Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
hot IT job skills for 2016-17 BIGDATA mongoDB JAVA IEEE 2016-17 ANDROID IEEE 2016 -17
CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP Dot Net IEEE 2016-17 RAZOR MVC 4 ASP.NET
ASP.NET MVC Framework IEEE PHP Projects Latest IEEE 2015-2016 Java Projects Latest IEEE 2015-2016 Dotnet Projects
IEEE 2014-2015 Java Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Java Projects IEEE 2013-2014 Dotnet Projects
IEEE 2012-2013 Java Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Java Project IEEE 2011-2012 Dotnet Projects
ANDROID APPS PHP Application Projects Dotnet Application Projects Java Application Projects
Struts Application Projects Java Mini Projects Dotnet Mini Projects SOFT IDEA FOR DIGITAL SOCIETY
ANGULAR JS , BIGDATA- MONGO DB 2017-2018 RAZOR MVC 4 ASP.NET 2017-18 IEEE PHP Projects 2017-18
Dot Net IEEE 2017-18 ANDROID IEEE 2017 -18 JAVA IEEE 2017-18
 
hot IT job skills for 2016-17
MEAN: MongoDB, Ember, AngularJS and nodeJS
1. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
2. Big Data, Big Knowledge Big Data for Personalized Healthcare
3. Deduplication on Encrypted Big Data in Cloud
4. Secure Sensitive Data Sharing on a Big Data Platform
5. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
6. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
7. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
8. Self-Healing in Mobile Networks with Big Data
9. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
10. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
11. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
12. Developing Apps for visually imapired people: Lessons learned from social network
13. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
14. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
15. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
16. Design of secure location and message sharing system for android platform
17. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
18. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
19. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
20. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
21. Privacy-Preserving Selective Aggregation of Online User Behavior Data
22. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
23. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
24. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
25. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
26. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
27. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
28. Processing Incomplete k Nearest Neighbor Search
29. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
30. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
31. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
32. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
33. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
34. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
35. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
36. Deduplication on Encrypted Big Data in Cloud
37. Dynamic Resource Allocation for MapReduce with Partitioning Skew
38. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
39. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
40. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
41. Self-Healing in Mobile Networks with Big Data
42. Secure Sensitive Data Sharing on a Big Data Platform
43. Big Data, Big Knowledge: Big Data for Personalized Healthcare
44. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
45. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
46. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
47. Differentially Private Frequent Itemset Mining via Transaction Splitting
48. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
49. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
50. Fast Best-Effort Pattern Matching in Large Attributed Graphs


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
51. Two-Factor Data Security Protection Mechanism for Cloud Storage System
52. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
53. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
54. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
55. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
56. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
57. Where You Are Is Who You Are User Identification by Matching Statistics
58. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
59. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
60. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
61. Online Subgraph Skyline Analysis Over Knowledge Graphs
62. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
63. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
64. ID2S Password-Authenticated Key Exchange Protocols
65. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
66. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
67. Classification model to predict the learners' academic performance using big data
68. Electronic Commerce Meets the Semantic Web
69. Mining High Utility Patterns in One Phase without Generating Candidates
70. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
71. Automatic Generation of Social Event Storyboard from Image Click-through Data
72. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
73. Understanding Deep Representations Learned in Modeling Users Likes
74. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
75. Topic-Oriented Exploratory Search Based on an Indexing Network
76. Relevance Feedback Algorithms Inspired By Quantum Detection
77. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
78. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
79. Efficiently Estimating Statistics of Points of Interests on Maps
80. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
81. Aspect-level Influence Discovery from Graphs
82. Sentiment Embeddings with Applications to Sentiment Analysis
83. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
84. Resolving Multi-party Privacy Conflicts in Social Media
85. Encrypted Data Management with Deduplication in Cloud Computing
86. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
87. Crawling Hidden Objects with kNN Queries
88. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
89. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
90. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
91. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
92. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
93. Nearest Keyword Set Search in Multi-dimensional Datasets
94. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
95. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
96. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
97. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
98. Immutable Authentication and Integrity Schemes for Outsourced Databases
99. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
100. Server-Aided Public Key Encryption with Keyword Search
101. Online Learning in Large-Scale Contextual Recommender Systems
102. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
103. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
104. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
105. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
106. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
107. Multi-Modal Event Topic Model for Social Event Analysis
108. Social friend recommendation on multiple network correlation
109. Tag Based Image Search by Social Re-ranking
110. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
111. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
112. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
113. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
114. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
115. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
116. Packet-Scale Congestion Control Paradigm


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
117. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
118. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
119. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
120. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
121. Authentication of Smartphone Users Using Behavioral Biometrics
122. An Exploration of Geographic Authentication Schemes
123. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
124. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
125. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
126. Distributed secret sharing approach with cheater prevention
127. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
128. Efficient privacy preserving location based query over outsourced encrypted data
129. Utilizing the Cloud to Store Hijacked Camera Images
130. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
131. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
132. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
133. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
134. Enabling privacy preserving location proof for mobile users.
135. Optimizing User Experience in Choosing Android Applications
136. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
137. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
138. FoodForCare: An Android Application for Self-Care with Healthy Food
139. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
140. Silence is Golden: Enhancing Privacy of Location-Based Services
141. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
142. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
143. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
144. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
145. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
146. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
147. Adapting to User Interest Drift for POI Recommendation
148. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
149. Developing Apps for visually imapired people: Lessons learned from social network
150. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
151. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
152. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
153. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
154. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
155. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
156. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
157. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
158. Mobile cloud support for semantic enriched speech recognition in social care
159. Distributing secret sharing approach with cheater prevention based on QR code
160. Design of Secure Location and Message Sharing System for Android Platform
161. The impact of cloud technology on the automation of businesses
162. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
163. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
164. Rescue Management System
165. Android Army - Military Apps
166. Android Beauty Parlor
167. Android E Municipality
168. ANDROID NURSE AID
169. Android Customer Care ANDROID, PHP JSON, MySQL


Dot Net IEEE 2016-17
IEEE Transactions on Computers
170. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
171. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
172. TagBook: A Semantic Video Representation without Supervision for Event Detection
173. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
174. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
175. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
176. The Impact of Review Environment on Review Credibility
177. Private Over-threshold Aggregation Protocols over Distributed Datasets
178. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
179. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
180. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
181. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
182. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
183. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
184. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
185. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
186. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
187. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
188. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
189. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
190. What Is Happening in The Video Annotate Video by Sentence
191. Two level QR code for private message sharing and document authentication.
192. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
193. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
194. Mining Health Examination Records A Graph-based Approach
195. A Credibility Analysis System for Assessing Information on Twitter
196. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
197. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
198. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
199. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
200. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
201. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
202. Predicting Personalized Image Emotion Perceptions in Social Networks
203. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
204. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
205. Explaining Missing Answers to Top-k SQL Queries
206. Bilevel Feature Extraction Based Text Mining
207. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
208. Privacy-Preserving Outsourced Media Search
209. Modeling and Verification of Online Shopping Business Processes
210. User Preference Learning for Online Social Recommendation
211. Steganalysis Features for Content-Adaptive JPEG Steganography
212. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
213. PiCode: a New Picture-Embedding 2D Barcode
214. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
215. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
216. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
217. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
218. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
219. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
220. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
221. Cloud workflow scheduling with deadlines and time slot availability
222. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
223. Path-Based Epidemic Spreading in Networks
224. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
225. On the Resiliency of Static Forwarding Tables
226. Network Capability in Localizing Node Failures via End-to-End Path Measurements
227. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
228. DX: Latency-Based Congestion Control for Datacenters


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
229. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
230. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
231. A Forecasting Methodology for Workload Forecasting in Cloud Systems
232. Optimal Shipping Strategy and Return Service Charge Under No-Reason
233. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
234. A Recommendation System to Facilitate Business Process Modeling
235. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
236. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
237. User Differentiated Verifiable File Search on the Cloud
238. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
239. Statistical Features Based Real-time Detection of Drifted Twitter Spam
240. Incremental Consolidation of Data-Intensive Multi-flows
241. Service Pattern: An Integrated Business Process Model for Modern Service Industry
242. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
243. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
244. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
245. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
246. Democratic Diffusion Aggregation for Image Retrieval


ASP.NET MVC Framework
ASP.NET MVC Framework Project
247. Towards Effective Bug Triage with Software Data Reduction Techniques
248. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
249. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
250. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
251. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
252. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
253. Proof of retrievability with public verifiability resilient against related-key attacks
254. Secure Anonymous Key Distribution Scheme for Smart Grid
255. Converses For Secret Key Agreement and Secure Computing
256. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


IEEE PHP Projects
PHP Projects
257. Optimizing Display Advertising Markets
258. Using Knowledge Libraries to Transfer Expert Knowledge
259. Semantic Retrieval of Trademarks Based on Conceptual Similarity
260. Understanding and Predicting Question Subjectivity in Social Question and Answering
261. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
262. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
263. Fast Top-K Path-based Relevance Query on Massive Graphs
264. Web Image Search Re-ranking with Click-based Similarity and Typicality
265. Automatically Mining Facets for Queries from Their Search Results
266. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
267. Statistical Entity Extraction from Web
268. Question Answering System for an Effective Collaborative Learning
269. Lost in Translation: Improving Decoy Documents via Automated Translation
270. Learn to Personalized Image Search from the Photo Sharing Websites
271. In Tags We Trust Trust modeling in social tagging of multimedia content
272. Efficient Anonymous Message Submission
273. Cryptonite: A Secure and Performant Data Repository on Public Clouds


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
274. Rank-Based Similarity Search: Reducing the Dimensional Dependence
275. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
276. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
277. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
278. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
279. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
280. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
281. On the Security of data access control for multiauthority cloud storage system
282. Trust-based Service Management for Social Internet of Things Systems
283. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
284. Formalization and Verification of Group Behavior Interactions
285. Group Key Agreement with Local Connectivity
286. Data Lineage in Malicious Environments
287. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
288. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
289. Enabling Cloud Storage Auditing with Key-Exposure Resistance
290. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
291. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
292. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
293. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
294. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
295. Quantitative Reasoning About Cloud Security Using Service Level Agreements
296. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
297. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
298. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
299. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
300. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
301. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
302. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
303. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
304. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
305. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
306. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
307. Enabling Cloud Storage Auditing with Key-Exposure Resistance
308. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
309. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
310. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
311. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
312. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
313. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
314. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
315. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
316. Secure Auditing and Deduplicating Data in Cloud
317. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
318. Towards reproducibility in online social network Research
319. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
320. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
321. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
322. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
323. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
324. Making Digital Artifacts on the Web Verifiable and Reliable
325. Anonymizing Collections of Tree-Structured Data
326. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
327. FOCS: Fast Overlapped Community Search
328. Sparsity Learning Formulations for Mining Time-Varying Data
329. The Impact of View Histories on Edit Recommendations
330. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
331. Discovery of Ranking Fraud for Mobile Apps
332. Towards Effective Bug Triage with Software Data Reduction Techniques
333. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
334. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
335. Auditing for Distributed Storage Systems
336. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
337. Uploader Intent for Online Video: Typology, Inference and Applications
338. YouTube Video Promotion by Cross-network
339. Semantic-Improved Color Imaging Applications: It Is All About Context
340. Geolocalized Modeling for Dish Recognition
341. Learning to Rank Image Tags with Limited Training Examples
342. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
343. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
344. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
345. Tracking Temporal Community Strength in Dynamic Networks
346. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
347. Towards Information Diffusion in Mobile Social Networks
348. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
349. An Efficient Privacy-Preserving Ranked Keyword Search Method
350. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
351. Dispersing Instant Social Video Service Across Multiple Clouds
352. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
353. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
354. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
355. A Computational Dynamic Trust Model for User Authorization
356. Secure Distributed Deduplication Systems with Improved Reliability
357. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
358. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
359. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
360. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
361. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
362. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
363. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
364. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
365. Hacking is not random: a case-control study of webser ver-compromise risk
366. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
367. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
368. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
369. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
370. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
371. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
372. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
373. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
374. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
375. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
376. Diversifying Web Service Recommendation Results via Exploring Service Usage History
377. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
378. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
379. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
380. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
381. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
382. Cross-Domain Feature Learning in Multimedia
383. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
384. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
385. Saliency-based color accessibility
386. Contextual Online Learning for Multimedia Content Aggregation
387. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
388. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
389. An Attribute-assisted Reranking Model for Web Image Search
390. RRW - A Robust and Reversible Watermarking
391. Steganography Using Reversible Texture Synthesis
392. Single Image Super-Resolution Based on Gradient Profile Sharpness
393. Detection and Rectification of Distorted Fingerprints
394. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
395. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
396. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
397. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
398. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
399. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
400. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
401. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
402. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
403. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
404. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
405. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
406. Authenticated Key Exchange Protocols for Parallel Network File Systems
407. Data Collection in Multi-Application Sharing Wireless Sensor Networks
408. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
409. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
410. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
411. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
412. Optimum Power Allocation in Sensor Networks for Active Radar Applications
413. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
414. Context-based Diversification for Keyword Queries over XML Data
415. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
416. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
417. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
418. Tweet Segmentation and Its Application to Named Entity Recognition
419. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
420. Automatic Group Happiness Intensity Analysis
421. RRW - A Robust and Reversible Watermarking Technique for Relational Data
422. Query Aware Determinization of Uncertain Objects
423. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
424. Leveraging the Tail Time for Saving Energy in Cellular Networks
425. Keylogging-resistant Visual Authentication Protocols
426. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
427. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
428. Preserving Location Privacy in Geo-Social Applications
429. Efficient Authentication for Mobile and Pervasive Computing
430. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
431. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
432. Typicality-Based Collaborative Filtering Recommendation
433. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
434. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
435. Keyword Search Over Probabilistic RDF Graphs
436. Efficient Prediction of Difficult Keyword Queries over Databases
437. Interpreting the Public Sentiment Variations on Twitter
438. An Efficient Recommendation Method for Improving Business Process Modeling
439. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
440. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
441. On the use of Side Information for Mining Text Data
442. Privacy Preserving and Content Protecting Location based Queries
443. Fast Nearest Neighbor Search with Keywords
444. Towards Differential Query Services in Cost-Efficient Clouds
445. Facilitating Document Annotation using Content and Querying Value
446. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
447. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
448. Secure Outsourced Attribute-Based Signatures
449. Supporting Privacy Protection in Personalized Web Search
450. Dealing With Concept Drifts in Process Mining
451. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
452. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
453. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
454. Active Learning of Constraints for Semi-Supervised Clustering
455. Best Keyword Cover Search
456. Personalized Recommendation Combining User Interest and Social Circle
457. Online Feature Selection and Its Applications
458. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
459. Incremental Affinity Propagation Clustering Based on Message Passing
460. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
461. Secure kNN Query Processing in Untrusted Cloud Environments
462. Malware Propagation in Large-Scale Networks
463. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
464. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
465. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
466. Efficient Ranking on Entity Graphs with Personalized Relationships
467. Task Trail: An Effective Segmentation of User Search Behavior
468. Privacy-Preserving Enhanced Collaborative Tagging
469. XSPath Navigation on XML Schemas Made Easy
470. Security Evaluation of Pattern Classifiers under Attack
471. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
472. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
473. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
474. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
475. Nothing is for Free: Security in Searching Shared and Encrypted Data
476. SocialTube: P2P-assisted Video Sharing in Online Social Networks
477. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
478. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
479. Behavioral Malware Detection in Delay Tolerant Networks
480. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
481. Private Searching on Streaming Data Based on Keyword Frequency
482. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
483. On the Security of Trustee-Based Social Authentications
484. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
485. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
486. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
487. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
488. A Two-stage Deanonymization Attack Against Anonymized Social Networks
489. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
490. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
491. Scalable architecture for multi-user encrypted SQL operations on cloud database services
492. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
493. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
494. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
495. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
496. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
497. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
498. Secure kNN Query Processing in Untrusted Cloud Environments
499. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
500. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
501. A Hybrid Cloud Approach for Secure Authorized Deduplication
502. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
503. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
504. A Novel Model for Competition and Cooperation Among Cloud Providers
505. CLOUDQUAL: A Quality Model for Cloud Services
506. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
507. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
508. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
509. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
510. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
511. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
512. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
513. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
514. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
515. Enhanced Security for Association Rule Mining to secure Transactional Databases
516. Operational Pattern Revealing Technique in Text Mining
517. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
518. Personalized web search using Browsing history and domain Knowledge
519. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
520. Data Security the Challenge of Cloud Computing
521. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
522. A Cloud Enviroment for Backup and Data Storage


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
523. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
524. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
525. Cotton Leaf Disease Identification using Pattern Recognition Techniques
526. Efficient Community Formation for Web Services
527. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
528. Secure Mining of Association Rules in Hor izontally Distributed Databases
529. Dynamic Query Forms for Database Queries
530. Secure kNN Query Processing in Untrusted Cloud Environments
531. An Empirical Performance Evaluation of Relational Keyword Search Systems
532. Keyword Query Routing
533. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
534. Demand Bidding Program and Its Application in Hotel Energy Management
535. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
536. Incremental Detection of Inconsistencies in Distributed Data
537. A Cocktail Approach for Travel Package Recommendation
538. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
539. A Random Decision Tree Framework for Privacy-Preserving Data Mining
540. Analysis of Field Data on Web Security Vulnerabilities
541. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
542. A Reliability Improvement Method for SOA-Based Applications
543. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
544. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
545. Web Service Recommendation via Exploiting Location and QoS Information
546. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
547. Exploiting Rateless Codes in Cloud Storage Systems
548. COMIC:Cost Optimization for Internet Content Multihoming
549. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
550. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
551. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
552. Uniform Embedding for Efficient JPEG Steganography
553. Secure Deduplication with Efficient and Reliable Convergent Key Management
554. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
555. Link Quality Aware Code Dissemination in Wireless Sensor Networks
556. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
557. Location Aware Keyword Query Suggestion Based on Document Proximity
558. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
559. A secure data self-destructing scheme in cloud computing
560. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
561. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
562. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
563. Secure kNN Query Processing in Untrusted Cloud Environments
564. Exploiting Rateless Codes in Cloud Storage Systems
565. Fuzzy Authorization for Cloud Storage
566. Planning vs. dynamic control Resource allocation in corporate clouds
567. Automatic Scaling of Internet Applications for Cloud Computing Services
568. Strategy-proof Pricing for Cloud Service Composition
569. Privacy Preserving Delegated Access Control in Public Clouds
570. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
571. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
572. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
573. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
574. A Mechanism Design Approach to Resource Procurement in Cloud Computing
575. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
576. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
577. A Scientometric Analysis of Cloud Computing Literature
578. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
579. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
580. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
581. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
582. FeatureMatch: A General ANNF Estimation Technique and its Applications
583. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
584. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
585. As-Projective-As-Possible Image Stitching with Moving DLT
586. Sharing Visual Secrets in Single Image Random Dot Stereograms
587. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
588. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
589. A New Iterative Triclass Thresholding Technique in Image Segmentation
590. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
591. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
592. An Iranian License Plate Recognition System Based on Color Features
593. Learning Layouts for Single-Page Graphic Designs
594. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
595. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
596. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
597. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
598. Fingerprint Compression Based on Sparse Representation
599. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
600. LBP-Based Edge-Texture Features for Object Recoginition
601. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
602. Toward Experiential Mobile Media Processing
603. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
604. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
605. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
606. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
607. Designing Truthful Spectrum Double Auctions with Local Markets
608. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
609. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
610. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
611. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
612. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
613. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
614. A Study on Clinical Prediction Using Data Mining Techniques
615. Online Payment System using Steganography and Visual Cryptography
616. Efficient Instant-Fuzzy Search with Proximity Ranking
617. Attribute Based Encryption with Privacy Preserving In Clouds
618. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
619. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
620. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
621. User Action Interpretation for Online Content Optimization
622. Spatial Query Integrity with Voronoi Neighbors
623. Spatial Approximate String Search
624. Sensitive Label Privacy Protection on Social Network Data
625. Secure Mining of Association Rules in Horizontally Distributed Databases
626. Secure Logging As a Service Delegating Log Management to the Cloud
627. Robust Module-based Data Management
628. Ranking on Data Manifold with Sink Points
629. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
630. Privacy-Enhanced Web Service Composition
631. Privacy against Aggregate Knowledge Attacks
632. Preventing Private Information Inference Attacks on Social Networks
633. PMSE: A Personalized Mobile Search Engine
634. Personalized QoS-Aware Web Service Recommendation and Visualization
635. Optimal Client-Server Assignment for Internet Distributed Systems
636. Online Search and Buying Behaviour in Consumer Markets
637. M-Privacy for Collaborative Data Publishing
638. Mining User Queries with Markov Chains: Application to Online Image Retrieval
639. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
640. Incentive Compatible Privacy-Preserving Data Analysis
641. Improving Security and Efficiency in Attribute-Based Data Sharing
642. FoCUS: Learning to Crawl Web Forums
643. Fast Nearest Neighbor Search with Keywords
644. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
645. Facilitating Effective User Navigation through Website Structure Improvement
646. Facilitating Document Annotation using Content and Querying Value
647. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
648. Efficient Evaluation of SUM Queries over Probabilistic Data*
649. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
650. Dynamic Query Forms for Database Queries
651. Dynamic Personalized Recommendation on Sparse Data
652. Distributed Strategies for Mining Outliers in Large Data Sets
653. Crowdsourcing Predictors of Behavioral Outcomes
654. Co-Occurrence-Based Diffusion for Expert Search on the Web
655. Comparable Entity Mining from Comparative Questions
656. CloudMoV: Cloud-based Mobile Social TV
657. Anomaly Detection via Online Oversampling Principal Component Analysis
658. Anomaly Detection Approach Using Hidden Markov Model
659. Annotating Search Results from Web Databases
660. A System to Filter Unwanted Messages from OSN User Walls
661. A Survey of XML Tree Patterns
662. A Probabilistic Approach to String Transformation
663. A New Algorithm for Inferring User Search Goals with Feedback Sessions
664. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
665. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
666. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
667. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
668. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
669. Towards Differential Query Services in Cost-Efficient Clouds
670. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
671. SocialTube: P2P-assisted Video Sharing in Online Social Networks
672. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
673. QoS Ranking Prediction for Cloud Services
674. Priority-Based Consolidation of Parallel Workloads in the Cloud
675. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
676. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
677. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
678. Load Rebalancing for Distributed File Systems in Clouds
679. Label-Embedding for Attribute-Based Classification
680. IP-Geolocation Mapping for Moderately Connected Internet Regions
681. Identity-Based Secure Distributed Data Storage Schemes
682. Hint-based Execution of Workloads in Clouds with Nefeli
683. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
684. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
685. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
686. Efficient Two-Server Password-Only Authenticated Key Exchange
687. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
688. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
689. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
690. Winds of Change: From Vendor Lock-In to the Meta Cloud
691. Supporting the Migration of Applications to the Cloud through a Decision Support System
692. Storing Shared Data on the Cloud via Security-Mediator
693. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
694. Privacy-Preserving Public Auditing for Secure Cloud Storage
695. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
696. Outsourcing Privacy-Preserving Social Networks to a Cloud
697. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
698. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
699. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
700. Efficient Security Solution for Privacy-Preserving Cloud Services
701. Collaboration in Multicloud Computing Environments: Framework and Security Issues
702. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
703. Cloud-based DDoS Attacks and Defenses
704. Cloud computing for mobile users can offloading compution save energy
705. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
706. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
707. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
708. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
709. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
710. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
711. Two tales of privacy in online social networks
712. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
713. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
714. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
715. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
716. Security and Privacy-Enhancing Multicloud Architectures
717. Security Using Colors and Armstrong Numbers
718. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
719. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
720. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
721. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
722. Privacy Preserving Data Analytics for Smart Homes
723. On Inference-Proof View Processing of XML Documents
724. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
725. Extracting Spread-Spectrum Hidden Data from Digital Media
726. Efficiently Outsourcing Multiparty Computation under Multiple Keys
727. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
728. Craigslist Scams and Community Composition: Investigating Online Fraud
729. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
730. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
731. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
732. Super-Resolution-based Inpainting
733. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
734. Image Authentication Using Stochastic Diffusion
735. Hierarchical Super-Resolution-Based Inpainting
736. Circular Reranking for Visual Search
737. Bootstrapping Visual Categorization With Relevant Negatives
738. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
739. An extended visual cryptography scheme without pixel expansion for halftone images
740. An Adaptive Cloud Downloading Service
NETWORKING
741. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
742. Topological Conditions for In-Network Stabilization of Dynamical Systems
743. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
744. Price Differentiation for Communication Networks
745. Participatory Privacy: Enabling Privacy in Participatory Sensing
746. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
747. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
748. On the Role of Mobility for Multi-message Gossip
749. Fully Anonymous Profile Matching in Mobile Social Networks
750. Fault Node Recovery Algorithm for a Wireless Sensor Network
751. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
752. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
753. Access Policy Consolidation for Event Processing Systems
754. A Fast Re-Route Method
SOFTWARE ENGINEERING
755. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
756. Vampire attacks: Draining life from wireless ad-hoc sensor networks
757. Towards a Statistical Framework for Source Anonymity in Sensor Networks
758. Search Me If You Can: Privacy-preserving Location Query Service
759. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
760. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
761. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
762. Distributed Cooperative Caching in Social Wireless Networks
763. Community-Aware Opportunistic Routing in Mobile Social Networks
764. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
765. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
766. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
767. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
768. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
769. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
770. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
771. The Target Tracking in Mobile Sensor Networks
772. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
773. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
774. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
775. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
776. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
777. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
778. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
779. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
780. SUSIE: Search Using Services and Information Extraction
781. SeDas: A Self-Destructing Data System Based on Active Storage Framework
782. Secure Mining of Association Rules in Horizontally Distributed Databases
783. Sampling Online Social Networks
784. Privacy Preserving Delegated Access Control in Public Clouds
785. Mining Order-Preserving Submatrices from Data with Repeated Measurements
786. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
787. Ginix : Generalized Inverted Index for Keyword Search
788. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
789. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
790. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
791. Dynamic Query Forms for Database Queries
792. Cost-Based Optimization of Service Compositions
793. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
794. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
795. Automatic Extraction of Top-k Lists from the Web
796. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
797. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
798. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
799. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
800. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
801. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
802. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
803. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
804. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
805. Privacy Preserving Data Sharing With Anonymous ID Assignment
806. Non-Cooperative Location Privacy
807. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
808. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
809. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
810. Cloud based emails boundaries and vulnerabilities
811. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
812. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
813. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
814. Optimal Content Downloading in Vehicular Networks
815. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
816. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Java Projects
SECURE COMPUTING
817. The Devils Behind Web Application Vulnerabilities
818. Security Architecture for Cloud Networking
819. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
820. Secure Overlay Cloud Storage with Access Control and Assured Deletion
821. Risk-Aware Mitigation for MANET Routing Attacks
822. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
823. Privacy-preserving Enforcement of Spatially Aware RBAC
824. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
825. pCloud: A Distributed System for Practical PIR
826. Packet-Hiding Methods for Preventing Selective Jamming Attacks
827. Online Modeling of Proactive Moderation System for Auction Fraud Detection
828. Fast and accurate annotation of short texts with Wikipedia pages
829. FADE: Secure Overlay Cloud Storage with File Assured Deletion
830. Ensuring Distributed Accountability for Data Sharing in the Cloud
831. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
832. Direct and Indirect Discrimination Prevention Methods
833. Detecting Spam Zombies by Monitoring Outgoing Messages
834. Detecting Anomalous Insiders in Collaborative Information Systems
835. Data-Provenance Verification For Secure Hosts
836. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
837. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
838. Payments for Outsourced Computations
839. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
840. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
841. Toward Private Joins on Outsourced Data
842. Statistical Entity Extraction from Web
843. Slicing: A New Approach to Privacy Preserving Data Publishing
844. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
845. Resilient Identity Crime Detection
846. Ranking Model Adaptation for Domain-Specific Search
847. Organizing User Search Histories
848. On the Spectral Characterization and Scalable Mining of Network Communities
849. Multiparty Access Control for Online Social Networks: Model and Mechanisms
850. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
851. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
852. How do Facebookers use Friendlists
853. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
854. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
855. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
856. Enabling Multilevel Trust in Privacy Preserving Data Mining
857. Enabling cross-site interactions in social networks
858. Efficient Similarity Search over Encrypted Data
859. Efficient Extended Boolean Retrieval
860. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
861. Efficient Anonymous Message Submission
862. Effective Pattern Discovery for Text Mining
863. DDD: A New Ensemble Approach for Dealing with Concept Drift
864. Credibility Ranking of Tweets during High Impact Events
865. Creating Evolving User Behavior Profiles Automatically
866. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
867. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
868. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
869. Anomaly Detection for Discrete Sequences: A Survey
870. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
871. Advance Mining of Temporal High Utility Itemset
872. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
873. Reliable Re-encryption in Unreliable Clouds
874. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
875. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
876. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
877. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
878. Gossip-based Resource Management for Cloud Environments
879. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
880. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
881. Cloud Data Protection for the Masses
882. Cloud Computing Security: From Single to Multi-Clouds
883. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
884. In Tags We Trust Trust modeling in social tagging of multimedia content
885. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
886. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
887. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
888. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
889. Cut Detection in Wireless Sensor Networks
890. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
891. TrickleDNS: Bootstrapping DNS Security using Social Trust
892. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
893. Policy-by-Example for Online Social Networks
894. Packet Loss Control Using Tokens at the Network Edge
895. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
896. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
897. Independent Directed Acyclic Graphs for Resilient Multipath Routing
898. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
899. Game-Theoretic Pricing for Video Streaming in Mobile Networks
900. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
901. Auditing for Network Coding Storage
902. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
903. Privacy Preserving Cloud Data Access With Multi-Authorities
904. Movie Rating and Review Summarization in Mobile Environment
905. IDSaaS: Intrusion Detection System as a Service in Public Clouds
906. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
907. BibPro: A Citation Parser Based on Sequence Alignment Techniques
908. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
909. View-invariant action recognition based on Artificial Neural Networks
910. User-aware Image Tag Refinement via Ternary Semantic Analysis
911. Separable Reversible Data Hiding in Encrypted Image
912. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
913. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
914. Robust Face-Name Graph Matching for Movie Character Identification
915. IntentSearch:Capturing User Intention for One-Click Internet Image Search
916. Improving Color Constancy by Photometric Edge Weighting
917. Exploring the design space of social network-based Sybil defenses
918. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
919. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
920. AnnoSearch: Image Auto-Annotation by Search
921. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
922. Scalable Scheduling of Updates in Streaming Data Warehouses
923. Scalable Learning of Collective Behavior
924. Ranking Model Adaptation for Domain-Specific Search
925. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
926. Outsourced Similarity Search on Metric Data Assets
927. Organizing User Search Histories
928. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
929. Mining Web Graphs for Recommendations
930. Joint Top K Spatial Keyword Query Processing
931. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
932. Identifying Content for Planned Events Across Social Media Sites
933. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
934. Generative Models for Item Adoptions Using Social Correlation
935. Efficient Data Mining for XML Queries Answering Support
936. Efficient audit service outsourcing for data integrity in clouds
937. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
938. Effective Pattern Discovery for Text Mining
939. Combined Mining: Discovering Informative Knowledge in Complex Data
940. Decentralized Probabilistic Text Clustering
941. Computing Structural Statistics by Keywords in Databases
942. Bridging Social and Data Networks
943. Answering General Time-Sensitive Queries
944. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
945. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
946. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
947. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
948. Resource-Aware Application State Monitoring
949. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
950. Query Access Assurance in Outsourced Databases
951. Linear and Differential Cryptanalysis
952. Expert Discovery and Interactions in Mixed Service-Oriented Systems
953. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
954. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
955. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
956. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
957. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
958. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
959. ROAuth: Recommendation Based Open Authorization
960. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
961. Recommendation Models for Open Authorization
962. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
963. Packet-Hiding Methods for Preventing Selective Jamming Attacks
964. On Privacy of Encrypted Speech Communications
965. OAuth Web Authorization Protocol
966. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
967. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
968. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
969. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
970. Fast Matrix Embedding by Matrix Extending
971. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
972. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
973. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
974. Access control for online social networks third party applications
SOFTWARE ENGINEERING
975. Measuring Code Quality to Improve Specification Mining
976. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
977. Towards Secure and Dependable Storage Services in Cloud Computing
978. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
979. Remote Display Solutions for Mobile Cloud Computing
980. Privacy Preserving Delegated Access Control in Public Clouds
981. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
982. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
983. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
984. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
985. Load-Balancing Multipath Switching System with Flow Slice
986. Assessing the Veracity of Identity Assertions via OSNs
987. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
988. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
989. A New Cell-Counting-Based Attack Against Tor
990. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
991. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
992. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
993. Network Assisted Mobile Computing with Optimal Uplink Query Processing
994. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
995. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
996. Fast Release Capture Sampling in Large-Scale Sensor Networks
997. Cooperative download in vehicular environments
998. Cooperative Data Dissemination via Roadside WLANs
999. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1000. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1001. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1002. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1003. Hiding Sensitive Association Rule for Privacy Preservation
1004. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1005. Development of Certificate Authority Services for Web Applications
1006. Detecting and Validating Sybil Groups in theWild
1007. Association Rule Extracting Knowledge Using Market Basket Analysis
1008. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
1009. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
1010. RITAS: Services for Randomized Intrusion Tolerance
1011. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
1012. Nymble: Blocking Misbehaving Users in Anonymizing Networks
1013. Modeling and Detection of Camouflaging Worm
1014. Coding for Cryptographic Security Enhancement using Stopping Sets
1015. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
1016. Wireless Sensor Network Security model using Zero Knowledge Protocol
1017. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
1018. Throughput Optimization in Mobile Backbone Networks
1019. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
1020. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
1021. Fast Data Collection in Tree-Based Wireless Sensor Networks
1022. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
1023. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
1024. SPAF: Stateless FSA-based Packet Filters
1025. Selfish Overlay Network Creation and Maintenance
1026. ProgME: Towards Programmable Network MEasurement
1027. Locating Equivalent Servants over P2P Networks
1028. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
1029. Buffer Sizing for 802.11 Based Networks
1030. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
1031. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
1032. Improving Utilization of Infrastructure Clouds
1033. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
1034. CloudTPS: Scalable Transactions for Web Applications in the Cloud
1035. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1036. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
1037. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
1038. Ranking Spatial Data by Quality Preferences
1039. Making Aggregation Work in Uncertain and Probabilistic Databases
1040. Load Shedding in Mobile Systems with MobiQual
1041. Group Enclosing Queries
1042. Extended XML Tree Pattern Matching: Theories and Algorithms
1043. Effective Navigation of Query Results Based on Concept Hierarchies
1044. Discovering Conditional Functional Dependencies
1045. Decision Trees for Uncertain Data
1046. Data Leakage Detection
1047. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


IEEE 2011-2012 Dotnet Projects
NETWORKING
1048. Valuable Detours: Least-Cost Anypath Routing
1049. Self-Reconfigurable Wireless Mesh Networks
1050. Reliability in Layered Networks with Random Link Failures
1051. NABS:Novel Approaches for Biometric Systems
1052. Live Streaming with Receiver-based Peer-division Multiplexing
1053. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1054. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1055. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1056. Virtualized Screen: A Third Element for CloudMobile Convergence
1057. Steganographic Embedding in JPEG Images with Visual Criterion
1058. On the Typical Statistic Features for Image Blind Steganalysis
1059. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1060. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1061. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1062. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1063. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1064. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1065. Vulnerability Analysis in SOA-Based Business Processes
1066. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1067. Service-Centric Framework for a Digital Government Application
1068. Server-Side Streaming Processing of WS-Security
1069. OWLPath: An OWL Ontology-Guided Query Editor
1070. Monitoring Service Systems from a Language-Action Perspective
1071. Extracting Product Features and Sentiments from Chinese Customer Reviews
1072. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1073. Automated Certification for Compliant Cloud-based Business Processes
1074. Addressing Dependability throughout the SOA Life Cycle
1075. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1076. The Geometric Efficient Matching Algorithm for Firewalls
1077. Secure Service-Oriented Architecture for Mobile Transactions
1078. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1079. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1080. Privacy-Preserving Updates to Anonymous and Confidential Databases
1081. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1082. IPAS: Implicit Password Authentication System
1083. Improving Security and Performance in the Tor Network through Tunable Path Selection
1084. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1085. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1086. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1087. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1088. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1089. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1090. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1091. Data Delivery Properties of Human Contact Networks
1092. Converge-Cast: On the Capacity and Delay Tradeoffs
1093. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1094. USHER: Improving Data Quality with Dynamic Forms
1095. The World in a Nutshell: Concise Range Queries
1096. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1097. Scalable Scheduling of Updates in Streaming Data Warehouses
1098. Scalable Learning of Collective Behavior
1099. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1100. Publishing Search Logs A Comparative Study of Privacy Guarantees
1101. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1102. Optimal Service Pricing for a Cloud Cache
1103. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1104. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1105. Mining Web Graphs for Recommendations
1106. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1107. Integration of Sound Signature Authentication System
1108. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1109. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1110. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1111. Exploring Application-Level Semantics for Data Compression
1112. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1113. Data Leakage Detection
1114. Cost-aware rank join with random and sorted access
1115. Collaborative Filtering with Personalized Skylines
1116. Bridging Socially-Enhanced Virtual Communities
1117. Automatic Discovery of Personal Name Aliases from the Web
1118. A Personalized Ontology Model for Web Information Gathering
1119. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1120. A Query Formulation Language for the Data Web
1121. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1122. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1123. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1124. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1125. Towards Secure and Dependable Storage Services in Cloud Computing
1126. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1127. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1128. Data Integrity Proofs in Cloud Storage
1129. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1130. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1131. Feature-level Sentiment Analysis for Chinese Product Reviews
1132. Equal-sized Cells Mean Equal-sized Packets in Tor?
1133. Customer Relationship Management Based on Data Mining Technique
1134. Authentication Schemes for Session Passwords using Color and Images
1135. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


ANDROID APPS
ERP PROEJCT
1136. GPS Employee Tracking System
OUR MODERN SOCITY
1137. Former Student Information
1138. Pets Care
ONLINE CONSUMERS PROCESSING
1139. House Hold Appliancies Warranty Management
1140. GPS Transport Packers and Movers
Android Apps
1141. MY LIBRARY
1142. FACULTY RATING SYSTEM
1143. App for self organizer
1144. ONLINE DOCTOR APPOINTMENT
1145. Conference Event Mobile Assistant
1146. Mobile Prescription
1147. Metastore Application
1148. Android SmartCampus
1149. Android Shopping Mall
1150. TOLL GATE -Barcode Billing System --ANDROID
1151. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1152. Taste Hunt For Restaurants
1153. POLICE APPS
1154. Android Blood Bank
1155. Mobile Expense Claim System Android
1156. Android Intelligent Time Tracking System TICK
1157. Android Course and Attendance Management System
1158. Android Event Reminder
1159. Android Attendance Assessment
1160. Android Advance Shopping
1161. Android CAR POOLING
1162. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1163. Android HOSPITAL
1164. ATHLETE MEET GUIDE
1165. Android Apps PARKING MANAGER
1166. Love and Care
1167. Food Waste Management System
1168. Travel Guide
1169. Android Provisional Store
1170. Best Baby Care with Vaccines Remainder
1171. Android Assist for Lecturer and Student
1172. Android Personal Assistance (PA)
1173. Android Application for College Management System
1174. Tollgate Payment system in android
1175. Intelligence Quotient (IQ) Test
1176. GPS LOCATION ALARM SYSTEM
1177. Location Based Intelligent Mobile Organizer
1178. BANK ACCOUNT TRACKER FOR ANDROID
1179. UNIT CONVERTER
1180. Tips and Tax Calculator in Android
1181. TEXT EDITOR FOR ANDROID
1182. Student Attendance Tracking System
1183. Smart Money With Daily Expenses
1184. Simple And Secure Android TO DO List Application
1185. Restaurant Table Order Management System
1186. Online Shopping
1187. Online Examination System For Android
1188. ANDROID SHOPPING LOCATION IDENTIFIER
1189. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1190. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1191. MICRO CREDIT BANKING ON SMARTPHONE
1192. LOCATION BASED ALARM
1193. Insurance in android
1194. GOOGLE PLACE FINDER
1195. Friend Mapper on Mobiles - Friend Locator
1196. EXPENSE MANAGER
1197. Employee Diractory
1198. Online job search
1199. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1200. ANDROID STUDENT RESULT ANALYZING SYSTEM
1201. CloudMoV : Cloud-based Mobile Social TV
1202. Bus Reservation
1203. Budget Planner
1204. Android SMS Systems
1205. ANDROID LEAVE MANAGEMENT SYSTEM
1206. ANDROID EVENT SCHEDULER/REMINDER
1207. Android Grocery Shopping List
1208. Android Attack Application
1209. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1210. A Mobile Phone Based Medicine In-take Reminder and Monitor


PHP Application Projects
ERP PROJECTS
1211. Employment Knowledge Database
1212. Organise Corporate Training For Client Project s
1213. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1214. ONLINE VEHICLE SHOWROOM SYSTEMS
1215. Online Voting
1216. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1217. School Management System
1218. Secure Online Course Automation
1219. School Automation System
1220. Online Aquarum
1221. Web Direct Recruitment Analysis
PHP Apps
1222. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1223. TRADE / INDUSTRY WEB PORTAL
1224. Feeding the poor from the supermarket
1225. Application for recording your goals and habits
1226. VISUAL WAY TO RAISE AWARENESS
1227. Municipal Corporation
1228. Online Polling For Publishers And Brands
1229. Avoid Food Wastage
1230. Web Doctor
1231. ONLINE FOOD ORDERING SYSTEM
1232. E-Tendering
1233. Improving Rural Communities
1234. Green Planet Awarness
1235. Development of an Online Course Portal for a campus
1236. Auxon Test
1237. WEB BASED LEARNING SYSTEM
1238. Tagging in online social networks
1239. Secured file Downloading system
1240. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1241. searching a image from websites
1242. Online University
1243. Online product Opinion and Ranking System
1244. MNC LEAVE MANAGEMENT SYSTEM
1245. Home appliances online purchase
1246. Freelancer Job
1247. E-Tutor Online Jobs
1248. Statistical Entity Extraction from Web
1249. Effective Collaborative Learning
1250. Development of an e-Post Office System
1251. Question Answering System for an Effective Collaborative Learning


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1252. Online Trends Management Service in It Industry
1253. Session Management System in It Industry
1254. Tools for Non IT Expert Developer
ERP PROJECTS
1255. New Company Policy Clearance System
1256. Recommend To Friend
1257. Consultanting About the Foreign Peoples
1258. Performance System Analysis In Industry
1259. Non It People Performance
MODERN AGRICULTURE
1260. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1261. Agriculture Marketing in Generation
1262. Agriculture Assist
1263. Sponsor For Agriculture
SPORTS
1264. Play Ground Booking
OUR MODERN SOCITY
1265. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1266. RAILWAY SEAT RESERVATION SYSTEM
1267. Railway Management Service
1268. It Park Media
1269. Automation Transport Maintance
1270. Yell Help For Children
1271. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1272. Apartment Maintenance
1273. Power Consumption Monitoring House Hold Electronic Device
1274. Direct Q Less Reservation System in train
Advance Health Care System
1275. MAC Sensing Protocol
1276. World Wide Cloud Inter Hospital Acess Health Care System
1277. Live Doctor
Dotnet Apps
1278. TELEVISION CHANNEL PROGRAM MANAGEMENT
1279. WIN THE TRUST OF AN INDIAN CONSUMER
1280. ONLINE ACCOUNT MANAGEMENT
1281. SMART CAB BOOKING SYSTEM
1282. ONLINE FAST FOOD ORDER
1283. Travel Mate Add Module
1284. Work Order System Call Centre
1285. SPORTS MANAGEMENT SYSTEM
1286. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1287. Pick-It Courier Service
1288. Online Taxi Booking
1289. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1290. INCOMETAX MAINTAINANCE SYSTEM
1291. Hotel Reservation
1292. ERP System
1293. Bug Tracking System
1294. Vendor Information System For Shiping
1295. Top-K ranking System
1296. Secure Medical Image Archive System
1297. Business Activity Coordination Using Web Services
1298. Management Portal
1299. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1300. Secure Data Filtering Recommendation System
1301. Online Resources Sharing via Social Networks
1302. Secure self-destructing in Cloud Computing
1303. Web Resourecs File Authorization Management
1304. Click based image re-ranking system
1305. Tree Structure Data Analiysis Mining
1306. Web Resource Allocation for CorPerate
1307. Web Vulnerabilities and Security
1308. Fuzzy Cloud Search Using XML
1309. Cloud Data Supporting Secure Query Search
1310. Tour Recommender Systems on Web
1311. Distributed Interactive Web Applications
1312. Secure Query Processing for Cloud
1313. Online Data Storage with less pricing
1314. Cost Based Web Content Managemnts
1315. Web Hospital Management
1316. Online Data storage with low price
1317. Secure Online Data Block Authorization
1318. Profitable Onlin web Server System
1319. Online Economies File Manager for Multi Keying
1320. Online Community Management
1321. Key based Online Data Managements
1322. Critical Workflow Management for Web Documents
1323. Secure Online Documents Managements for Group Sharing
1324. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1325. Online Marketing Automation System
1326. Internal organization change management System
1327. Secure confirmation of sensitive transaction data in modern Internet banking services
1328. Privacy security with TPA in cloud computing
1329. Company Information Tracking System
1330. Online Virtualized screen Processing
1331. Web Service for Airline Management
1332. Web Social Club
1333. Quantum Key Cryptography
1334. Patient Data Management Based On Hospital Location
1335. Online Software Developer Community
1336. Online Developed Software sales
1337. Avoid repeated measurements On Genetics Dataset
1338. College Lab Maintenance System
1339. Industrial Manpower Resource Organizer
1340. Web Query Construction and Search on Complex Data
1341. Hospital Emergency Data Management
1342. Data confidentiality On Health-care Information System
1343. Secure Online Trading
1344. Fast Real-Time Event Alert Using social Network
1345. Secure E-Mail Organizer
1346. Web User Service Management System
1347. Easy SQL Query for Non-IT Manager
1348. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1349. Customer Relationship Management (CRM) on Banking
1350. Online Company ERP System
1351. Constructing E-Tourism
1352. Web based Multi Service Ranking System
1353. Dynamic Customer Data Hiding in Banking
1354. Online Distributed Social Clubs
1355. Virtual Shopping with Negative Feedback Reputation Systems
1356. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1357. Web Service Oriented Query Authentication Technique
1358. Web Based Customer Favorite vehicle Search Engine
1359. Web Based Book Publishing System
1360. Virtual Energy- Based Encryption and Keying
1361. Video Fraud Detecting On social Network
1362. Video Compression with Data hiding & Data Extraction
1363. Vendor Information System for Shipping
1364. VALUE ADDED TAX (VAT)
1365. Universal Smart Card
1366. Ultimate Location Information Systems
1367. Top K Ranking System
1368. Techno Task Manager
1369. Supply Chain Management
1370. Substitution-Permutation cryptanalysis System
1371. Streaming Data Warehouse Updations
1372. Step by Step Monitoring for Product Purchasing System
1373. Steganography for Data Reading and Writing AVI files
1374. SQL TUNER
1375. SMS Transaction Security
1376. Session Authentication Passwords using Color
1377. Service Availability Guarantees on Virtual Economy
1378. Server Fraud Detection on Cloud
1379. Sentence Based Search on Cloud
1380. Semantic Web Search Engines
1381. Secured Image communicator
1382. Secure smart application on web application
1383. Secure Service-Oriented Smartcard systems
1384. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1385. Secure Location Identification System
1386. Secure and Cloud Based Patient Information Systems
1387. Reduce the Password Guessing Attacks using Click Point
1388. Recommendation System Based on Graph
1389. Quantum Key Cryptography
1390. Quality Controller
1391. Public Web Status Monitoring System
1392. Project Trade Pool
1393. Product Marketing Analysis On Public Opinion
1394. Predicting Users Behaviors Using Web Mining
1395. Personal Health Information on M-Healthcare Emergency
1396. Optimum Online Knowledge Base
1397. Online Training Program
1398. Online Time sensitive queries
1399. Online Tag Based Image Retrieval and Effective Management
1400. Online Social networks controls using cloud
1401. Online Rental System
1402. Online product Opinion and Ranking System
1403. Online Dynamic form creation for Non-IT Peoples
1404. Online Digital Contract Signing in Mistrusted Parities
1405. Online Aventure
1406. Online Shopping
1407. News Ticker Project
1408. Net Bank in Recharge
1409. Multi User Public Auditing System of Data Storage Security
1410. Multi Location Networked Mobile Auto Intimates
1411. Modern Distributed Business Applications for Supply Chain Management
1412. Market Intelligence Based Public Sentiment Analysis
1413. Leave Management System
1414. Joint processing of spatial keyword queries
1415. Intelligence Missing Items in Shopping Cart
1416. Information Leak Detection and Prevention
1417. Industrial Manpower Resource Organizer
1418. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1419. Human Expertise Search Engine
1420. Home appliances online Purchase
1421. High Secure Corporate Web Search Engine
1422. High Degree Patient Privacy on Secure Data Outsourcing
1423. Group Movement Pattern Discovery
1424. Graph Based Share Market Data Updating
1425. Generic Business Portal
1426. Flight Booking Portal
1427. Firewall using Packet Filtering
1428. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1429. Ethical and Social issues in File sharing system
1430. Enterprener Sales Report Management
1431. Encyclopedia for Computer Science
1432. Employee Based Performance Monitoring and Action Systems
1433. Emerging Patient Health Information Exchange System On Cloud
1434. Efficient Search on Outsourced data using Cloud
1435. Efficient and Secure Data Processing on Queries Similarity
1436. Distributed Database Optimization on HealthCare
1437. Digital Asset Management Systems (DAMS) Using Watermarking
1438. Detecting Fraud on Vehicle Insurance System
1439. Defeating Lazy Servers Database Vs Query Access Assurance
1440. Data Processing for Disease-Treatment Relations
1441. Data Mining Analysis on EB bill system
1442. Data confidential against untrusted servers using attribute-based encryption (ABE)
1443. Data Aggregation using SQL clustering
1444. Customer Sales Analysis System Based On Purchasing
1445. Cryptography on Personal confidential information
1446. Cost Based Secure Cloud Data Systems
1447. Market Based Analysis for consumer correct decision
1448. Construction Company Work Order System
1449. Complete Medical Transcription System(Mts)
1450. Company Security Reporting System(CSRS)
1451. College Result Analysis
1452. Cloud Economic Benefit On Scientific Computing
1453. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1454. Centralized Event Planer across Social Media Sites
1455. Call Center Management
1456. A Reservation-Based Coordination Protocol for Web Services
1457. Building construction and cost estimation
1458. Budget Planner
1459. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1460. Automatically identifying query groups on Web Search Engine
1461. Auditing Data integrity and data storage using cloud
1462. Application layer blocker for preventing on cyber security
1463. Advanced One-Click User Web Search Engine
1464. Advance Patient Management System


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1465. Young Talent Tracker
1466. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1467. International Plant Import and Export
OUR MODERN SOCITY
1468. Trained Volunteers Create A Successful Social Campaign
1469. Finger thump Based Shopping Cart
1470. Finger Print E-Voting Systems
1471. Create a Successful Anti- Nuclear Campaign
1472. Crowding Funding Mobilization
1473. People Power of India
1474. Modern Finger Print Voting System
1475. Election Commission Management
1476. Online Painting Auction
1477. Reality Show Ticket Booking System
1478. Online Broadway Motel Food Ordering System
1479. Fashion Studio Model Management
1480. Women's Selfhelp Group
Advance Health Care System
1481. Organizing medical camp for public health development
1482. Homeopathy Health Record
1483. Consumer Legal Advicer
1484. Raw Requried Online Medicine
1485. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1486. I School
1487. Job fair section process
1488. Advertising in E-Book
1489. Students Skills With Modern Industries
1490. College Placement And College Event
1491. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1492. Cloud Storage Public Digital Certificate
ERP PROJECTS
1493. Customer Relationship Management
1494. Corporate Trouble Shooter
1495. Corporate Event Organisation
1496. Engnering Lab Maintenance
1497. Select Your Age(Business Motivation all age group)
1498. Software Requirements Analysis for Client Side
1499. ERP System (Enterprint Resource Plan
LATEST BANKING
1500. User Opinion For Indian Banking Service And Cashless Economy
1501. Advanced Banking System
1502. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1503. Economic Usage of Solar Energy
1504. Gps Consumers Complients
1505. Online Softskills Tracks
1506. Online Buy And Sale Software
1507. Budget Home Design
1508. Online Product Exchange
1509. Jewellery Management
1510. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1511. Moderate Robatics System with Public Opinion
Java Apps
1512. Online overview of skills really used in jobs
1513. Land Bank for Nursery
1514. Developing Rural Economy
1515. ECOPS - Electronics Police Record Management System
1516. Website Evaluation Using Opinion Mining
1517. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1518. INSURANCE MANAGEMENT SYSTEM
1519. e-Fraud Prevention based on the Self- Authentication of e-Documents
1520. Hope Center
1521. Exam crazy
1522. BUGS REPORTING SYSTEM
1523. LOCATION BASED CONSUMER COMPLAINT
1524. Speed Racing
1525. ROADSTER
1526. META CAFE
1527. ONLINE VIDEO LOCKER
1528. Management System in Metro Train
1529. Plant Shopping on Web
1530. Reporting Online Media News Systems
1531. Informative Content Extraction
1532. E-commerce Complaint Management System
1533. Modern Agriculture Development System
1534. Loan Online Application
1535. Rural Community Developement
1536. LOVE AND CARE
1537. GREEN PLANT
1538. Advance Couier Service
1539. Community Awarness
1540. E_Music
1541. Staff Management System
1542. E-TENDERING
1543. Hotel Management
1544. Crime File Management System
1545. Cloud Cyber Attack
1546. Cloud Cost Management for Customer Sensitive Data
1547. Advance Web based Multimedia Answer Generation
1548. Commaunity Awareness
1549. E-Commerce Complaints
1550. Modern Agriculture Development System
1551. Plant Shopping on Web
1552. ONLINE VIDEO LOCKER
1553. ONLINE VIDEO LOCKER
1554. Reporting Online Media News Systems
1555. Online Plant Shopping
1556. Community Awareness
1557. Loan Online Application
1558. Modern Agriculture Development System
1559. Online Digital Library
1560. Geo Base Services
1561. Civil Supplies and Consumer Protection Department
1562. Citizen Opinions vs Government Policies
1563. Protecting Used Data Privacy for Attackers
1564. Web Hospital Management
1565. Easy SQL Query for Non-IT Manager
1566. Online Shopping with Fraud detection
1567. Efficient Spatial Query Processing
1568. Cryptographic Key Exchange Authentication
1569. Online Global Information Service Center
1570. Contracts Business Events Management
1571. Online Secure image Social Networks
1572. Outsourcing of Online Image Reconstruction
1573. Trust based Profile Matching Secure Social Network
1574. Secure and Distance based Online Social Network (OSN)
1575. Efficient Online Image Retrieval System
1576. Data Sharing In Cloud Storage by Using Key-Aggregate
1577. Multicast Key Management for Cloud
1578. Face-to-face contact on Mobile Social Networks
1579. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1580. Dynamically Growing Online Survey for Behavioral Outcomes
1581. Advance Web based Multimedia Answer Generation
1582. College Result Analysis with Horizontally Distributed Databases
1583. Feedback Decision Support for mHealth monitoring
1584. Exchange Secrete Key for Data Producers and Consumers
1585. Efficient Information Retrieval Using Ranked Query (EIRQ)
1586. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1587. Web Hosting On Cloud
1588. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1589. Web Server Security with Web Client Management System
1590. Web Parser on Sequence Alignment Techniques
1591. Web Page re-Ranking System for Library
1592. Web Eye
1593. Voting System for Web Library
1594. VIRTUAL CLASSROOM SYSTEM
1595. Unique Web Resources Utilization Monitoring System
1596. Transport Management System
1597. Pre-paid Recharging System on Banking
1598. Tollgate Management
1599. Time To Time Stock Market Updater and Monitoring System
1600. Sql Tuner
1601. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1602. SMS Based Mobile Banking with Security
1603. Sms Topup
1604. Vendor Information System For Shipping
1605. Sequential Anomaly Detection from User Behaviour
1606. Secure SMS Transaction System on banking
1607. Secure Online Documents Management System in Cloud
1608. Secure File Uploading Server with Advance Protecting System
1609. Secure File Monitoring System on Cloud
1610. Relational Logic Search Engine On Healthcare
1611. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1612. Quick Customer decision support on Web Sales Portal
1613. Query Response System for File Management
1614. Quality Visualization on Web TV
1615. Project Work Tracking System
1616. Product Market Manipulations on Asian stock market
1617. Predicting Top Company Share Based on High Utility Data
1618. Automation of Analysis and Development Management
1619. Pharmacy Information System
1620. Personalize Your News on Web
1621. Online University
1622. Online tagging for multimedia content
1623. Online Search Ranking On Multiple Domain
1624. Online Rental House Web Portal
1625. Online Recruitment System
1626. Online Real Estate Property Management
1627. Online Multi Type Documents Search Engine
1628. ONLINE MOBILE BILLING SYSTEM
1629. Online Jewelry Management
1630. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1631. Online Examination System
1632. Online Ensemble Learning Approach
1633. Online Banking With Fraud Detecting
1634. Online Auction Bit
1635. ONLINE ADVERTISING SYSTEM
1636. Nutraceuticals Management System
1637. Nearest Shopping Location Identification Systems
1638. Multilevel Images Authentication Systems
1639. Multi New Product Survey Management
1640. Movie Recommender Systems via User- Item Subgroups
1641. Movie Rating and Recommendation on Mobile
1642. Modern Municipal Corporation
1643. Mobile TV Quality Management
1644. Mobile Banking WAP
1645. Manifold Entrust Scheme
1646. Management System in Train
1647. Secure Mailing System
1648. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1649. LEAVE MANAGEMENT SYSTEM FOR MNC
1650. Knowledge Based Decision Support System(KMS)
1651. Key Management for Content Integration
1652. Inter Bank Fund Transfer in Distributed Network
1653. Information and Knowledge Extracting from a large amount of data
1654. Industry Standard Authorization For Sensitive Resources
1655. Implementation and Validating Environmental and Health
1656. iKnoweb Extracting and Integrating Entity Information System
1657. HUMAN ASSURANCE ADMINISTRATION
1658. High_level network Security Using Packet Filtering
1659. High and Low Level SQL Query Executor
1660. GLOBAL COUNSELLING SYSTEM
1661. A Game Theory for Online Security
1662. Distributed Transaction Proxy
1663. Freelancer Job
1664. File Security With Multi Database System
1665. FILE SEARCH ENGINE
1666. Fertilizer Management System
1667. Fast Web Information Gathering with Alias Detection
1668. E-Tutor Online Jobs
1669. Enterprise Stock and Accounting System
1670. Ensuring Data Storage Security in Cloud Computing
1671. Encrypted IT Auditing on Cloud Computing
1672. Encrypted Data Storage Vs Data Against illegal Access
1673. Enabling Site Interaction In Social Community
1674. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1675. E-Music world
1676. Employee Resource Management
1677. Employee Management System
1678. E-Learning
1679. E Fraud Prevention based on the Self Authentication of e Documents
1680. Distribution System for Discount Sales
1681. Distributed Data Integration on Electricity Board
1682. Disease Information Hiding on Publishing Healthcare Data
1683. Digital Documents Attestation Systems
1684. Defending Against Web Application Vulnerabilities
1685. Defects Analysis Systems
1686. Data theft detection mobile cloud computing
1687. Data Base Fraud Detection Systems
1688. Customer Information Hiding for Data Mismanagement in Banking
1689. Company Security Reporting System(CSRS)
1690. E -Crime File Management System
1691. Credit Card Management System
1692. Corporate Requirement System
1693. Consumer Sales Online Fake Product Detection and Deletion
1694. Company Information Tracking System
1695. Cloud Policy-Based File Assure Deletion
1696. Cloud Data Theft Attacks
1697. Cloud Cyber Attacks against Social Networks
1698. Cloud Cost Management for Customer Sensitive Data
1699. Client Favorite Photo Search Engine on Web
1700. Citizen Card System
1701. Card Management System
1702. Design &Development of Car Parking and Automation Billing Systems
1703. Customer Care Service
1704. BPO Call Center
1705. Automation of IT Process Management
1706. Modeling and Automated Containment of Worms
1707. Attribute Key Based Data Security System
1708. As Needed Basis Accountability for Cloud Data Sharing
1709. Annotation of short texts With Wikipedia pages
1710. AIRLINE RESERVATION SYSTEM
1711. Advance User Management on Social Website
1712. A Semantic Web Based Scientific News Aggregator


Struts Application Projects
Struts Apps
1713. Public Sentiment Analysis with Online Shopping Using Struts
1714. Modern distributed business for supply-chain management
1715. High Confidential Personal Disease Reporting System
1716. Distributor Sensitive Data Management Using Struts
1717. Development of Certificate Authority Services for Web Applications
1718. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1719. Website Tracking System
1720. Website Ranking System
1721. Treasure Warehouse
1722. Student Information System
1723. Storage security
1724. PRISON MANAGEMENT SYSTEM
1725. E-Licence Investigation System
1726. Online Secure File Transfer System
1727. Online Medicine Purchase
1728. ONLINE EDUCATION
1729. Online Agriculture System
1730. Mobile Survey
1731. ISSUE TRACKING SYSYTEM
1732. HOSPITAL MANAGEMENT SYSYTEMS
1733. HealthCare Management System
1734. Global Employee Acclaimer
1735. E-VOTING FOR ASSOCIATION
1736. Encrypted Register Form
1737. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1738. E INSURANCE
1739. Courier Tracking Systems
1740. corporate Transportation
1741. Collectorate Communication Systems
1742. Budget Approval System
1743. BLOOD BANK MANAGEMENT SYSTEMS
1744. ATTENDANCE MANAGEMENT SYSTEM
1745. Activity management


Dotnet Mini Projects
Mini Projects
1746. VALUE ADDED TAX (VAT)
1747. User Oriented Network Attacks
1748. Secure Back Up
1749. Screen Capture And Mouse I/O
1750. Sales Bill Printing System using Excel
1751. Password Security
1752. Online User Mobile Rating
1753. Online Sensex Graph System
1754. Online Book Publishing
1755. NEWS TICKER PROJECT
1756. Multi Storage file
1757. Message Chating
1758. Medical Equipment in WAP
1759. Login Authentication Scheme
1760. Information Alert System
1761. Image Encryption And Decryption
1762. Generic Business Portal
1763. Flight Booking Portal
1764. File Transfer using Cryptography Techniques
1765. File Splitting
1766. Excel Format in Report
1767. EB Management System
1768. Dynamic Web Form Creation
1769. Android Image Search


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1770. Sponsor For Agriculture
1771. Agriculture Assist
1772. Agriculture Marketing in Generation
1773. International Plant Import and Export
MODERN EDUCATION SYSTEM
1774. Old In Gold
1775. I School
1776. College Placement And Events
1777. Rural Area Educational Trouble Shooter
1778. Web Direct Recruitment Analysis
1779. Online Aquarum
1780. School Automation System
1781. Secure Online Course Automation
1782. Session Management System in It Industry
1783. Tools for Non IT Expert Developer
1784. Students Skills With Modern Industries
MODERN TECHNOLOGY
1785. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1786. Customer Favarate Greeting Card Design
1787. GPS Transport Packers and Movers
1788. House Hold Appliancies Warranty Management
1789. Direct Q Less Reservation System in train
1790. Power Consumption Monitoring House Hold Electronic Device
1791. Apartment Maintenance
1792. Budget Home Design
1793. Online Buy And Sale Software
1794. Online Softskills Tracks
1795. Gps Consumers Complients
1796. Economic Usage of Solar Energy
Advance Health Care System
1797. Organizing medical camp for public health development
1798. LIVE WEB DOCTOR CONSULTATION
1799. World Wide Cloud Inter Hospital Acess Health Care System
1800. MAC Sensing Protocol
1801. Medical Record Authentication
1802. Raw Requried Online Medicine
1803. Consumer Legal Advicer
1804. Homeopathy Health Record
SPORTS
1805. Play Ground Booking
1806. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1807. Cloud Storage Public Digital Certificate
ERP PROJECTS
1808. Corporate Trouble Shooter
1809. Entrepreneur Fault Analysis
1810. Organise Corporate Training For Client Projects
1811. Employment Knowledge Database
1812. GPS Employee Tracking System
1813. Non It People Performance
1814. Performance System Analysis In Industry
1815. Consultanting About the Foreign Peoples
1816. Recommend To Friend
1817. New Company Policy Clearance System
1818. ERP System (Enterprint Resource Plan
1819. Software Requirements Analysis for Client Side
1820. Select Your Age(Business Motivation all age group)
1821. Engnering Lab Maintenance
1822. Corporate Event Organisation
LATEST BANKING
1823. EyeBank Management System
1824. Advanced Banking System
OUR MODERN SOCIETY
1825. Trained Volunteers Create A Successful Social Campaign
1826. Finger thump Based Shopping Cart
1827. Railway Management Service
1828. Create a Successful Anti- Nuclear Campaign
1829. Crowding Funding Mobilization
1830. People Power of India
1831. Pets Care
1832. Feature in Best Potitical Leader in India
1833. Yell Help For Children
1834. Automation Transport Maintance
1835. It Park Media
1836. Online Painting Auction
1837. Election Commission Management
1838. Modern Finger Print Voting System


ANGULAR JS ,
ANGULAR JS
1839. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1840. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1841. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1842. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1843. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1844. Generating Query Facets using Knowledge Bases
1845. Private Over-threshold Aggregation Protocols over Distributed Datasets
1846. Private Over-threshold Aggregation Protocols over Distributed Datasets


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1847. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
1848. User-Centric Similarity Search
1849. Efficient Processing of Skyline Queries Using MapReduce


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1850. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1851. Dynamic Facet Ordering for Faceted Product Search Engines
1852. Continuous Top-k Monitoring on Document Streams


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1853. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1854. Filtering out Infrequent Behavior from Business Process Event Logs


Dot Net IEEE 2017-18
IEEE Transactions on Knowledge and Data Engineering
1855. Continuous Top-k Monitoring on Document Streams
1856. Generating Query Facets using Knowledge Bases
1857. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON CLOUD COMPUTING
1858. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
1859. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
1860. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


JAVA IEEE 2017-18
Transactions on Parallel and Distributed Systems
1861. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
1862. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved