergent Key Management
1193. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1194. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1195. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1196. Location Aware Keyword Query Suggestion Based on Document Proximity
1197. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1198. A secure data self-destructing scheme in cloud computing
1199. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1200. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1201. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1202. Secure kNN Query Processing in Untrusted Cloud Environments
1203. Exploiting Rateless Codes in Cloud Storage Systems
1204. Fuzzy Authorization for Cloud Storage
1205. Planning vs. dynamic control Resource allocation in corporate clouds
1206. Automatic Scaling of Internet Applications for Cloud Computing Services
1207. Strategy-proof Pricing for Cloud Service Composition
1208. Privacy Preserving Delegated Access Control in Public Clouds
1209. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1210. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1211. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1212. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1213. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1214. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1215. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1216. A Scientometric Analysis of Cloud Computing Literature
1217. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1218. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1219. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1220. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1221. FeatureMatch: A General ANNF Estimation Technique and its Applications
1222. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1223. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1224. As-Projective-As-Possible Image Stitching with Moving DLT
1225. Sharing Visual Secrets in Single Image Random Dot Stereograms
1226. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1227. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1228. A New Iterative Triclass Thresholding Technique in Image Segmentation
1229. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1230. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1231. An Iranian License Plate Recognition System Based on Color Features
1232. Learning Layouts for Single-Page Graphic Designs
1233. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1234. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1235. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1236. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1237. Fingerprint Compression Based on Sparse Representation
1238. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1239. LBP-Based Edge-Texture Features for Object Recoginition
1240. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1241. Toward Experiential Mobile Media Processing
1242. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1243. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1244. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1245. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1246. Designing Truthful Spectrum Double Auctions with Local Markets
1247. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1248. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1249. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1250. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1251. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1252. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1253. A Study on Clinical Prediction Using Data Mining Techniques
1254. Online Payment System using Steganography and Visual Cryptography
1255. Efficient Instant-Fuzzy Search with Proximity Ranking
1256. Attribute Based Encryption with Privacy Preserving In Clouds
1257. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1258. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1259. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1260. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1261. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1262. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1263. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1264. The Target Tracking in Mobile Sensor Networks
1265. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1266. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1267. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1268. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1269. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1270. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1271. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1272. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1273. SUSIE: Search Using Services and Information Extraction
1274. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1275. Secure Mining of Association Rules in Horizontally Distributed Databases
1276. Sampling Online Social Networks
1277. Privacy Preserving Delegated Access Control in Public Clouds
1278. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1279. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1280. Ginix : Generalized Inverted Index for Keyword Search
1281. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1282. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1283. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1284. Dynamic Query Forms for Database Queries
1285. Cost-Based Optimization of Service Compositions
1286. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1287. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1288. Automatic Extraction of Top-k Lists from the Web
1289. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1290. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1291. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1292. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1293. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1294. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1295. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1296. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1297. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1298. Privacy Preserving Data Sharing With Anonymous ID Assignment
1299. Non-Cooperative Location Privacy
1300. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1301. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1302. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1303. Cloud based emails boundaries and vulnerabilities
1304. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1305. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1306. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1307. Optimal Content Downloading in Vehicular Networks
1308. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1309. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1310. View-invariant action recognition based on Artificial Neural Networks
1311. User-aware Image Tag Refinement via Ternary Semantic Analysis
1312. Separable Reversible Data Hiding in Encrypted Image
1313. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1314. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1315. Robust Face-Name Graph Matching for Movie Character Identification
1316. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1317. Improving Color Constancy by Photometric Edge Weighting
1318. Exploring the design space of social network-based Sybil defenses
1319. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1320. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1321. AnnoSearch: Image Auto-Annotation by Search
1322. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1323. Scalable Scheduling of Updates in Streaming Data Warehouses
1324. Scalable Learning of Collective Behavior
1325. Ranking Model Adaptation for Domain-Specific Search
1326. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1327. Outsourced Similarity Search on Metric Data Assets
1328. Organizing User Search Histories
1329. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1330. Mining Web Graphs for Recommendations
1331. Joint Top K Spatial Keyword Query Processing
1332. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1333. Identifying Content for Planned Events Across Social Media Sites
1334. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1335. Generative Models for Item Adoptions Using Social Correlation
1336. Efficient Data Mining for XML Queries Answering Support
1337. Efficient audit service outsourcing for data integrity in clouds
1338. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1339. Effective Pattern Discovery for Text Mining
1340. Combined Mining: Discovering Informative Knowledge in Complex Data
1341. Decentralized Probabilistic Text Clustering
1342. Computing Structural Statistics by Keywords in Databases
1343. Bridging Social and Data Networks
1344. Answering General Time-Sensitive Queries
1345. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1346. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1347. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1348. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1349. Resource-Aware Application State Monitoring
1350. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1351. Query Access Assurance in Outsourced Databases
1352. Linear and Differential Cryptanalysis
1353. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1354. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1355. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1356. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1357. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1358. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1359. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1360. ROAuth: Recommendation Based Open Authorization
1361. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1362. Recommendation Models for Open Authorization
1363. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1364. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1365. On Privacy of Encrypted Speech Communications
1366. OAuth Web Authorization Protocol
1367. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1368. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1369. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1370. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1371. Fast Matrix Embedding by Matrix Extending
1372. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1373. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1374. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1375. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1376. Measuring Code Quality to Improve Specification Mining
1377. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1378. Towards Secure and Dependable Storage Services in Cloud Computing
1379. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1380. Remote Display Solutions for Mobile Cloud Computing
1381. Privacy Preserving Delegated Access Control in Public Clouds
1382. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1383. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1384. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1385. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1386. Load-Balancing Multipath Switching System with Flow Slice
1387. Assessing the Veracity of Identity Assertions via OSNs
1388. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1389. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1390. A New Cell-Counting-Based Attack Against Tor
1391. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1392. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1393. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1394. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1395. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1396. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1397. Fast Release Capture Sampling in Large-Scale Sensor Networks
1398. Cooperative download in vehicular environments
1399. Cooperative Data Dissemination via Roadside WLANs
1400. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1401. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1402. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1403. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1404. Hiding Sensitive Association Rule for Privacy Preservation
1405. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1406. Development of Certificate Authority Services for Web Applications
1407. Detecting and Validating Sybil Groups in theWild
1408. Association Rule Extracting Knowledge Using Market Basket Analysis
1409. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1410. Valuable Detours: Least-Cost Anypath Routing
1411. Self-Reconfigurable Wireless Mesh Networks
1412. Reliability in Layered Networks with Random Link Failures
1413. NABS:Novel Approaches for Biometric Systems
1414. Live Streaming with Receiver-based Peer-division Multiplexing
1415. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1416. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1417. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1418. Virtualized Screen: A Third Element for CloudMobile Convergence
1419. Steganographic Embedding in JPEG Images with Visual Criterion
1420. On the Typical Statistic Features for Image Blind Steganalysis
1421. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1422. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1423. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1424. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1425. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1426. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1427. Vulnerability Analysis in SOA-Based Business Processes
1428. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1429. Service-Centric Framework for a Digital Government Application
1430. Server-Side Streaming Processing of WS-Security
1431. OWLPath: An OWL Ontology-Guided Query Editor
1432. Monitoring Service Systems from a Language-Action Perspective
1433. Extracting Product Features and Sentiments from Chinese Customer Reviews
1434. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1435. Automated Certification for Compliant Cloud-based Business Processes
1436. Addressing Dependability throughout the SOA Life Cycle
1437. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1438. The Geometric Efficient Matching Algorithm for Firewalls
1439. Secure Service-Oriented Architecture for Mobile Transactions
1440. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1441. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1442. Privacy-Preserving Updates to Anonymous and Confidential Databases
1443. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1444. IPAS: Implicit Password Authentication System
1445. Improving Security and Performance in the Tor Network through Tunable Path Selection
1446. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1447. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1448. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1449. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1450. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1451. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1452. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1453. Data Delivery Properties of Human Contact Networks
1454. Converge-Cast: On the Capacity and Delay Tradeoffs
1455. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1456. USHER: Improving Data Quality with Dynamic Forms
1457. The World in a Nutshell: Concise Range Queries
1458. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1459. Scalable Scheduling of Updates in Streaming Data Warehouses
1460. Scalable Learning of Collective Behavior
1461. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1462. Publishing Search Logs A Comparative Study of Privacy Guarantees
1463. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1464. Optimal Service Pricing for a Cloud Cache
1465. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1466. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1467. Mining Web Graphs for Recommendations
1468. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1469. Integration of Sound Signature Authentication System
1470. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1471. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1472. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1473. Exploring Application-Level Semantics for Data Compression
1474. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1475. Data Leakage Detection
1476. Cost-aware rank join with random and sorted access
1477. Collaborative Filtering with Personalized Skylines
1478. Bridging Socially-Enhanced Virtual Communities
1479. Automatic Discovery of Personal Name Aliases from the Web
1480. A Personalized Ontology Model for Web Information Gathering
1481. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1482. A Query Formulation Language for the Data Web
1483. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1484. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1485. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1486. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1487. Towards Secure and Dependable Storage Services in Cloud Computing
1488. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1489. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1490. Data Integrity Proofs in Cloud Storage
1491. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1492. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1493. Feature-level Sentiment Analysis for Chinese Product Reviews
1494. Equal-sized Cells Mean Equal-sized Packets in Tor?
1495. Customer Relationship Management Based on Data Mining Technique
1496. Authentication Schemes for Session Passwords using Color and Images
1497. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1498. Young Talent Tracker
1499. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1500. International Plant Import and Export
OUR MODERN SOCITY
1501. Trained Volunteers Create A Successful Social Campaign
1502. Finger thump Based Shopping Cart
1503. Finger Print E-Voting Systems
1504. Create a Successful Anti- Nuclear Campaign
1505. Crowding Funding Mobilization
1506. People Power of India
1507. Modern Finger Print Voting System
1508. Election Commission Management
1509. Online Painting Auction
1510. Reality Show Ticket Booking System
1511. Online Broadway Motel Food Ordering System
1512. Fashion Studio Model Management
1513. Women's Selfhelp Group
Advance Health Care System
1514. Organizing medical camp for public health development
1515. Homeopathy Health Record
1516. Consumer Legal Advicer
1517. Raw Requried Online Medicine
1518. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1519. I School
1520. Job fair section process
1521. Advertising in E-Book
1522. Students Skills With Modern Industries
1523. College Placement And College Event
1524. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1525. Cloud Storage Public Digital Certificate
ERP PROJECTS
1526. Customer Relationship Management
1527. Corporate Trouble Shooter
1528. Corporate Event Organisation
1529. Engnering Lab Maintenance
1530. Select Your Age(Business Motivation all age group)
1531. Software Requirements Analysis for Client Side
1532. ERP System (Enterprint Resource Plan
LATEST BANKING
1533. User Opinion For Indian Banking Service And Cashless Economy
1534. Advanced Banking System
1535. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1536. Economic Usage of Solar Energy
1537. Gps Consumers Complients
1538. Online Softskills Tracks
1539. Online Buy And Sale Software
1540. Budget Home Design
1541. Online Product Exchange
1542. Jewellery Management
1543. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1544. E TENDERING -JAVA
1545. Moderate Robatics System with Public Opinion
Java Apps
1546. Online overview of skills really used in jobs
1547. Land Bank for Nursery
1548. Developing Rural Economy
1549. ECOPS - Electronics Police Record Management System
1550. Website Evaluation Using Opinion Mining
1551. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1552. INSURANCE MANAGEMENT SYSTEM
1553. e-Fraud Prevention based on the Self- Authentication of e-Documents
1554. Hope Center
1555. Exam crazy
1556. BUGS REPORTING SYSTEM
1557. LOCATION BASED CONSUMER COMPLAINT
1558. Speed Racing
1559. ROADSTER
1560. META CAFE
1561. ONLINE VIDEO LOCKER
1562. Management System in Metro Train
1563. Plant Shopping on Web
1564. Reporting Online Media News Systems
1565. Informative Content Extraction
1566. E-commerce Complaint Management System
1567. Modern Agriculture Development System
1568. Loan Online Application
1569. Rural Community Developement
1570. LOVE AND CARE
1571. GREEN PLANT
1572. Advance Couier Service
1573. Community Awarness
1574. E_Music
1575. Staff Management System
1576. E-TENDERING
1577. Hotel Management
1578. Crime File Management System
1579. Cloud Cyber Attack
1580. Cloud Cost Management for Customer Sensitive Data
1581. Advance Web based Multimedia Answer Generation
1582. Commaunity Awareness
1583. E-Commerce Complaints
1584. Modern Agriculture Development System
1585. Plant Shopping on Web
1586. ONLINE VIDEO LOCKER
1587. ONLINE VIDEO LOCKER
1588. Reporting Online Media News Systems
1589. Online Plant Shopping
1590. Community Awareness
1591. Loan Online Application
1592. Modern Agriculture Development System
1593. Online Digital Library
1594. Geo Base Services
1595. Civil Supplies and Consumer Protection Department
1596. Citizen Opinions vs Government Policies
1597. Protecting Used Data Privacy for Attackers
1598. Web Hospital Management
1599. Easy SQL Query for Non-IT Manager
1600. Online Shopping with Fraud detection
1601. Efficient Spatial Query Processing
1602. Cryptographic Key Exchange Authentication
1603. Online Global Information Service Center
1604. Contracts Business Events Management
1605. Online Secure image Social Networks
1606. Outsourcing of Online Image Reconstruction
1607. Trust based Profile Matching Secure Social Network
1608. Secure and Distance based Online Social Network (OSN)
1609. Efficient Online Image Retrieval System
1610. Data Sharing In Cloud Storage by Using Key-Aggregate
1611. Multicast Key Management for Cloud
1612. Face-to-face contact on Mobile Social Networks
1613. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1614. Dynamically Growing Online Survey for Behavioral Outcomes
1615. Advance Web based Multimedia Answer Generation
1616. College Result Analysis with Horizontally Distributed Databases
1617. Feedback Decision Support for mHealth monitoring
1618. Exchange Secrete Key for Data Producers and Consumers
1619. Efficient Information Retrieval Using Ranked Query (EIRQ)
1620. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1621. Web Hosting On Cloud
1622. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1623. Web Server Security with Web Client Management System
1624. Web Parser on Sequence Alignment Techniques
1625. Web Page re-Ranking System for Library
1626. Web Eye
1627. Voting System for Web Library
1628. VIRTUAL CLASSROOM SYSTEM
1629. Unique Web Resources Utilization Monitoring System
1630. Transport Management System
1631. Pre-paid Recharging System on Banking
1632. Tollgate Management
1633. Time To Time Stock Market Updater and Monitoring System
1634. Sql Tuner
1635. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1636. SMS Based Mobile Banking with Security
1637. Sms Topup
1638. Vendor Information System For Shipping
1639. Sequential Anomaly Detection from User Behaviour
1640. Secure SMS Transaction System on banking
1641. Secure Online Documents Management System in Cloud
1642. Secure File Uploading Server with Advance Protecting System
1643. Secure File Monitoring System on Cloud
1644. Relational Logic Search Engine On Healthcare
1645. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1646. Quick Customer decision support on Web Sales Portal
1647. Query Response System for File Management
1648. Quality Visualization on Web TV
1649. Project Work Tracking System
1650. Product Market Manipulations on Asian stock market
1651. Predicting Top Company Share Based on High Utility Data
1652. Automation of Analysis and Development Management
1653. Pharmacy Information System
1654. Personalize Your News on Web
1655. Online University
1656. Online tagging for multimedia content
1657. Online Search Ranking On Multiple Domain
1658. Online Rental House Web Portal
1659. Online Recruitment System
1660. Online Real Estate Property Management
1661. Online Multi Type Documents Search Engine
1662. ONLINE MOBILE BILLING SYSTEM
1663. Online Jewelry Management
1664. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1665. Online Examination System
1666. Online Ensemble Learning Approach
1667. Online Banking With Fraud Detecting
1668. Online Auction Bit
1669. ONLINE ADVERTISING SYSTEM
1670. Nutraceuticals Management System
1671. Nearest Shopping Location Identification Systems
1672. Multilevel Images Authentication Systems
1673. Multi New Product Survey Management
1674. Movie Recommender Systems via User- Item Subgroups
1675. Movie Rating and Recommendation on Mobile
1676. Modern Municipal Corporation
1677. Mobile TV Quality Management
1678. Mobile Banking WAP
1679. Manifold Entrust Scheme
1680. Management System in Train
1681. Secure Mailing System
1682. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1683. LEAVE MANAGEMENT SYSTEM FOR MNC
1684. Knowledge Based Decision Support System(KMS)
1685. Key Management for Content Integration
1686. Inter Bank Fund Transfer in Distributed Network
1687. Information and Knowledge Extracting from a large amount of data
1688. Industry Standard Authorization For Sensitive Resources
1689. Implementation and Validating Environmental and Health
1690. iKnoweb Extracting and Integrating Entity Information System
1691. HUMAN ASSURANCE ADMINISTRATION
1692. High_level network Security Using Packet Filtering
1693. High and Low Level SQL Query Executor
1694. GLOBAL COUNSELLING SYSTEM
1695. A Game Theory for Online Security
1696. Distributed Transaction Proxy
1697. Freelancer Job
1698. File Security With Multi Database System
1699. FILE SEARCH ENGINE
1700. Fertilizer Management System
1701. Fast Web Information Gathering with Alias Detection
1702. E-Tutor Online Jobs
1703. Enterprise Stock and Accounting System
1704. Ensuring Data Storage Security in Cloud Computing
1705. Encrypted IT Auditing on Cloud Computing
1706. Encrypted Data Storage Vs Data Against illegal Access
1707. Enabling Site Interaction In Social Community
1708. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1709. E-Music world
1710. Employee Resource Management
1711. Employee Management System
1712. E-Learning
1713. E Fraud Prevention based on the Self Authentication of e Documents
1714. Distribution System for Discount Sales
1715. Distributed Data Integration on Electricity Board
1716. Disease Information Hiding on Publishing Healthcare Data
1717. Digital Documents Attestation Systems
1718. Defending Against Web Application Vulnerabilities
1719. Defects Analysis Systems
1720. Data theft detection mobile cloud computing
1721. Data Base Fraud Detection Systems
1722. Customer Information Hiding for Data Mismanagement in Banking
1723. Company Security Reporting System(CSRS)
1724. E -Crime File Management System
1725. Credit Card Management System
1726. Corporate Requirement System
1727. Consumer Sales Online Fake Product Detection and Deletion
1728. Company Information Tracking System
1729. Cloud Policy-Based File Assure Deletion
1730. Cloud Data Theft Attacks
1731. Cloud Cyber Attacks against Social Networks
1732. Cloud Cost Management for Customer Sensitive Data
1733. Client Favorite Photo Search Engine on Web
1734. Citizen Card System
1735. Card Management System
1736. Design &Development of Car Parking and Automation Billing Systems
1737. Customer Care Service
1738. BPO Call Center
1739. Automation of IT Process Management
1740. Modeling and Automated Containment of Worms
1741. Attribute Key Based Data Security System
1742. As Needed Basis Accountability for Cloud Data Sharing
1743. Annotation of short texts With Wikipedia pages
1744. AIRLINE RESERVATION SYSTEM
1745. Advance User Management on Social Website
1746. A Semantic Web Based Scientific News Aggregator


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1747. Online Trends Management Service in It Industry
1748. Session Management System in It Industry
1749. Tools for Non IT Expert Developer
ERP PROJECTS
1750. New Company Policy Clearance System
1751. Recommend To Friend
1752. Consultanting About the Foreign Peoples
1753. Performance System Analysis In Industry
1754. Non It People Performance
MODERN AGRICULTURE
1755. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1756. Agriculture Marketing in Generation
1757. Agriculture Assist
1758. Sponsor For Agriculture
SPORTS
1759. Play Ground Booking
OUR MODERN SOCITY
1760. ADHAR VOTING SYSTEM
1761. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1762. RAILWAY SEAT RESERVATION SYSTEM
1763. Railway Management Service
1764. It Park Media
1765. Automation Transport Maintance
1766. Yell Help For Children
1767. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1768. Apartment Maintenance
1769. Power Consumption Monitoring House Hold Electronic Device
1770. Direct Q Less Reservation System in train
Advance Health Care System
1771. MAC Sensing Protocol
1772. World Wide Cloud Inter Hospital Acess Health Care System
1773. Live Doctor
Dotnet Apps
1774. TELEVISION CHANNEL PROGRAM MANAGEMENT
1775. WIN THE TRUST OF AN INDIAN CONSUMER
1776. ONLINE ACCOUNT MANAGEMENT
1777. SMART CAB BOOKING SYSTEM
1778. ONLINE FAST FOOD ORDER
1779. Travel Mate Add Module
1780. Work Order System Call Centre
1781. SPORTS MANAGEMENT SYSTEM
1782. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1783. Pick-It Courier Service
1784. Online Taxi Booking
1785. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1786. INCOMETAX MAINTAINANCE SYSTEM
1787. Hotel Reservation
1788. ERP System
1789. Bug Tracking System
1790. Vendor Information System For Shiping
1791. Top-K ranking System
1792. Secure Medical Image Archive System
1793. Business Activity Coordination Using Web Services
1794. Management Portal
1795. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1796. Secure Data Filtering Recommendation System
1797. Online Resources Sharing via Social Networks
1798. Secure self-destructing in Cloud Computing
1799. Web Resourecs File Authorization Management
1800. Click based image re-ranking system
1801. Tree Structure Data Analiysis Mining
1802. Web Resource Allocation for CorPerate
1803. Web Vulnerabilities and Security
1804. Fuzzy Cloud Search Using XML
1805. Cloud Data Supporting Secure Query Search
1806. Tour Recommender Systems on Web
1807. Distributed Interactive Web Applications
1808. Secure Query Processing for Cloud
1809. Online Data Storage with less pricing
1810. Cost Based Web Content Managemnts
1811. Web Hospital Management
1812. Online Data storage with low price
1813. Secure Online Data Block Authorization
1814. Profitable Onlin web Server System
1815. Online Economies File Manager for Multi Keying
1816. Online Community Management
1817. Key based Online Data Managements
1818. Critical Workflow Management for Web Documents
1819. Secure Online Documents Managements for Group Sharing
1820. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1821. Online Marketing Automation System
1822. Internal organization change management System
1823. Secure confirmation of sensitive transaction data in modern Internet banking services
1824. Privacy security with TPA in cloud computing
1825. Company Information Tracking System
1826. Online Virtualized screen Processing
1827. Web Service for Airline Management
1828. Web Social Club
1829. Quantum Key Cryptography
1830. Patient Data Management Based On Hospital Location
1831. Online Software Developer Community
1832. Online Developed Software sales
1833. Avoid repeated measurements On Genetics Dataset
1834. College Lab Maintenance System
1835. Industrial Manpower Resource Organizer
1836. Web Query Construction and Search on Complex Data
1837. Hospital Emergency Data Management
1838. Data confidentiality On Health-care Information System
1839. Secure Online Trading
1840. Fast Real-Time Event Alert Using social Network
1841. Secure E-Mail Organizer
1842. Web User Service Management System
1843. Easy SQL Query for Non-IT Manager
1844. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1845. Customer Relationship Management (CRM) on Banking
1846. Online Company ERP System
1847. Constructing E-Tourism
1848. Web based Multi Service Ranking System
1849. Dynamic Customer Data Hiding in Banking
1850. Online Distributed Social Clubs
1851. Virtual Shopping with Negative Feedback Reputation Systems
1852. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1853. Web Service Oriented Query Authentication Technique
1854. Web Based Customer Favorite vehicle Search Engine
1855. Web Based Book Publishing System
1856. Virtual Energy- Based Encryption and Keying
1857. Video Fraud Detecting On social Network
1858. Video Compression with Data hiding & Data Extraction
1859. Vendor Information System for Shipping
1860. VALUE ADDED TAX (VAT)
1861. Universal Smart Card
1862. Ultimate Location Information Systems
1863. Top K Ranking System
1864. Techno Task Manager
1865. Supply Chain Management
1866. Substitution-Permutation cryptanalysis System
1867. Streaming Data Warehouse Updations
1868. Step by Step Monitoring for Product Purchasing System
1869. Steganography for Data Reading and Writing AVI files
1870. SQL TUNER
1871. SMS Transaction Security
1872. Session Authentication Passwords using Color
1873. Service Availability Guarantees on Virtual Economy
1874. Server Fraud Detection on Cloud
1875. Sentence Based Search on Cloud
1876. Semantic Web Search Engines
1877. Secured Image communicator
1878. Secure smart application on web application
1879. Secure Service-Oriented Smartcard systems
1880. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1881. Secure Location Identification System
1882. Secure and Cloud Based Patient Information Systems
1883. Reduce the Password Guessing Attacks using Click Point
1884. Recommendation System Based on Graph
1885. Quantum Key Cryptography
1886. Quality Controller
1887. Public Web Status Monitoring System
1888. Project Trade Pool
1889. Product Marketing Analysis On Public Opinion
1890. Predicting Users Behaviors Using Web Mining
1891. Personal Health Information on M-Healthcare Emergency
1892. Optimum Online Knowledge Base
1893. Online Training Program
1894. Online Time sensitive queries
1895. Online Tag Based Image Retrieval and Effective Management
1896. Online Social networks controls using cloud
1897. Online Rental System
1898. Online product Opinion and Ranking System
1899. Online Dynamic form creation for Non-IT Peoples
1900. Online Digital Contract Signing in Mistrusted Parities
1901. Online Aventure
1902. Online Shopping
1903. News Ticker Project
1904. Net Bank in Recharge
1905. Multi User Public Auditing System of Data Storage Security
1906. Multi Location Networked Mobile Auto Intimates
1907. Modern Distributed Business Applications for Supply Chain Management
1908. Market Intelligence Based Public Sentiment Analysis
1909. Leave Management System
1910. Joint processing of spatial keyword queries
1911. Intelligence Missing Items in Shopping Cart
1912. Information Leak Detection and Prevention
1913. Industrial Manpower Resource Organizer
1914. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1915. Human Expertise Search Engine
1916. Home appliances online Purchase
1917. High Secure Corporate Web Search Engine
1918. High Degree Patient Privacy on Secure Data Outsourcing
1919. Group Movement Pattern Discovery
1920. Graph Based Share Market Data Updating
1921. Generic Business Portal
1922. Flight Booking Portal
1923. Firewall using Packet Filtering
1924. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1925. Ethical and Social issues in File sharing system
1926. Enterprener Sales Report Management
1927. Encyclopedia for Computer Science
1928. Employee Based Performance Monitoring and Action Systems
1929. Emerging Patient Health Information Exchange System On Cloud
1930. Efficient Search on Outsourced data using Cloud
1931. Efficient and Secure Data Processing on Queries Similarity
1932. Distributed Database Optimization on HealthCare
1933. Digital Asset Management Systems (DAMS) Using Watermarking
1934. Detecting Fraud on Vehicle Insurance System
1935. Defeating Lazy Servers Database Vs Query Access Assurance
1936. Data Processing for Disease-Treatment Relations
1937. Data Mining Analysis on EB bill system
1938. Data confidential against untrusted servers using attribute-based encryption (ABE)
1939. Data Aggregation using SQL clustering
1940. Customer Sales Analysis System Based On Purchasing
1941. Cryptography on Personal confidential information
1942. Cost Based Secure Cloud Data Systems
1943. Market Based Analysis for consumer correct decision
1944. Construction Company Work Order System
1945. Complete Medical Transcription System(Mts)
1946. Company Security Reporting System(CSRS)
1947. College Result Analysis
1948. Cloud Economic Benefit On Scientific Computing
1949. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1950. Centralized Event Planer across Social Media Sites
1951. Call Center Management
1952. A Reservation-Based Coordination Protocol for Web Services
1953. Building construction and cost estimation
1954. Budget Planner
1955. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1956. Automatically identifying query groups on Web Search Engine
1957. Auditing Data integrity and data storage using cloud
1958. Application layer blocker for preventing on cyber security
1959. Advanced One-Click User Web Search Engine
1960. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
1961. VALUE ADDED TAX (VAT)
1962. User Oriented Network Attacks
1963. Secure Back Up
1964. Screen Capture And Mouse I/O
1965. Sales Bill Printing System using Excel
1966. Password Security
1967. Online User Mobile Rating
1968. Online Sensex Graph System
1969. Online Book Publishing
1970. NEWS TICKER PROJECT
1971. Multi Storage file
1972. Message Chating
1973. Medical Equipment in WAP
1974. Login Authentication Scheme
1975. Information Alert System
1976. Image Encryption And Decryption
1977. Generic Business Portal
1978. Flight Booking Portal
1979. File Transfer using Cryptography Techniques
1980. File Splitting
1981. Excel Format in Report
1982. EB Management System
1983. Dynamic Web Form Creation
1984. Android Image Search


Struts Application Projects
Struts Apps
1985. Public Sentiment Analysis with Online Shopping Using Struts
1986. Modern distributed business for supply-chain management
1987. High Confidential Personal Disease Reporting System
1988. Distributor Sensitive Data Management Using Struts
1989. Development of Certificate Authority Services for Web Applications
1990. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1991. Website Tracking System
1992. Website Ranking System
1993. Treasure Warehouse
1994. Student Information System
1995. Storage security
1996. PRISON MANAGEMENT SYSTEM
1997. E-Licence Investigation System
1998. Online Secure File Transfer System
1999. Online Medicine Purchase
2000. ONLINE EDUCATION
2001. Online Agriculture System
2002. Mobile Survey
2003. ISSUE TRACKING SYSYTEM
2004. HOSPITAL MANAGEMENT SYSYTEMS
2005. HealthCare Management System
2006. Global Employee Acclaimer
2007. E-VOTING FOR ASSOCIATION
2008. Encrypted Register Form
2009. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
2010. E INSURANCE
2011. Courier Tracking Systems
2012. corporate Transportation
2013. Collectorate Communication Systems
2014. Budget Approval System
2015. BLOOD BANK MANAGEMENT SYSTEMS
2016. ATTENDANCE MANAGEMENT SYSTEM
2017. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2018. Sponsor For Agriculture
2019. Agriculture Assist
2020. Agriculture Marketing in Generation
2021. International Plant Import and Export
MODERN EDUCATION SYSTEM
2022. Old In Gold
2023. I School
2024. College Placement And Events
2025. Rural Area Educational Trouble Shooter
2026. Web Direct Recruitment Analysis
2027. Online Aquarum
2028. School Automation System
2029. Secure Online Course Automation
2030. Session Management System in It Industry
2031. Tools for Non IT Expert Developer
2032. Students Skills With Modern Industries
MODERN TECHNOLOGY
2033. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2034. Customer Favarate Greeting Card Design
2035. GPS Transport Packers and Movers
2036. House Hold Appliancies Warranty Management
2037. Direct Q Less Reservation System in train
2038. Power Consumption Monitoring House Hold Electronic Device
2039. Apartment Maintenance
2040. Budget Home Design
2041. Online Buy And Sale Software
2042. Online Softskills Tracks
2043. Gps Consumers Complients
2044. Economic Usage of Solar Energy
Advance Health Care System
2045. Organizing medical camp for public health development
2046. LIVE WEB DOCTOR CONSULTATION
2047. World Wide Cloud Inter Hospital Acess Health Care System
2048. MAC Sensing Protocol
2049. Medical Record Authentication
2050. Raw Requried Online Medicine
2051. Consumer Legal Advicer
2052. Homeopathy Health Record
SPORTS
2053. Play Ground Booking
2054. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2055. Cloud Storage Public Digital Certificate
ERP PROJECTS
2056. Corporate Trouble Shooter
2057. Entrepreneur Fault Analysis
2058. Organise Corporate Training For Client Projects
2059. Employment Knowledge Database
2060. GPS Employee Tracking System
2061. Non It People Performance
2062. Performance System Analysis In Industry
2063. Consultanting About the Foreign Peoples
2064. Recommend To Friend
2065. New Company Policy Clearance System
2066. ERP System (Enterprint Resource Plan
2067. Software Requirements Analysis for Client Side
2068. Select Your Age(Business Motivation all age group)
2069. Engnering Lab Maintenance
2070. Corporate Event Organisation
LATEST BANKING
2071. EyeBank Management System
2072. Advanced Banking System
OUR MODERN SOCIETY
2073. Trained Volunteers Create A Successful Social Campaign
2074. Finger thump Based Shopping Cart
2075. Railway Management Service
2076. Create a Successful Anti- Nuclear Campaign
2077. Crowding Funding Mobilization
2078. People Power of India
2079. Pets Care
2080. Feature in Best Potitical Leader in India
2081. Yell Help For Children
2082. Automation Transport Maintance
2083. It Park Media
2084. Online Painting Auction
2085. Election Commission Management
2086. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2087. ANDROID APPS FOR INSURANCE SYSTEM
2088. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2089. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2090. ANDROID APPS FOR DOCTOR APPOINTMENT
2091. LIVE WEB DOCTOR CONSULTATION
2092. ANDROID APPS ON DOCTOR WITH NURSE
2093. HOSPITAL ANDROID APPS
2094. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2095. Fertilizer Management System -Java, JSP, MySQL
2096. Land Bank for Nursery -Java, JSP, MySQL
2097. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2098. FORMER APPS - ANDROID
2099. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2100. Online Banking with Fraud Detecting- Java JSP, MySQL
2101. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2102. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2103. Big Scholarly Data: A Survey
2104. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved