Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
INTERNSHIP-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN Internet of things (IoT) -BLOCKCHAIN BLOCK CHAIN TECH - BITCOIN PYTHON PROJECT - IEEE
MACHINE LEARNING-ML(Data Scientist) LATEST PROJECTS UPDATES PhD Guidance JAVA IEEE LATEST
JAVA SPRING AND HIBERNATE JAVA IEEE 2016-17 IEEE 2014-2015 Java Projects Latest IEEE 2015-2016 Java Projects
IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project Java Application Projects
Java Mini Projects NEW TECHNOLOGY-HELP VIDEO R - DATA SCIENCE - ML WEKA-Machine Learning
BIG DATA - HADOOP PROJECTS BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB ANDROID IEEE 2017 -18
ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP ANDROID APPS
COLLEGE MINI PROJECTS IEEE PHP Projects 2017-18 IEEE PHP Projects PHP Application Projects
ASP.NET MVC Framework Dot Net IEEE 2017-18 ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18
RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects
IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects Dotnet Application Projects
Dotnet Mini Projects Struts Application Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS
HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS RESTful Web services
 
INTERNSHIP-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PYTHON PROJECT WITH PLACEMENT TRAINING
1. Fake News Analysis using Machine Learning - ML
2. Brain Tumor Detection Image Segmentation Using OpenCV
3. Blockchain for AI: Review and Open Research Challenges
4. Road Accident Analysis Using Machine Learning
5. E-assessment using image processing in ∞Exams
6. NLP - NATURAL LANGUAGE PROCESSING
7. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
8. Dengu Data Analysis Using R-program
9. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
10. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
11. Big Scholarly Data: A Survey
12. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
13. Big Data, Big Knowledge Big Data for Personalized Healthcare
14. Deduplication on Encrypted Big Data in Cloud
15. Secure Sensitive Data Sharing on a Big Data Platform
16. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
17. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
18. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
19. Self-Healing in Mobile Networks with Big Data
20. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
21. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
22. Child Monitoring - ANDROID APPS
23. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
24. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
25. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
26. Developing Apps for visually imapired people: Lessons learned from social network
27. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
28. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
29. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
30. Design of secure location and message sharing system for android platform
31. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
32. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
33. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
34. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
35. Privacy Protection based Access Control Scheme in Cloud-based Services
36. Privacy-Preserving Selective Aggregation of Online User Behavior Data
37. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
38. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


Internet of things (IoT) -BLOCKCHAIN
IOT Under Developing - Topic
39. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
40. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
41. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
42. Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality
43. Review of Standard Ontologies for the Web of Things
IoT Projects
44. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
45. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
46. Who Moved My Data? Privacy Protection in Smartphones
47. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
48. IOT Projects
49. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
50. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
51. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
52. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
53. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
54. Blockchain for AI
55. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


PYTHON PROJECT - IEEE
MORE PYTHON IEEE
56. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
57. Sentiment Lexicon
58. SUBWAY PASSENGER FLOW FORECASTING WITH MULTI-STATION AND EXTERNAL FACTORS
59. Personalized Recommendation of Social Images by Constructing a User Interest
60. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
61. Opinion Mining using Ontological Spam Detection
62. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
63. Phishing Web Sites Features Classification
64. using data mining to predict hospital admissions from the emergency department
65. Correlated Matrix Factorization for Recommendation with Implicit Feedback
66. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
67. Iris Recognition
68. Currency Recognition System
PYTHON TRAINING WITH PROJECT
69. Privacy Characterization and Quantification in Data Publishing
70. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
71. Opinion Mining using Ontological Spam Detection
72. Predicting the top-N popular videos via cross-domain hybrid model
73. Fraquent itemsets mining with differential privacy over large scale data
74. Phishing Web Sites Features Classification
75. Dynamic Facet Ordering for Faceted Product Search Engines
76. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
77. Machine Learning and Deep Learning Methods for Cybersecurity
78. Linear Regression Algorithm Predict the volution of Community in Future
79. A User-Centric Machine Learning Framework for Cyber Security Operations Center
80. Linear Regression Algorithm
81. A Machine Learning Approach to Routing
82. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
83. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
84. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
85. CYBER SECURITY
86. Automatic Sentiment Detection in Naturalistic Audio
87. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
88. Student Performance Analysis - PYTHON
89. E-assessment using image processing in ∞Exams
90. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
91. NLP - NATURAL LANGUAGE PROCESSING
92. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
93. Image Based Appraisal of Real Estate Properties-IEEE 2017
94. FOOD WASTE ORGANIZER
95. PYTHON PROJECT FLOW
96. PYTHON PROGRAM EXECUTION
97. PYTHON INSTALLATION
PYTHON APPLICATION
98. Fake News Analysis using Machine Learning - ML
99. Brain Tumor Detection Image Segmentation Using OpenCV
100. Road Accident Analysis Using Machine Learning
101. Inferring Salient Objects from Human Fixations
102. ROTOSCOPING APPEARANCE MODELS
103. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
104. Consumer Attitudes towards Insurance Products
105. Organic Food
106. BOOK RECOMMENDATION SYSTEM PYTHON
107. Web Scraping Using PYTHON
108. MULTIMEDIA CONTENT PROTECTION
109. Student Performance Analysis - PYTHON
110. HOTEL MANAGEMENT
111. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Reinforcement Learning
Unsupervised Learning
112. Event Management With Analysis - Python
Supervised Learning
113. Fake News Analysis using Machine Learning - ML
114. Road Accident Analysis Using Machine Learning
115. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
116. ROTOSCOPING APPEARANCE MODELS
117. Inferring Salient Objects from Human Fixations
118. Privacy Data Mess-apps
119. Speech Recognition in Social Care - NLP
120. Text-to-Speech (TTS)- NLP
121. Voice Scheduler - NLP
122. VOICE SEARCH ENGINE - NLP
123. LINEAR REGRESSION - PYTHON
124. LATENT DIRICHLET ALLOCATION
125. DIGITAL IMAGE PROCESSING - PYTHON
126. DECISION TREE LEARNING - ALGORITHM
127. NAIVE BAYES CLASSIFIER
128. K - MEANS CLUSTERING
129. Dengu Data Analysis Using R-program
130. Shopping Data set Analyse Using R Machine Learning
131. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
132. Polynomial Time Algorithm-PTA
133. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
134. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
135. K-Means For Clustering


LATEST PROJECTS UPDATES
BIG DATA JAVA - NOSQL- MONGODB
136. Blockchain for AI
PYTHON - AI
137. Inferring Salient Objects from Human Fixations
138. ROTOSCOPING APPEARANCE MODELS
139. Event Management With Analysis - Python
140. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
141. Iris Recognition
142. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
143. Object Detection
144. Rainfall Rate Prediction
145. Drug Usage in Social Media
146. SUBWAY PASSENGER FLOW FORECASTING


PhD Guidance
Cyber Security and Privacy
147. Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment
148. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
149. Blockchain for AI
Developing PhD proposal
150. Inferring Salient Objects from Human Fixations
151. ROTOSCOPING APPEARANCE MODELS
152. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
153. Review of Standard Ontologies for the Web of Things
154. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
155. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
156. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
157. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
158. Approximate Data Aggregation in Sensor Equipped IoT Networks
159. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
160. Diabetics Dataset
161. MEDICAL DATA ANALYSES
162. R IEEE PROJECTS
163. PhD Project Guidance
164. PhD Projects


JAVA IEEE LATEST
IEEE Transactions on Big Data
165. Improving Instance Selection Methods for Big Data Classification
166. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
167. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
168. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
169. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
170. A Web Service Discovery Approach Based on Common Topic Groups Extraction
171. Dynamic Facet Ordering for Faceted Product Search Engines
172. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
173. Flexible Wildcard Searchable Encryption System
174. QoS Recommendation in Cloud Services
175. Securing Aggregate Queries for DNA Databases
176. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
177. A robust reputation management mechanism in the federated cloud
178. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
179. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
180. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
181. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
182. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
183. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
184. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
185. Energy-efficient Query Processing in Web Search Engines
186. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
187. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
188. BiRank: Towards Ranking on Bipartite Graphs
189. QoS Recommendation in Cloud Services
190. Public Interest Analysis Based on Implicit Feedback of IPTV Users
191. Search Rank Fraud and Malware Detection in Google Play
192. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
193. Influence Maximization in Trajectory Databases
194. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
195. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
196. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
197. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
198. Computing Semantic Similarity of Concepts in Knowledge Graphs
199. QDA: A Query-Driven Approach to Entity Resolution
200. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
201. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
202. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
203. CONTENT BASED IMAGE RETRIEVAL
204. Identifying At Risk Students for Early Interventions A Time Series Clustering
205. Two Layer Clustering model for Mobile Customer Analysis
206. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
207. Consumer oriented web services ranking and classification
208. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
209. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
210. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
211. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
212. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
213. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
214. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
215. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
216. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
217. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
218. FISHING DISASTER MANAGEMENT SYSTEM
219. SPRING AND HIBERNATE


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
220. Two-Factor Data Security Protection Mechanism for Cloud Storage System
221. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
222. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
223. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
224. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
225. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
226. Where You Are Is Who You Are User Identification by Matching Statistics
227. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
228. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
229. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
230. Online Subgraph Skyline Analysis Over Knowledge Graphs
231. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
232. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
233. ID2S Password-Authenticated Key Exchange Protocols
234. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
235. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
236. Classification model to predict the learners' academic performance using big data
237. Electronic Commerce Meets the Semantic Web
238. Mining High Utility Patterns in One Phase without Generating Candidates
239. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
240. Automatic Generation of Social Event Storyboard from Image Click-through Data
241. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
242. Understanding Deep Representations Learned in Modeling Users Likes
243. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
244. Topic-Oriented Exploratory Search Based on an Indexing Network
245. Relevance Feedback Algorithms Inspired By Quantum Detection
246. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
247. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
248. Efficiently Estimating Statistics of Points of Interests on Maps
249. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
250. Aspect-level Influence Discovery from Graphs
251. Sentiment Embeddings with Applications to Sentiment Analysis
252. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
253. Resolving Multi-party Privacy Conflicts in Social Media
254. Encrypted Data Management with Deduplication in Cloud Computing
255. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
256. Crawling Hidden Objects with kNN Queries
257. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
258. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
259. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
260. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
261. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
262. Nearest Keyword Set Search in Multi-dimensional Datasets
263. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
264. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
265. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
266. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
267. Immutable Authentication and Integrity Schemes for Outsourced Databases
268. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
269. Server-Aided Public Key Encryption with Keyword Search
270. Online Learning in Large-Scale Contextual Recommender Systems
271. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
272. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
273. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
274. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
275. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
276. Multi-Modal Event Topic Model for Social Event Analysis
277. Social friend recommendation on multiple network correlation
278. Tag Based Image Search by Social Re-ranking
279. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
280. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
281. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
282. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
283. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
284. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
285. Packet-Scale Congestion Control Paradigm


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
286. Leveraging the Tail Time for Saving Energy in Cellular Networks
287. Keylogging-resistant Visual Authentication Protocols
288. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
289. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
290. Preserving Location Privacy in Geo-Social Applications
291. Efficient Authentication for Mobile and Pervasive Computing
292. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
293. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
294. Typicality-Based Collaborative Filtering Recommendation
295. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
296. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
297. Keyword Search Over Probabilistic RDF Graphs
298. Efficient Prediction of Difficult Keyword Queries over Databases
299. Interpreting the Public Sentiment Variations on Twitter
300. An Efficient Recommendation Method for Improving Business Process Modeling
301. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
302. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
303. On the use of Side Information for Mining Text Data
304. Privacy Preserving and Content Protecting Location based Queries
305. Fast Nearest Neighbor Search with Keywords
306. Towards Differential Query Services in Cost-Efficient Clouds
307. Facilitating Document Annotation using Content and Querying Value
308. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
309. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
310. Secure Outsourced Attribute-Based Signatures
311. Supporting Privacy Protection in Personalized Web Search
312. Dealing With Concept Drifts in Process Mining
313. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
314. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
315. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
316. Active Learning of Constraints for Semi-Supervised Clustering
317. Best Keyword Cover Search
318. Personalized Recommendation Combining User Interest and Social Circle
319. Online Feature Selection and Its Applications
320. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
321. Incremental Affinity Propagation Clustering Based on Message Passing
322. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
323. Secure kNN Query Processing in Untrusted Cloud Environments
324. Malware Propagation in Large-Scale Networks
325. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
326. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
327. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
328. Efficient Ranking on Entity Graphs with Personalized Relationships
329. Task Trail: An Effective Segmentation of User Search Behavior
330. Privacy-Preserving Enhanced Collaborative Tagging
331. XSPath Navigation on XML Schemas Made Easy
332. Security Evaluation of Pattern Classifiers under Attack
333. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
334. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
335. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
336. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
337. Nothing is for Free: Security in Searching Shared and Encrypted Data
338. SocialTube: P2P-assisted Video Sharing in Online Social Networks
339. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
340. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
341. Behavioral Malware Detection in Delay Tolerant Networks
342. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
343. Private Searching on Streaming Data Based on Keyword Frequency
344. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
345. On the Security of Trustee-Based Social Authentications
346. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
347. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
348. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
349. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
350. A Two-stage Deanonymization Attack Against Anonymized Social Networks
351. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
352. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
353. Scalable architecture for multi-user encrypted SQL operations on cloud database services
354. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
355. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
356. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
357. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
358. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
359. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
360. Secure kNN Query Processing in Untrusted Cloud Environments
361. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
362. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
363. A Hybrid Cloud Approach for Secure Authorized Deduplication
364. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
365. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
366. A Novel Model for Competition and Cooperation Among Cloud Providers
367. CLOUDQUAL: A Quality Model for Cloud Services
368. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
369. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
370. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
371. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
372. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
373. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
374. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
375. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
376. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
377. Enhanced Security for Association Rule Mining to secure Transactional Databases
378. Operational Pattern Revealing Technique in Text Mining
379. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
380. Personalized web search using Browsing history and domain Knowledge
381. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
382. Data Security the Challenge of Cloud Computing
383. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
384. A Cloud Enviroment for Backup and Data Storage


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
385. Rank-Based Similarity Search: Reducing the Dimensional Dependence
386. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
387. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
388. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
389. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
390. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
391. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
392. On the Security of data access control for multiauthority cloud storage system
393. Trust-based Service Management for Social Internet of Things Systems
394. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
395. Formalization and Verification of Group Behavior Interactions
396. Group Key Agreement with Local Connectivity
397. Data Lineage in Malicious Environments
398. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
399. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
400. Enabling Cloud Storage Auditing with Key-Exposure Resistance
401. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
402. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
403. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
404. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
405. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
406. Quantitative Reasoning About Cloud Security Using Service Level Agreements
407. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
408. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
409. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
410. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
411. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
412. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
413. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
414. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
415. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
416. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
417. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
418. Enabling Cloud Storage Auditing with Key-Exposure Resistance
419. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
420. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
421. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
422. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
423. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
424. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
425. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
426. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
427. Secure Auditing and Deduplicating Data in Cloud
428. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
429. Towards reproducibility in online social network Research
430. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
431. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
432. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
433. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
434. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
435. Making Digital Artifacts on the Web Verifiable and Reliable
436. Anonymizing Collections of Tree-Structured Data
437. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
438. FOCS: Fast Overlapped Community Search
439. Sparsity Learning Formulations for Mining Time-Varying Data
440. The Impact of View Histories on Edit Recommendations
441. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
442. Discovery of Ranking Fraud for Mobile Apps
443. Towards Effective Bug Triage with Software Data Reduction Techniques
444. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
445. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
446. Auditing for Distributed Storage Systems
447. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
448. Uploader Intent for Online Video: Typology, Inference and Applications
449. YouTube Video Promotion by Cross-network
450. Semantic-Improved Color Imaging Applications: It Is All About Context
451. Geolocalized Modeling for Dish Recognition
452. Learning to Rank Image Tags with Limited Training Examples
453. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
454. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
455. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
456. Tracking Temporal Community Strength in Dynamic Networks
457. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
458. Towards Information Diffusion in Mobile Social Networks
459. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
460. An Efficient Privacy-Preserving Ranked Keyword Search Method
461. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
462. Dispersing Instant Social Video Service Across Multiple Clouds
463. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
464. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
465. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
466. A Computational Dynamic Trust Model for User Authorization
467. Secure Distributed Deduplication Systems with Improved Reliability
468. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
469. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
470. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
471. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
472. User Action Interpretation for Online Content Optimization
473. Spatial Query Integrity with Voronoi Neighbors
474. Spatial Approximate String Search
475. Sensitive Label Privacy Protection on Social Network Data
476. Secure Mining of Association Rules in Horizontally Distributed Databases
477. Secure Logging As a Service Delegating Log Management to the Cloud
478. Robust Module-based Data Management
479. Ranking on Data Manifold with Sink Points
480. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
481. Privacy-Enhanced Web Service Composition
482. Privacy against Aggregate Knowledge Attacks
483. Preventing Private Information Inference Attacks on Social Networks
484. PMSE: A Personalized Mobile Search Engine
485. Personalized QoS-Aware Web Service Recommendation and Visualization
486. Optimal Client-Server Assignment for Internet Distributed Systems
487. Online Search and Buying Behaviour in Consumer Markets
488. M-Privacy for Collaborative Data Publishing
489. Mining User Queries with Markov Chains: Application to Online Image Retrieval
490. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
491. Incentive Compatible Privacy-Preserving Data Analysis
492. Improving Security and Efficiency in Attribute-Based Data Sharing
493. FoCUS: Learning to Crawl Web Forums
494. Fast Nearest Neighbor Search with Keywords
495. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
496. Facilitating Effective User Navigation through Website Structure Improvement
497. Facilitating Document Annotation using Content and Querying Value
498. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
499. Efficient Evaluation of SUM Queries over Probabilistic Data*
500. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
501. Dynamic Query Forms for Database Queries
502. Dynamic Personalized Recommendation on Sparse Data
503. Distributed Strategies for Mining Outliers in Large Data Sets
504. Crowdsourcing Predictors of Behavioral Outcomes
505. Co-Occurrence-Based Diffusion for Expert Search on the Web
506. Comparable Entity Mining from Comparative Questions
507. CloudMoV: Cloud-based Mobile Social TV
508. Anomaly Detection via Online Oversampling Principal Component Analysis
509. Anomaly Detection Approach Using Hidden Markov Model
510. Annotating Search Results from Web Databases
511. A System to Filter Unwanted Messages from OSN User Walls
512. A Survey of XML Tree Patterns
513. A Probabilistic Approach to String Transformation
514. A New Algorithm for Inferring User Search Goals with Feedback Sessions
515. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
516. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
517. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
518. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
519. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
520. Towards Differential Query Services in Cost-Efficient Clouds
521. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
522. SocialTube: P2P-assisted Video Sharing in Online Social Networks
523. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
524. QoS Ranking Prediction for Cloud Services
525. Priority-Based Consolidation of Parallel Workloads in the Cloud
526. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
527. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
528. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
529. Load Rebalancing for Distributed File Systems in Clouds
530. Label-Embedding for Attribute-Based Classification
531. IP-Geolocation Mapping for Moderately Connected Internet Regions
532. Identity-Based Secure Distributed Data Storage Schemes
533. Hint-based Execution of Workloads in Clouds with Nefeli
534. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
535. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
536. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
537. Efficient Two-Server Password-Only Authenticated Key Exchange
538. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
539. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
540. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
541. Winds of Change: From Vendor Lock-In to the Meta Cloud
542. Supporting the Migration of Applications to the Cloud through a Decision Support System
543. Storing Shared Data on the Cloud via Security-Mediator
544. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
545. Privacy-Preserving Public Auditing for Secure Cloud Storage
546. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
547. Outsourcing Privacy-Preserving Social Networks to a Cloud
548. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
549. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
550. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
551. Efficient Security Solution for Privacy-Preserving Cloud Services
552. Collaboration in Multicloud Computing Environments: Framework and Security Issues
553. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
554. Cloud-based DDoS Attacks and Defenses
555. Cloud computing for mobile users can offloading compution save energy
556. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
557. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
558. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
559. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
560. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
561. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
562. Two tales of privacy in online social networks
563. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
564. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
565. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
566. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
567. Security and Privacy-Enhancing Multicloud Architectures
568. Security Using Colors and Armstrong Numbers
569. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
570. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
571. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
572. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
573. Privacy Preserving Data Analytics for Smart Homes
574. On Inference-Proof View Processing of XML Documents
575. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
576. Extracting Spread-Spectrum Hidden Data from Digital Media
577. Efficiently Outsourcing Multiparty Computation under Multiple Keys
578. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
579. Craigslist Scams and Community Composition: Investigating Online Fraud
580. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
581. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
582. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
583. Super-Resolution-based Inpainting
584. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
585. Image Authentication Using Stochastic Diffusion
586. Hierarchical Super-Resolution-Based Inpainting
587. Circular Reranking for Visual Search
588. Bootstrapping Visual Categorization With Relevant Negatives
589. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
590. An extended visual cryptography scheme without pixel expansion for halftone images
591. An Adaptive Cloud Downloading Service
NETWORKING
592. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
593. Topological Conditions for In-Network Stabilization of Dynamical Systems
594. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
595. Price Differentiation for Communication Networks
596. Participatory Privacy: Enabling Privacy in Participatory Sensing
597. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
598. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
599. On the Role of Mobility for Multi-message Gossip
600. Fully Anonymous Profile Matching in Mobile Social Networks
601. Fault Node Recovery Algorithm for a Wireless Sensor Network
602. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
603. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
604. Access Policy Consolidation for Event Processing Systems
605. A Fast Re-Route Method
SOFTWARE ENGINEERING
606. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
607. Vampire attacks: Draining life from wireless ad-hoc sensor networks
608. Towards a Statistical Framework for Source Anonymity in Sensor Networks
609. Search Me If You Can: Privacy-preserving Location Query Service
610. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
611. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
612. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
613. Distributed Cooperative Caching in Social Wireless Networks
614. Community-Aware Opportunistic Routing in Mobile Social Networks
615. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
616. The Devils Behind Web Application Vulnerabilities
617. Security Architecture for Cloud Networking
618. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
619. Secure Overlay Cloud Storage with Access Control and Assured Deletion
620. Risk-Aware Mitigation for MANET Routing Attacks
621. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
622. Privacy-preserving Enforcement of Spatially Aware RBAC
623. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
624. pCloud: A Distributed System for Practical PIR
625. Packet-Hiding Methods for Preventing Selective Jamming Attacks
626. Online Modeling of Proactive Moderation System for Auction Fraud Detection
627. Fast and accurate annotation of short texts with Wikipedia pages
628. FADE: Secure Overlay Cloud Storage with File Assured Deletion
629. Ensuring Distributed Accountability for Data Sharing in the Cloud
630. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
631. Direct and Indirect Discrimination Prevention Methods
632. Detecting Spam Zombies by Monitoring Outgoing Messages
633. Detecting Anomalous Insiders in Collaborative Information Systems
634. Data-Provenance Verification For Secure Hosts
635. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
636. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
637. Payments for Outsourced Computations
638. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
639. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
640. Toward Private Joins on Outsourced Data
641. Statistical Entity Extraction from Web
642. Slicing: A New Approach to Privacy Preserving Data Publishing
643. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
644. Resilient Identity Crime Detection
645. Ranking Model Adaptation for Domain-Specific Search
646. Organizing User Search Histories
647. On the Spectral Characterization and Scalable Mining of Network Communities
648. Multiparty Access Control for Online Social Networks: Model and Mechanisms
649. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
650. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
651. How do Facebookers use Friendlists
652. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
653. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
654. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
655. Enabling Multilevel Trust in Privacy Preserving Data Mining
656. Enabling cross-site interactions in social networks
657. Efficient Similarity Search over Encrypted Data
658. Efficient Extended Boolean Retrieval
659. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
660. Efficient Anonymous Message Submission
661. Effective Pattern Discovery for Text Mining
662. DDD: A New Ensemble Approach for Dealing with Concept Drift
663. Credibility Ranking of Tweets during High Impact Events
664. Creating Evolving User Behavior Profiles Automatically
665. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
666. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
667. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
668. Anomaly Detection for Discrete Sequences: A Survey
669. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
670. Advance Mining of Temporal High Utility Itemset
671. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
672. Reliable Re-encryption in Unreliable Clouds
673. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
674. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
675. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
676. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
677. Gossip-based Resource Management for Cloud Environments
678. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
679. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
680. Cloud Data Protection for the Masses
681. Cloud Computing Security: From Single to Multi-Clouds
682. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
683. In Tags We Trust Trust modeling in social tagging of multimedia content
684. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
685. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
686. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
687. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
688. Cut Detection in Wireless Sensor Networks
689. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
690. TrickleDNS: Bootstrapping DNS Security using Social Trust
691. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
692. Policy-by-Example for Online Social Networks
693. Packet Loss Control Using Tokens at the Network Edge
694. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
695. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
696. Independent Directed Acyclic Graphs for Resilient Multipath Routing
697. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
698. Game-Theoretic Pricing for Video Streaming in Mobile Networks
699. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
700. Auditing for Network Coding Storage
701. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
702. Privacy Preserving Cloud Data Access With Multi-Authorities
703. Movie Rating and Review Summarization in Mobile Environment
704. IDSaaS: Intrusion Detection System as a Service in Public Clouds
705. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
706. BibPro: A Citation Parser Based on Sequence Alignment Techniques
707. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
708. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
709. RITAS: Services for Randomized Intrusion Tolerance
710. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
711. Nymble: Blocking Misbehaving Users in Anonymizing Networks
712. Modeling and Detection of Camouflaging Worm
713. Coding for Cryptographic Security Enhancement using Stopping Sets
714. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
715. Wireless Sensor Network Security model using Zero Knowledge Protocol
716. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
717. Throughput Optimization in Mobile Backbone Networks
718. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
719. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
720. Fast Data Collection in Tree-Based Wireless Sensor Networks
721. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
722. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
723. SPAF: Stateless FSA-based Packet Filters
724. Selfish Overlay Network Creation and Maintenance
725. ProgME: Towards Programmable Network MEasurement
726. Locating Equivalent Servants over P2P Networks
727. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
728. Buffer Sizing for 802.11 Based Networks
729. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
730. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
731. Improving Utilization of Infrastructure Clouds
732. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
733. CloudTPS: Scalable Transactions for Web Applications in the Cloud
734. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
735. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
736. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
737. Ranking Spatial Data by Quality Preferences
738. Making Aggregation Work in Uncertain and Probabilistic Databases
739. Load Shedding in Mobile Systems with MobiQual
740. Group Enclosing Queries
741. Extended XML Tree Pattern Matching: Theories and Algorithms
742. Effective Navigation of Query Results Based on Concept Hierarchies
743. Discovering Conditional Functional Dependencies
744. Decision Trees for Uncertain Data
745. Data Leakage Detection
746. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
747. Young Talent Tracker
748. Cricket Stadium Seat Booking
MODERN AGRICULTRE
749. i VILLAGE
750. International Plant Import and Export
OUR MODERN SOCITY
751. Metro Rail Corporation
752. Trained Volunteers Create A Successful Social Campaign
753. Finger thump Based Shopping Cart
754. Finger Print E-Voting Systems
755. Create a Successful Anti- Nuclear Campaign
756. Crowding Funding Mobilization
757. People Power of India
758. Modern Finger Print Voting System
759. Election Commission Management
760. Online Painting Auction
761. Reality Show Ticket Booking System
762. Online Broadway Motel Food Ordering System
763. Fashion Studio Model Management
764. Women's Selfhelp Group
Advance Health Care System
765. Gracelife - Charity one click away
766. Medical Reporting System
767. Organizing medical camp for public health development
768. Homeopathy Health Record
769. Consumer Legal Advicer
770. Raw Requried Online Medicine
771. Medical Record Authentication
MORDERN EDUCATION SYSTEM
772. I School
773. Job fair section process
774. Advertising in E-Book
775. Students Skills With Modern Industries
776. College Placement And College Event
777. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
778. Cloud Storage Public Digital Certificate
ERP PROJECTS
779. Customer Relationship Management
780. Corporate Trouble Shooter
781. Corporate Event Organisation
782. Engnering Lab Maintenance
783. Select Your Age(Business Motivation all age group)
784. Software Requirements Analysis for Client Side
785. ERP System (Enterprint Resource Plan
LATEST BANKING
786. User Opinion For Indian Banking Service And Cashless Economy
787. Advanced Banking System
788. EyeBank Management System
ONLINE CONSUMERS PROCESSING
789. Economic Usage of Solar Energy
790. Gps Consumers Complients
791. Online Softskills Tracks
792. Online Buy And Sale Software
793. Budget Home Design
794. Online Product Exchange
795. Jewellery Management
796. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
797. E TENDERING -JAVA
798. Moderate Robatics System with Public Opinion
Java Apps
799. Online overview of skills really used in jobs
800. Land Bank for Nursery
801. Developing Rural Economy
802. ECOPS - Electronics Police Record Management System
803. Website Evaluation Using Opinion Mining
804. Monitoring Suspicious Discussions on Online Forums Using Data Mining
805. INSURANCE MANAGEMENT SYSTEM
806. e-Fraud Prevention based on the Self- Authentication of e-Documents
807. Hope Center
808. Exam crazy
809. BUGS REPORTING SYSTEM
810. LOCATION BASED CONSUMER COMPLAINT
811. Speed Racing
812. ROADSTER
813. META CAFE
814. ONLINE VIDEO LOCKER
815. Management System in Metro Train
816. Plant Shopping on Web
817. Reporting Online Media News Systems
818. Informative Content Extraction
819. E-commerce Complaint Management System
820. Modern Agriculture Development System
821. Loan Online Application
822. Rural Community Developement
823. LOVE AND CARE
824. GREEN PLANT
825. Advance Couier Service
826. Community Awarness
827. E_Music
828. Staff Management System
829. E-TENDERING
830. Hotel Management
831. Crime File Management System
832. Cloud Cyber Attack
833. Cloud Cost Management for Customer Sensitive Data
834. Advance Web based Multimedia Answer Generation
835. Commaunity Awareness
836. E-Commerce Complaints
837. Modern Agriculture Development System
838. Plant Shopping on Web
839. ONLINE VIDEO LOCKER
840. ONLINE VIDEO LOCKER
841. Reporting Online Media News Systems
842. Online Plant Shopping
843. Community Awareness
844. Loan Online Application
845. Modern Agriculture Development System
846. Online Digital Library
847. Geo Base Services
848. Civil Supplies and Consumer Protection Department
849. Citizen Opinions vs Government Policies
850. Protecting Used Data Privacy for Attackers
851. Web Hospital Management
852. Easy SQL Query for Non-IT Manager
853. Online Shopping with Fraud detection
854. Efficient Spatial Query Processing
855. Cryptographic Key Exchange Authentication
856. Online Global Information Service Center
857. Contracts Business Events Management
858. Online Secure image Social Networks
859. Outsourcing of Online Image Reconstruction
860. Trust based Profile Matching Secure Social Network
861. Secure and Distance based Online Social Network (OSN)
862. Efficient Online Image Retrieval System
863. Data Sharing In Cloud Storage by Using Key-Aggregate
864. Multicast Key Management for Cloud
865. Face-to-face contact on Mobile Social Networks
866. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
867. Dynamically Growing Online Survey for Behavioral Outcomes
868. Advance Web based Multimedia Answer Generation
869. College Result Analysis with Horizontally Distributed Databases
870. Feedback Decision Support for mHealth monitoring
871. Exchange Secrete Key for Data Producers and Consumers
872. Efficient Information Retrieval Using Ranked Query (EIRQ)
873. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
874. Web Hosting On Cloud
875. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
876. Web Server Security with Web Client Management System
877. Web Parser on Sequence Alignment Techniques
878. Web Page re-Ranking System for Library
879. Web Eye
880. Voting System for Web Library
881. VIRTUAL CLASSROOM SYSTEM
882. Unique Web Resources Utilization Monitoring System
883. Transport Management System
884. Pre-paid Recharging System on Banking
885. Tollgate Management
886. Time To Time Stock Market Updater and Monitoring System
887. Sql Tuner
888. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
889. SMS Based Mobile Banking with Security
890. Sms Topup
891. Vendor Information System For Shipping
892. Sequential Anomaly Detection from User Behaviour
893. Secure SMS Transaction System on banking
894. Secure Online Documents Management System in Cloud
895. Secure File Uploading Server with Advance Protecting System
896. Secure File Monitoring System on Cloud
897. Relational Logic Search Engine On Healthcare
898. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
899. Quick Customer decision support on Web Sales Portal
900. Query Response System for File Management
901. Quality Visualization on Web TV
902. Project Work Tracking System
903. Product Market Manipulations on Asian stock market
904. Predicting Top Company Share Based on High Utility Data
905. Automation of Analysis and Development Management
906. Pharmacy Information System
907. Personalize Your News on Web
908. Online University
909. Online tagging for multimedia content
910. Online Search Ranking On Multiple Domain
911. Online Rental House Web Portal
912. Online Recruitment System
913. Online Real Estate Property Management
914. Online Multi Type Documents Search Engine
915. ONLINE MOBILE BILLING SYSTEM
916. Online Jewelry Management
917. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
918. Online Examination System
919. Online Ensemble Learning Approach
920. Online Banking With Fraud Detecting
921. Online Auction Bit
922. ONLINE ADVERTISING SYSTEM
923. Nutraceuticals Management System
924. Nearest Shopping Location Identification Systems
925. Multilevel Images Authentication Systems
926. Multi New Product Survey Management
927. Movie Recommender Systems via User- Item Subgroups
928. Movie Rating and Recommendation on Mobile
929. Modern Municipal Corporation
930. Mobile TV Quality Management
931. Mobile Banking WAP
932. Manifold Entrust Scheme
933. Management System in Train
934. Secure Mailing System
935. Location-Based Spatial Query Processing in Wireless Broadcast Environments
936. LEAVE MANAGEMENT SYSTEM FOR MNC
937. Knowledge Based Decision Support System(KMS)
938. Key Management for Content Integration
939. Inter Bank Fund Transfer in Distributed Network
940. Information and Knowledge Extracting from a large amount of data
941. Industry Standard Authorization For Sensitive Resources
942. Implementation and Validating Environmental and Health
943. iKnoweb Extracting and Integrating Entity Information System
944. HUMAN ASSURANCE ADMINISTRATION
945. High_level network Security Using Packet Filtering
946. High and Low Level SQL Query Executor
947. GLOBAL COUNSELLING SYSTEM
948. A Game Theory for Online Security
949. Distributed Transaction Proxy
950. Freelancer Job
951. File Security With Multi Database System
952. FILE SEARCH ENGINE
953. Fertilizer Management System
954. Fast Web Information Gathering with Alias Detection
955. E-Tutor Online Jobs
956. Enterprise Stock and Accounting System
957. Ensuring Data Storage Security in Cloud Computing
958. Encrypted IT Auditing on Cloud Computing
959. Encrypted Data Storage Vs Data Against illegal Access
960. Enabling Site Interaction In Social Community
961. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
962. E-Music world
963. Employee Resource Management
964. Employee Management System
965. E-Learning
966. E Fraud Prevention based on the Self Authentication of e Documents
967. Distribution System for Discount Sales
968. Distributed Data Integration on Electricity Board
969. Disease Information Hiding on Publishing Healthcare Data
970. Digital Documents Attestation Systems
971. Defending Against Web Application Vulnerabilities
972. Defects Analysis Systems
973. Data theft detection mobile cloud computing
974. Data Base Fraud Detection Systems
975. Customer Information Hiding for Data Mismanagement in Banking
976. Company Security Reporting System(CSRS)
977. E -Crime File Management System
978. Credit Card Management System
979. Corporate Requirement System
980. Consumer Sales Online Fake Product Detection and Deletion
981. Company Information Tracking System
982. Cloud Policy-Based File Assure Deletion
983. Cloud Data Theft Attacks
984. Cloud Cyber Attacks against Social Networks
985. Cloud Cost Management for Customer Sensitive Data
986. Client Favorite Photo Search Engine on Web
987. Citizen Card System
988. Card Management System
989. Design &Development of Car Parking and Automation Billing Systems
990. Customer Care Service
991. BPO Call Center
992. Automation of IT Process Management
993. Modeling and Automated Containment of Worms
994. Attribute Key Based Data Security System
995. As Needed Basis Accountability for Cloud Data Sharing
996. Annotation of short texts With Wikipedia pages
997. AIRLINE RESERVATION SYSTEM
998. Advance User Management on Social Website
999. A Semantic Web Based Scientific News Aggregator


Java Mini Projects
Mini Projects
1000. Website Tracking System
1001. Website Ranking System
1002. Treasure Warehouse
1003. Student Information System
1004. Storage security
1005. PRISON MANAGEMENT SYSTEM
1006. E-Licence Investigation System
1007. Online Secure File Transfer System
1008. Online Medicine Purchase
1009. ONLINE EDUCATION
1010. Online Agriculture System
1011. Mobile Survey
1012. ISSUE TRACKING SYSYTEM
1013. HOSPITAL MANAGEMENT SYSYTEMS
1014. HealthCare Management System
1015. Global Employee Acclaimer
1016. E-VOTING FOR ASSOCIATION
1017. Encrypted Register Form
1018. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1019. E INSURANCE
1020. Courier Tracking Systems
1021. corporate Transportation
1022. Collectorate Communication Systems
1023. Budget Approval System
1024. BLOOD BANK MANAGEMENT SYSTEMS
1025. ATTENDANCE MANAGEMENT SYSTEM
1026. Activity management


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
1027. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
1028. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
1029. NAIVE BAYES CLASSIFIER
1030. K - MEANS CLUSTERING
1031. LINEAR REGRESSION - PYTHON
1032. LATENT DIRICHLET ALLOCATION
1033. DIGITAL IMAGE PROCESSING - PYTHON
1034. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
1035. MACHINE LEARNING-ML ALGORITHM
1036. WHAT IS MACHINE LEARNING - AI
1037. NATURAL LANGAUAGE PROCESSING - NLP
1038. VISION - Visual Data


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
1039. R - ADVANCE IMAGE PROCESSING
1040. Dengu Data Analysis Using R-program
1041. Shopping Data set Analysis Using R Machine Learning
1042. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
1043. R PROGRAM TRAINING
1044. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
1045. COMAPRISON OF VARIOUS DOCKING SCORES
1046. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
1047. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
1048. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
1049. MICRO ARRAY GENE EXPRESSION ANALYSIS
1050. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
1051. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
1052. Diabetics Dataset
1053. Excercise Dataset
1054. MEDICAL DATA ANALYSES
1055. WEKA PRIVACY DATA SET ANALYSES


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
1056. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
1057. MRSIM: Mitigating Reducer Skew In MapReduce
1058. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
1059. HADOOP WITH HEALTHCARE DATA ANALYSYS
1060. HADOOP WEBLOG DATA ANALYSES
1061. BANK DATA ANALYTIC WITH HADOOP
1062. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1063. Bucket Based Data Deduplication Technique for Big Data Storage System
1064. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
1065. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
1066. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
1067. Efficient Recommendation of De-identification Policies using MapReduce
1068. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
1069. Big Scholarly Data: A Survey
1070. SocialQ&A: An Online Social Network Based Question and Answer System
1071. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1072. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1073. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
1074. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1075. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
1076. User-Centric Similarity Search
1077. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
1078. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
1079. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
1080. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
1081. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
1082. Processing Incomplete k Nearest Neighbor Search
1083. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
1084. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
1085. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
1086. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
1087. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
1088. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
1089. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
1090. Deduplication on Encrypted Big Data in Cloud
1091. Dynamic Resource Allocation for MapReduce with Partitioning Skew
1092. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
1093. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
1094. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
1095. Self-Healing in Mobile Networks with Big Data
1096. Secure Sensitive Data Sharing on a Big Data Platform
1097. Big Data, Big Knowledge: Big Data for Personalized Healthcare
1098. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
1099. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
1100. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1101. Differentially Private Frequent Itemset Mining via Transaction Splitting
1102. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
1103. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
1104. Fast Best-Effort Pattern Matching in Large Attributed Graphs


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
1105. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
1106. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
1107. Who Moved My Data? Privacy Protection in Smartphones
1108. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
1109. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
1110. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
1111. Privacy-Preserving Aggregate Queries for Optimal Location Selection
1112. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
1113. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
1114. Efficient Clue-based Route Search on Road Networks
1115. Privacy-Preserving Location-Proximity for Mobile Apps
1116. Cooperative Query Answer Authentication
1117. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
1118. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
1119. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
1120. ZapDroid: Managing Infrequently Used Applications on Smartphones
1121. Searching Trajectories by Regions of Interest
1122. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
1123. A Classroom Scheduling Service for Smart Classes
1124. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
1125. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
1126. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
1127. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
1128. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1129. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
1130. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1131. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
1132. Authentication of Smartphone Users Using Behavioral Biometrics
1133. An Exploration of Geographic Authentication Schemes
1134. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
1135. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
1136. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
1137. Distributed secret sharing approach with cheater prevention
1138. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
1139. Efficient privacy preserving location based query over outsourced encrypted data
1140. Utilizing the Cloud to Store Hijacked Camera Images
1141. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
1142. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
1143. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
1144. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
1145. Enabling privacy preserving location proof for mobile users.
1146. Optimizing User Experience in Choosing Android Applications
1147. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
1148. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
1149. FoodForCare: An Android Application for Self-Care with Healthy Food
1150. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
1151. Silence is Golden: Enhancing Privacy of Location-Based Services
1152. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
1153. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
1154. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
1155. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
1156. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
1157. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
1158. Adapting to User Interest Drift for POI Recommendation
1159. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
1160. Developing Apps for visually imapired people: Lessons learned from social network
1161. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
1162. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
1163. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
1164. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
1165. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
1166. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
1167. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
1168. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1169. Mobile cloud support for semantic enriched speech recognition in social care
1170. Distributing secret sharing approach with cheater prevention based on QR code
1171. Design of Secure Location and Message Sharing System for Android Platform
1172. The impact of cloud technology on the automation of businesses
1173. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
1174. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
1175. Rescue Management System
1176. Android Army - Military Apps
1177. Android Beauty Parlor
1178. Android E Municipality
1179. ANDROID NURSE AID
1180. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
1181. Human Resource (HR)- APPS
1182. GPS Employee Tracking System
OUR MODERN SOCITY
1183. GENERIC MEDICINE
1184. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
1185. RECYCLE APP WASTE COLLECTION REUSE
1186. Bikes Rental - APPS
1187. Location Based Alarm - GPS
1188. ANDROID APPS FOR INSURANCE SYSTEM
1189. BUDGET HOME DESIGN -ANDROID APPS
1190. Former To Former Apps
1191. Pets Care
ONLINE CONSUMERS PROCESSING
1192. House Hold Appliancies Warranty Management
1193. GPS Transport Packers and Movers
Android Apps
1194. MY LIBRARY
1195. FACULTY RATING SYSTEM
1196. App for self organizer
1197. ONLINE DOCTOR APPOINTMENT
1198. Conference Event Mobile Assistant
1199. Mobile Prescription
1200. Metastore Application
1201. Android SmartCampus
1202. Android Shopping Mall
1203. TOLL GATE -Barcode Billing System --ANDROID
1204. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1205. Taste Hunt For Restaurants
1206. POLICE APPS
1207. Android Blood Bank
1208. Mobile Expense Claim System Android
1209. Android Intelligent Time Tracking System TICK
1210. Android Course and Attendance Management System
1211. Android Event Reminder
1212. Android Attendance Assessment
1213. Android Advance Shopping
1214. Android CAR POOLING
1215. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1216. Android HOSPITAL
1217. ATHLETE MEET GUIDE
1218. Android Apps PARKING MANAGER
1219. Love and Care
1220. Food Waste Management System
1221. Travel Guide
1222. Android Provisional Store
1223. Best Baby Care with Vaccines Remainder
1224. Android Assist for Lecturer and Student
1225. Android Personal Assistance (PA)
1226. Android Application for College Management System
1227. Tollgate Payment system in android
1228. Intelligence Quotient (IQ) Test
1229. GPS LOCATION ALARM SYSTEM
1230. Location Based Intelligent Mobile Organizer
1231. BANK ACCOUNT TRACKER FOR ANDROID
1232. UNIT CONVERTER
1233. Tips and Tax Calculator in Android
1234. TEXT EDITOR FOR ANDROID
1235. Student Attendance Tracking System
1236. Smart Money With Daily Expenses
1237. Simple And Secure Android TO DO List Application
1238. Restaurant Table Order Management System
1239. Online Shopping
1240. Online Examination System For Android
1241. ANDROID SHOPPING LOCATION IDENTIFIER
1242. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1243. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1244. MICRO CREDIT BANKING ON SMARTPHONE
1245. LOCATION BASED ALARM
1246. Insurance in android
1247. GOOGLE PLACE FINDER
1248. Friend Mapper on Mobiles - Friend Locator
1249. EXPENSE MANAGER
1250. Employee Diractory
1251. Online job search
1252. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1253. ANDROID STUDENT RESULT ANALYZING SYSTEM
1254. CloudMoV : Cloud-based Mobile Social TV
1255. Bus Reservation
1256. Budget Planner
1257. Android SMS Systems
1258. ANDROID LEAVE MANAGEMENT SYSTEM
1259. ANDROID EVENT SCHEDULER/REMINDER
1260. Android Grocery Shopping List
1261. Android Attack Application
1262. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1263. A Mobile Phone Based Medicine In-take Reminder and Monitor


COLLEGE MINI PROJECTS
DOT NET MINI PROJECTS
PHP - MINI PROJECTS
JAVA -MINI PROJECT
PYTHON
1264. HOTEL MANAGEMENT
1265. GYM MANAGEMENT APPLICATION
1266. ONLINE BOOK STORE


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1267. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1268. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
1269. Optimizing Display Advertising Markets
1270. Using Knowledge Libraries to Transfer Expert Knowledge
1271. Semantic Retrieval of Trademarks Based on Conceptual Similarity
1272. Understanding and Predicting Question Subjectivity in Social Question and Answering
1273. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
1274. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
1275. Fast Top-K Path-based Relevance Query on Massive Graphs
1276. Web Image Search Re-ranking with Click-based Similarity and Typicality
1277. Automatically Mining Facets for Queries from Their Search Results
1278. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
1279. Statistical Entity Extraction from Web
1280. Question Answering System for an Effective Collaborative Learning
1281. Lost in Translation: Improving Decoy Documents via Automated Translation
1282. Learn to Personalized Image Search from the Photo Sharing Websites
1283. In Tags We Trust Trust modeling in social tagging of multimedia content
1284. Efficient Anonymous Message Submission
1285. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
1286. Employment Knowledge Database
1287. Organise Corporate Training For Client Project s
1288. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1289. ONLINE VEHICLE SHOWROOM SYSTEMS
1290. Online Voting
1291. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1292. School Management System
1293. Secure Online Course Automation
1294. School Automation System
1295. Online Aquarum
1296. Web Direct Recruitment Analysis
PHP Apps
1297. Project Approval System
1298. Movie Ticket Booking
1299. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1300. TRADE / INDUSTRY WEB PORTAL
1301. Feeding the poor from the supermarket
1302. Application for recording your goals and habits
1303. VISUAL WAY TO RAISE AWARENESS
1304. Municipal Corporation
1305. Online Polling For Publishers And Brands
1306. Avoid Food Wastage
1307. Web Doctor
1308. ONLINE FOOD ORDERING SYSTEM
1309. E-Tendering
1310. Improving Rural Communities
1311. Green Planet Awarness
1312. Development of an Online Course Portal for a campus
1313. Auxon Test
1314. WEB BASED LEARNING SYSTEM
1315. Tagging in online social networks
1316. Secured file Downloading system
1317. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1318. searching a image from websites
1319. Online University
1320. Online product Opinion and Ranking System
1321. MNC LEAVE MANAGEMENT SYSTEM
1322. Home appliances online purchase
1323. Freelancer Job
1324. E-Tutor Online Jobs
1325. Statistical Entity Extraction from Web
1326. Effective Collaborative Learning
1327. Development of an e-Post Office System
1328. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
1329. Towards Effective Bug Triage with Software Data Reduction Techniques
1330. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
1331. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
1332. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
1333. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
1334. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
1335. Proof of retrievability with public verifiability resilient against related-key attacks
1336. Secure Anonymous Key Distribution Scheme for Smart Grid
1337. Converses For Secret Key Agreement and Secure Computing
1338. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
1339. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
1340. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1341. Privacy Protection based Access Control Scheme in Cloud-based Services
1342. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
1343. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
1344. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1345. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1346. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1347. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1348. Explaining Missing Answers to Top-k SQL Queries
1349. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1350. Continuous Top-k Monitoring on Document Streams
1351. Generating Query Facets using Knowledge Bases
1352. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1353. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1354. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1355. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1356. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1357. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1358. Generating Query Facets using Knowledge Bases
1359. Private Over-threshold Aggregation Protocols over Distributed Datasets
1360. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1361. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1362. Privacy Protection based Access Control Scheme in Cloud-based Services
1363. Dynamic Facet Ordering for Faceted Product Search Engines
1364. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1365. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1366. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1367. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1368. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1369. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1370. A Recommendation System to Facilitate Business Process Modeling
1371. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1372. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1373. User Differentiated Verifiable File Search on the Cloud
1374. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1375. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1376. Incremental Consolidation of Data-Intensive Multi-flows
1377. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1378. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1379. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1380. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1381. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1382. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1383. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1384. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1385. TagBook: A Semantic Video Representation without Supervision for Event Detection
1386. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1387. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1388. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1389. The Impact of Review Environment on Review Credibility
1390. Private Over-threshold Aggregation Protocols over Distributed Datasets
1391. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1392. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1393. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1394. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1395. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1396. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1397. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1398. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1399. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1400. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1401. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1402. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1403. What Is Happening in The Video Annotate Video by Sentence
1404. Two level QR code for private message sharing and document authentication.
1405. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1406. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1407. Mining Health Examination Records A Graph-based Approach
1408. A Credibility Analysis System for Assessing Information on Twitter
1409. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1410. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1411. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1412. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1413. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1414. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1415. Predicting Personalized Image Emotion Perceptions in Social Networks
1416. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1417. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1418. Explaining Missing Answers to Top-k SQL Queries
1419. Bilevel Feature Extraction Based Text Mining
1420. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1421. Privacy-Preserving Outsourced Media Search
1422. Modeling and Verification of Online Shopping Business Processes
1423. User Preference Learning for Online Social Recommendation
1424. Steganalysis Features for Content-Adaptive JPEG Steganography
1425. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1426. PiCode: a New Picture-Embedding 2D Barcode
1427. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1428. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1429. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1430. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1431. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1432. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1433. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1434. Cloud workflow scheduling with deadlines and time slot availability
1435. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1436. Path-Based Epidemic Spreading in Networks
1437. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1438. On the Resiliency of Static Forwarding Tables
1439. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1440. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1441. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1442. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1443. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1444. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1445. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1446. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1447. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1448. Hacking is not random: a case-control study of webser ver-compromise risk
1449. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1450. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1451. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1452. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1453. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1454. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1455. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1456. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1457. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1458. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1459. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1460. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1461. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1462. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1463. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1464. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1465. Cross-Domain Feature Learning in Multimedia
1466. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1467. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1468. Saliency-based color accessibility
1469. Contextual Online Learning for Multimedia Content Aggregation
1470. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1471. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1472. An Attribute-assisted Reranking Model for Web Image Search
1473. RRW - A Robust and Reversible Watermarking
1474. Steganography Using Reversible Texture Synthesis
1475. Single Image Super-Resolution Based on Gradient Profile Sharpness
1476. Detection and Rectification of Distorted Fingerprints
1477. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1478. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1479. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1480. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1481. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1482. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1483. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1484. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1485. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1486. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1487. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1488. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1489. Authenticated Key Exchange Protocols for Parallel Network File Systems
1490. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1491. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1492. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1493. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1494. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1495. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1496. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1497. Context-based Diversification for Keyword Queries over XML Data
1498. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1499. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1500. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1501. Tweet Segmentation and Its Application to Named Entity Recognition
1502. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1503. Automatic Group Happiness Intensity Analysis
1504. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1505. Query Aware Determinization of Uncertain Objects
1506. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1507. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1508. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1509. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1510. Efficient Community Formation for Web Services
1511. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1512. Secure Mining of Association Rules in Hor izontally Distributed Databases
1513. Dynamic Query Forms for Database Queries
1514. Secure kNN Query Processing in Untrusted Cloud Environments
1515. An Empirical Performance Evaluation of Relational Keyword Search Systems
1516. Keyword Query Routing
1517. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1518. Demand Bidding Program and Its Application in Hotel Energy Management
1519. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1520. Incremental Detection of Inconsistencies in Distributed Data
1521. A Cocktail Approach for Travel Package Recommendation
1522. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1523. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1524. Analysis of Field Data on Web Security Vulnerabilities
1525. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1526. A Reliability Improvement Method for SOA-Based Applications
1527. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1528. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1529. Web Service Recommendation via Exploiting Location and QoS Information
1530. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1531. Exploiting Rateless Codes in Cloud Storage Systems
1532. COMIC:Cost Optimization for Internet Content Multihoming
1533. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1534. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1535. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1536. Uniform Embedding for Efficient JPEG Steganography
1537. Secure Deduplication with Efficient and Reliable Convergent Key Management
1538. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1539. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1540. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1541. Location Aware Keyword Query Suggestion Based on Document Proximity
1542. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1543. A secure data self-destructing scheme in cloud computing
1544. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1545. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1546. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1547. Secure kNN Query Processing in Untrusted Cloud Environments
1548. Exploiting Rateless Codes in Cloud Storage Systems
1549. Fuzzy Authorization for Cloud Storage
1550. Planning vs. dynamic control Resource allocation in corporate clouds
1551. Automatic Scaling of Internet Applications for Cloud Computing Services
1552. Strategy-proof Pricing for Cloud Service Composition
1553. Privacy Preserving Delegated Access Control in Public Clouds
1554. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1555. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1556. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1557. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1558. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1559. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1560. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1561. A Scientometric Analysis of Cloud Computing Literature
1562. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1563. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1564. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1565. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1566. FeatureMatch: A General ANNF Estimation Technique and its Applications
1567. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1568. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1569. As-Projective-As-Possible Image Stitching with Moving DLT
1570. Sharing Visual Secrets in Single Image Random Dot Stereograms
1571. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1572. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1573. A New Iterative Triclass Thresholding Technique in Image Segmentation
1574. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1575. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1576. An Iranian License Plate Recognition System Based on Color Features
1577. Learning Layouts for Single-Page Graphic Designs
1578. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1579. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1580. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1581. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1582. Fingerprint Compression Based on Sparse Representation
1583. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1584. LBP-Based Edge-Texture Features for Object Recoginition
1585. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1586. Toward Experiential Mobile Media Processing
1587. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1588. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1589. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1590. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1591. Designing Truthful Spectrum Double Auctions with Local Markets
1592. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1593. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1594. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1595. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1596. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1597. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1598. A Study on Clinical Prediction Using Data Mining Techniques
1599. Online Payment System using Steganography and Visual Cryptography
1600. Efficient Instant-Fuzzy Search with Proximity Ranking
1601. Attribute Based Encryption with Privacy Preserving In Clouds
1602. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1603. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1604. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1605. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1606. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1607. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1608. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1609. The Target Tracking in Mobile Sensor Networks
1610. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1611. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1612. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1613. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1614. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1615. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1616. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1617. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1618. SUSIE: Search Using Services and Information Extraction
1619. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1620. Secure Mining of Association Rules in Horizontally Distributed Databases
1621. Sampling Online Social Networks
1622. Privacy Preserving Delegated Access Control in Public Clouds
1623. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1624. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1625. Ginix : Generalized Inverted Index for Keyword Search
1626. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1627. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1628. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1629. Dynamic Query Forms for Database Queries
1630. Cost-Based Optimization of Service Compositions
1631. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1632. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1633. Automatic Extraction of Top-k Lists from the Web
1634. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1635. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1636. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1637. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1638. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1639. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1640. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1641. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1642. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1643. Privacy Preserving Data Sharing With Anonymous ID Assignment
1644. Non-Cooperative Location Privacy
1645. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1646. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1647. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1648. Cloud based emails boundaries and vulnerabilities
1649. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1650. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1651. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1652. Optimal Content Downloading in Vehicular Networks
1653. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1654. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1655. View-invariant action recognition based on Artificial Neural Networks
1656. User-aware Image Tag Refinement via Ternary Semantic Analysis
1657. Separable Reversible Data Hiding in Encrypted Image
1658. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1659. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1660. Robust Face-Name Graph Matching for Movie Character Identification
1661. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1662. Improving Color Constancy by Photometric Edge Weighting
1663. Exploring the design space of social network-based Sybil defenses
1664. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1665. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1666. AnnoSearch: Image Auto-Annotation by Search
1667. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1668. Scalable Scheduling of Updates in Streaming Data Warehouses
1669. Scalable Learning of Collective Behavior
1670. Ranking Model Adaptation for Domain-Specific Search
1671. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1672. Outsourced Similarity Search on Metric Data Assets
1673. Organizing User Search Histories
1674. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1675. Mining Web Graphs for Recommendations
1676. Joint Top K Spatial Keyword Query Processing
1677. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1678. Identifying Content for Planned Events Across Social Media Sites
1679. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1680. Generative Models for Item Adoptions Using Social Correlation
1681. Efficient Data Mining for XML Queries Answering Support
1682. Efficient audit service outsourcing for data integrity in clouds
1683. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1684. Effective Pattern Discovery for Text Mining
1685. Combined Mining: Discovering Informative Knowledge in Complex Data
1686. Decentralized Probabilistic Text Clustering
1687. Computing Structural Statistics by Keywords in Databases
1688. Bridging Social and Data Networks
1689. Answering General Time-Sensitive Queries
1690. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1691. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1692. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1693. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1694. Resource-Aware Application State Monitoring
1695. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1696. Query Access Assurance in Outsourced Databases
1697. Linear and Differential Cryptanalysis
1698. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1699. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1700. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1701. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1702. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1703. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1704. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1705. ROAuth: Recommendation Based Open Authorization
1706. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1707. Recommendation Models for Open Authorization
1708. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1709. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1710. On Privacy of Encrypted Speech Communications
1711. OAuth Web Authorization Protocol
1712. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1713. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1714. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1715. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1716. Fast Matrix Embedding by Matrix Extending
1717. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1718. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1719. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1720. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1721. Measuring Code Quality to Improve Specification Mining
1722. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1723. Towards Secure and Dependable Storage Services in Cloud Computing
1724. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1725. Remote Display Solutions for Mobile Cloud Computing
1726. Privacy Preserving Delegated Access Control in Public Clouds
1727. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1728. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1729. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1730. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1731. Load-Balancing Multipath Switching System with Flow Slice
1732. Assessing the Veracity of Identity Assertions via OSNs
1733. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1734. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1735. A New Cell-Counting-Based Attack Against Tor
1736. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1737. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1738. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1739. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1740. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1741. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1742. Fast Release Capture Sampling in Large-Scale Sensor Networks
1743. Cooperative download in vehicular environments
1744. Cooperative Data Dissemination via Roadside WLANs
1745. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1746. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1747. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1748. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1749. Hiding Sensitive Association Rule for Privacy Preservation
1750. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1751. Development of Certificate Authority Services for Web Applications
1752. Detecting and Validating Sybil Groups in theWild
1753. Association Rule Extracting Knowledge Using Market Basket Analysis
1754. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1755. Valuable Detours: Least-Cost Anypath Routing
1756. Self-Reconfigurable Wireless Mesh Networks
1757. Reliability in Layered Networks with Random Link Failures
1758. NABS:Novel Approaches for Biometric Systems
1759. Live Streaming with Receiver-based Peer-division Multiplexing
1760. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1761. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1762. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1763. Virtualized Screen: A Third Element for CloudMobile Convergence
1764. Steganographic Embedding in JPEG Images with Visual Criterion
1765. On the Typical Statistic Features for Image Blind Steganalysis
1766. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1767. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1768. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1769. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1770. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1771. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1772. Vulnerability Analysis in SOA-Based Business Processes
1773. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1774. Service-Centric Framework for a Digital Government Application
1775. Server-Side Streaming Processing of WS-Security
1776. OWLPath: An OWL Ontology-Guided Query Editor
1777. Monitoring Service Systems from a Language-Action Perspective
1778. Extracting Product Features and Sentiments from Chinese Customer Reviews
1779. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1780. Automated Certification for Compliant Cloud-based Business Processes
1781. Addressing Dependability throughout the SOA Life Cycle
1782. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1783. The Geometric Efficient Matching Algorithm for Firewalls
1784. Secure Service-Oriented Architecture for Mobile Transactions
1785. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1786. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1787. Privacy-Preserving Updates to Anonymous and Confidential Databases
1788. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1789. IPAS: Implicit Password Authentication System
1790. Improving Security and Performance in the Tor Network through Tunable Path Selection
1791. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1792. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1793. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1794. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1795. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1796. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1797. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1798. Data Delivery Properties of Human Contact Networks
1799. Converge-Cast: On the Capacity and Delay Tradeoffs
1800. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1801. USHER: Improving Data Quality with Dynamic Forms
1802. The World in a Nutshell: Concise Range Queries
1803. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1804. Scalable Scheduling of Updates in Streaming Data Warehouses
1805. Scalable Learning of Collective Behavior
1806. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1807. Publishing Search Logs A Comparative Study of Privacy Guarantees
1808. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1809. Optimal Service Pricing for a Cloud Cache
1810. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1811. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1812. Mining Web Graphs for Recommendations
1813. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1814. Integration of Sound Signature Authentication System
1815. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1816. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1817. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1818. Exploring Application-Level Semantics for Data Compression
1819. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1820. Data Leakage Detection
1821. Cost-aware rank join with random and sorted access
1822. Collaborative Filtering with Personalized Skylines
1823. Bridging Socially-Enhanced Virtual Communities
1824. Automatic Discovery of Personal Name Aliases from the Web
1825. A Personalized Ontology Model for Web Information Gathering
1826. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1827. A Query Formulation Language for the Data Web
1828. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1829. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1830. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1831. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1832. Towards Secure and Dependable Storage Services in Cloud Computing
1833. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1834. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1835. Data Integrity Proofs in Cloud Storage
1836. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1837. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1838. Feature-level Sentiment Analysis for Chinese Product Reviews
1839. Equal-sized Cells Mean Equal-sized Packets in Tor?
1840. Customer Relationship Management Based on Data Mining Technique
1841. Authentication Schemes for Session Passwords using Color and Images
1842. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1843. Online Trends Management Service in It Industry
1844. Session Management System in It Industry
1845. Tools for Non IT Expert Developer
ERP PROJECTS
1846. New Company Policy Clearance System
1847. Recommend To Friend
1848. Consultanting About the Foreign Peoples
1849. Performance System Analysis In Industry
1850. Non It People Performance
MODERN AGRICULTURE
1851. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1852. Agriculture Marketing in Generation
1853. Agriculture Assist
1854. Sponsor For Agriculture
SPORTS
1855. Play Ground Booking
OUR MODERN SOCITY
1856. ADHAR VOTING SYSTEM
1857. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1858. RAILWAY SEAT RESERVATION SYSTEM
1859. Railway Management Service
1860. It Park Media
1861. Automation Transport Maintance
1862. Yell Help For Children
1863. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1864. Apartment Maintenance
1865. Power Consumption Monitoring House Hold Electronic Device
1866. Direct Q Less Reservation System in train
Advance Health Care System
1867. MAC Sensing Protocol
1868. World Wide Cloud Inter Hospital Acess Health Care System
1869. Live Doctor
Dotnet Apps
1870. TELEVISION CHANNEL PROGRAM MANAGEMENT
1871. WIN THE TRUST OF AN INDIAN CONSUMER
1872. ONLINE ACCOUNT MANAGEMENT
1873. SMART CAB BOOKING SYSTEM
1874. ONLINE FAST FOOD ORDER
1875. Travel Mate Add Module
1876. Work Order System Call Centre
1877. SPORTS MANAGEMENT SYSTEM
1878. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1879. Pick-It Courier Service
1880. Online Taxi Booking
1881. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1882. INCOMETAX MAINTAINANCE SYSTEM
1883. Hotel Reservation
1884. ERP System
1885. Bug Tracking System
1886. Vendor Information System For Shiping
1887. Top-K ranking System
1888. Secure Medical Image Archive System
1889. Business Activity Coordination Using Web Services
1890. Management Portal
1891. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1892. Secure Data Filtering Recommendation System
1893. Online Resources Sharing via Social Networks
1894. Secure self-destructing in Cloud Computing
1895. Web Resourecs File Authorization Management
1896. Click based image re-ranking system
1897. Tree Structure Data Analiysis Mining
1898. Web Resource Allocation for CorPerate
1899. Web Vulnerabilities and Security
1900. Fuzzy Cloud Search Using XML
1901. Cloud Data Supporting Secure Query Search
1902. Tour Recommender Systems on Web
1903. Distributed Interactive Web Applications
1904. Secure Query Processing for Cloud
1905. Online Data Storage with less pricing
1906. Cost Based Web Content Managemnts
1907. Web Hospital Management
1908. Online Data storage with low price
1909. Secure Online Data Block Authorization
1910. Profitable Onlin web Server System
1911. Online Economies File Manager for Multi Keying
1912. Online Community Management
1913. Key based Online Data Managements
1914. Critical Workflow Management for Web Documents
1915. Secure Online Documents Managements for Group Sharing
1916. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1917. Online Marketing Automation System
1918. Internal organization change management System
1919. Secure confirmation of sensitive transaction data in modern Internet banking services
1920. Privacy security with TPA in cloud computing
1921. Company Information Tracking System
1922. Online Virtualized screen Processing
1923. Web Service for Airline Management
1924. Web Social Club
1925. Quantum Key Cryptography
1926. Patient Data Management Based On Hospital Location
1927. Online Software Developer Community
1928. Online Developed Software sales
1929. Avoid repeated measurements On Genetics Dataset
1930. College Lab Maintenance System
1931. Industrial Manpower Resource Organizer
1932. Web Query Construction and Search on Complex Data
1933. Hospital Emergency Data Management
1934. Data confidentiality On Health-care Information System
1935. Secure Online Trading
1936. Fast Real-Time Event Alert Using social Network
1937. Secure E-Mail Organizer
1938. Web User Service Management System
1939. Easy SQL Query for Non-IT Manager
1940. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1941. Customer Relationship Management (CRM) on Banking
1942. Online Company ERP System
1943. Constructing E-Tourism
1944. Web based Multi Service Ranking System
1945. Dynamic Customer Data Hiding in Banking
1946. Online Distributed Social Clubs
1947. Virtual Shopping with Negative Feedback Reputation Systems
1948. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1949. Web Service Oriented Query Authentication Technique
1950. Web Based Customer Favorite vehicle Search Engine
1951. Web Based Book Publishing System
1952. Virtual Energy- Based Encryption and Keying
1953. Video Fraud Detecting On social Network
1954. Video Compression with Data hiding & Data Extraction
1955. Vendor Information System for Shipping
1956. VALUE ADDED TAX (VAT)
1957. Universal Smart Card
1958. Ultimate Location Information Systems
1959. Top K Ranking System
1960. Techno Task Manager
1961. Supply Chain Management
1962. Substitution-Permutation cryptanalysis System
1963. Streaming Data Warehouse Updations
1964. Step by Step Monitoring for Product Purchasing System
1965. Steganography for Data Reading and Writing AVI files
1966. SQL TUNER
1967. SMS Transaction Security
1968. Session Authentication Passwords using Color
1969. Service Availability Guarantees on Virtual Economy
1970. Server Fraud Detection on Cloud
1971. Sentence Based Search on Cloud
1972. Semantic Web Search Engines
1973. Secured Image communicator
1974. Secure smart application on web application
1975. Secure Service-Oriented Smartcard systems
1976. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1977. Secure Location Identification System
1978. Secure and Cloud Based Patient Information Systems
1979. Reduce the Password Guessing Attacks using Click Point
1980. Recommendation System Based on Graph
1981. Quantum Key Cryptography
1982. Quality Controller
1983. Public Web Status Monitoring System
1984. Project Trade Pool
1985. Product Marketing Analysis On Public Opinion
1986. Predicting Users Behaviors Using Web Mining
1987. Personal Health Information on M-Healthcare Emergency
1988. Optimum Online Knowledge Base
1989. Online Training Program
1990. Online Time sensitive queries
1991. Online Tag Based Image Retrieval and Effective Management
1992. Online Social networks controls using cloud
1993. Online Rental System
1994. Online product Opinion and Ranking System
1995. Online Dynamic form creation for Non-IT Peoples
1996. Online Digital Contract Signing in Mistrusted Parities
1997. Online Aventure
1998. Online Shopping
1999. News Ticker Project
2000. Net Bank in Recharge
2001. Multi User Public Auditing System of Data Storage Security
2002. Multi Location Networked Mobile Auto Intimates
2003. Modern Distributed Business Applications for Supply Chain Management
2004. Market Intelligence Based Public Sentiment Analysis
2005. Leave Management System
2006. Joint processing of spatial keyword queries
2007. Intelligence Missing Items in Shopping Cart
2008. Information Leak Detection and Prevention
2009. Industrial Manpower Resource Organizer
2010. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
2011. Human Expertise Search Engine
2012. Home appliances online Purchase
2013. High Secure Corporate Web Search Engine
2014. High Degree Patient Privacy on Secure Data Outsourcing
2015. Group Movement Pattern Discovery
2016. Graph Based Share Market Data Updating
2017. Generic Business Portal
2018. Flight Booking Portal
2019. Firewall using Packet Filtering
2020. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
2021. Ethical and Social issues in File sharing system
2022. Enterprener Sales Report Management
2023. Encyclopedia for Computer Science
2024. Employee Based Performance Monitoring and Action Systems
2025. Emerging Patient Health Information Exchange System On Cloud
2026. Efficient Search on Outsourced data using Cloud
2027. Efficient and Secure Data Processing on Queries Similarity
2028. Distributed Database Optimization on HealthCare
2029. Digital Asset Management Systems (DAMS) Using Watermarking
2030. Detecting Fraud on Vehicle Insurance System
2031. Defeating Lazy Servers Database Vs Query Access Assurance
2032. Data Processing for Disease-Treatment Relations
2033. Data Mining Analysis on EB bill system
2034. Data confidential against untrusted servers using attribute-based encryption (ABE)
2035. Data Aggregation using SQL clustering
2036. Customer Sales Analysis System Based On Purchasing
2037. Cryptography on Personal confidential information
2038. Cost Based Secure Cloud Data Systems
2039. Market Based Analysis for consumer correct decision
2040. Construction Company Work Order System
2041. Complete Medical Transcription System(Mts)
2042. Company Security Reporting System(CSRS)
2043. College Result Analysis
2044. Cloud Economic Benefit On Scientific Computing
2045. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
2046. Centralized Event Planer across Social Media Sites
2047. Call Center Management
2048. A Reservation-Based Coordination Protocol for Web Services
2049. Building construction and cost estimation
2050. Budget Planner
2051. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
2052. Automatically identifying query groups on Web Search Engine
2053. Auditing Data integrity and data storage using cloud
2054. Application layer blocker for preventing on cyber security
2055. Advanced One-Click User Web Search Engine
2056. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
2057. VALUE ADDED TAX (VAT)
2058. User Oriented Network Attacks
2059. Secure Back Up
2060. Screen Capture And Mouse I/O
2061. Sales Bill Printing System using Excel
2062. Password Security
2063. Online User Mobile Rating
2064. Online Sensex Graph System
2065. Online Book Publishing
2066. NEWS TICKER PROJECT
2067. Multi Storage file
2068. Message Chating
2069. Medical Equipment in WAP
2070. Login Authentication Scheme
2071. Information Alert System
2072. Image Encryption And Decryption
2073. Generic Business Portal
2074. Flight Booking Portal
2075. File Transfer using Cryptography Techniques
2076. File Splitting
2077. Excel Format in Report
2078. EB Management System
2079. Dynamic Web Form Creation
2080. Android Image Search


Struts Application Projects
Struts Apps
2081. Public Sentiment Analysis with Online Shopping Using Struts
2082. Modern distributed business for supply-chain management
2083. High Confidential Personal Disease Reporting System
2084. Distributor Sensitive Data Management Using Struts
2085. Development of Certificate Authority Services for Web Applications
2086. Access Control on User-To-User Interactions in Social Networks


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2087. Sponsor For Agriculture
2088. Agriculture Assist
2089. Agriculture Marketing in Generation
2090. International Plant Import and Export
MODERN EDUCATION SYSTEM
2091. Old In Gold
2092. I School
2093. College Placement And Events
2094. Rural Area Educational Trouble Shooter
2095. Web Direct Recruitment Analysis
2096. Online Aquarum
2097. School Automation System
2098. Secure Online Course Automation
2099. Session Management System in It Industry
2100. Tools for Non IT Expert Developer
2101. Students Skills With Modern Industries
MODERN TECHNOLOGY
2102. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2103. Customer Favarate Greeting Card Design
2104. GPS Transport Packers and Movers
2105. House Hold Appliancies Warranty Management
2106. Direct Q Less Reservation System in train
2107. Power Consumption Monitoring House Hold Electronic Device
2108. Apartment Maintenance
2109. Budget Home Design
2110. Online Buy And Sale Software
2111. Online Softskills Tracks
2112. Gps Consumers Complients
2113. Economic Usage of Solar Energy
Advance Health Care System
2114. Organizing medical camp for public health development
2115. LIVE WEB DOCTOR CONSULTATION
2116. World Wide Cloud Inter Hospital Acess Health Care System
2117. MAC Sensing Protocol
2118. Medical Record Authentication
2119. Raw Requried Online Medicine
2120. Consumer Legal Advicer
2121. Homeopathy Health Record
SPORTS
2122. Play Ground Booking
2123. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2124. Cloud Storage Public Digital Certificate
ERP PROJECTS
2125. Corporate Trouble Shooter
2126. Entrepreneur Fault Analysis
2127. Organise Corporate Training For Client Projects
2128. Employment Knowledge Database
2129. GPS Employee Tracking System
2130. Non It People Performance
2131. Performance System Analysis In Industry
2132. Consultanting About the Foreign Peoples
2133. Recommend To Friend
2134. New Company Policy Clearance System
2135. ERP System (Enterprint Resource Plan
2136. Software Requirements Analysis for Client Side
2137. Select Your Age(Business Motivation all age group)
2138. Engnering Lab Maintenance
2139. Corporate Event Organisation
LATEST BANKING
2140. EyeBank Management System
2141. Advanced Banking System
OUR MODERN SOCIETY
2142. Trained Volunteers Create A Successful Social Campaign
2143. Finger thump Based Shopping Cart
2144. Railway Management Service
2145. Create a Successful Anti- Nuclear Campaign
2146. Crowding Funding Mobilization
2147. People Power of India
2148. Pets Care
2149. Feature in Best Potitical Leader in India
2150. Yell Help For Children
2151. Automation Transport Maintance
2152. It Park Media
2153. Online Painting Auction
2154. Election Commission Management
2155. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2156. ANDROID APPS FOR INSURANCE SYSTEM
2157. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2158. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2159. ANDROID APPS FOR DOCTOR APPOINTMENT
2160. LIVE WEB DOCTOR CONSULTATION
2161. ANDROID APPS ON DOCTOR WITH NURSE
2162. HOSPITAL ANDROID APPS
2163. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2164. Fertilizer Management System -Java, JSP, MySQL
2165. Land Bank for Nursery -Java, JSP, MySQL
2166. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2167. FORMER APPS - ANDROID
2168. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2169. Online Banking with Fraud Detecting- Java JSP, MySQL
2170. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2171. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2172. Big Scholarly Data: A Survey
2173. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Whatsapp : 09566137117
Support : 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved
o