Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
hot IT job skills for 2016-17 BIGDATA mongoDB JAVA IEEE 2016-17 ANDROID IEEE 2016 -17
CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP Dot Net IEEE 2016-17 RAZOR MVC 4 ASP.NET
ASP.NET MVC Framework IEEE PHP Projects Latest IEEE 2015-2016 Java Projects Latest IEEE 2015-2016 Dotnet Projects
IEEE 2014-2015 Java Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Java Projects IEEE 2013-2014 Dotnet Projects
IEEE 2012-2013 Java Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Java Project IEEE 2011-2012 Dotnet Projects
ANDROID APPS PHP Application Projects Dotnet Application Projects Java Application Projects
Struts Application Projects Java Mini Projects Dotnet Mini Projects SOFT IDEA FOR DIGITAL SOCIETY
ANGULAR JS , BIGDATA- MONGO DB 2017-2018 RAZOR MVC 4 ASP.NET 2017-18 IEEE PHP Projects 2017-18
Dot Net IEEE 2017-18 ANDROID IEEE 2017 -18 JAVA IEEE 2017-18
 
hot IT job skills for 2016-17
MEAN: MongoDB, Ember, AngularJS and nodeJS
1. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
2. Big Data, Big Knowledge Big Data for Personalized Healthcare
3. Deduplication on Encrypted Big Data in Cloud
4. Secure Sensitive Data Sharing on a Big Data Platform
5. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
6. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
7. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
8. Self-Healing in Mobile Networks with Big Data
9. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
10. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
11. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
12. Developing Apps for visually imapired people: Lessons learned from social network
13. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
14. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
15. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
16. Design of secure location and message sharing system for android platform
17. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
18. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
19. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
20. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
21. Privacy-Preserving Selective Aggregation of Online User Behavior Data
22. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
23. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
24. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
25. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
26. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
27. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
28. Processing Incomplete k Nearest Neighbor Search
29. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
30. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
31. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
32. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
33. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
34. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
35. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
36. Deduplication on Encrypted Big Data in Cloud
37. Dynamic Resource Allocation for MapReduce with Partitioning Skew
38. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
39. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
40. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
41. Self-Healing in Mobile Networks with Big Data
42. Secure Sensitive Data Sharing on a Big Data Platform
43. Big Data, Big Knowledge: Big Data for Personalized Healthcare
44. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
45. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
46. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
47. Differentially Private Frequent Itemset Mining via Transaction Splitting
48. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
49. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
50. Fast Best-Effort Pattern Matching in Large Attributed Graphs


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
51. Two-Factor Data Security Protection Mechanism for Cloud Storage System
52. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
53. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
54. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
55. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
56. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
57. Where You Are Is Who You Are User Identification by Matching Statistics
58. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
59. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
60. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
61. Online Subgraph Skyline Analysis Over Knowledge Graphs
62. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
63. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
64. ID2S Password-Authenticated Key Exchange Protocols
65. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
66. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
67. Electronic Commerce Meets the Semantic Web
68. Mining High Utility Patterns in One Phase without Generating Candidates
69. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
70. Automatic Generation of Social Event Storyboard from Image Click-through Data
71. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
72. Understanding Deep Representations Learned in Modeling Users Likes
73. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
74. Topic-Oriented Exploratory Search Based on an Indexing Network
75. Relevance Feedback Algorithms Inspired By Quantum Detection
76. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
77. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
78. Efficiently Estimating Statistics of Points of Interests on Maps
79. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
80. Aspect-level Influence Discovery from Graphs
81. Sentiment Embeddings with Applications to Sentiment Analysis
82. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
83. Resolving Multi-party Privacy Conflicts in Social Media
84. Encrypted Data Management with Deduplication in Cloud Computing
85. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
86. Crawling Hidden Objects with kNN Queries
87. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
88. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
89. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
90. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
91. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
92. Nearest Keyword Set Search in Multi-dimensional Datasets
93. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
94. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
95. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
96. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
97. Immutable Authentication and Integrity Schemes for Outsourced Databases
98. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
99. Server-Aided Public Key Encryption with Keyword Search
100. Online Learning in Large-Scale Contextual Recommender Systems
101. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
102. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
103. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
104. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
105. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
106. Multi-Modal Event Topic Model for Social Event Analysis
107. Social friend recommendation on multiple network correlation
108. Tag Based Image Search by Social Re-ranking
109. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
110. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
111. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
112. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
113. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
114. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
115. Packet-Scale Congestion Control Paradigm


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
116. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
117. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
118. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
119. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
120. Authentication of Smartphone Users Using Behavioral Biometrics
121. An Exploration of Geographic Authentication Schemes
122. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
123. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
124. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
125. Distributed secret sharing approach with cheater prevention
126. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
127. Efficient privacy preserving location based query over outsourced encrypted data
128. Utilizing the Cloud to Store Hijacked Camera Images
129. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
130. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
131. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
132. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
133. Enabling privacy preserving location proof for mobile users.
134. Optimizing User Experience in Choosing Android Applications
135. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
136. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
137. FoodForCare: An Android Application for Self-Care with Healthy Food
138. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
139. Silence is Golden: Enhancing Privacy of Location-Based Services
140. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
141. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
142. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
143. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
144. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
145. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
146. Adapting to User Interest Drift for POI Recommendation
147. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
148. Developing Apps for visually imapired people: Lessons learned from social network
149. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
150. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
151. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
152. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
153. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
154. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
155. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
156. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
157. Mobile cloud support for semantic enriched speech recognition in social care
158. Distributing secret sharing approach with cheater prevention based on QR code
159. Design of Secure Location and Message Sharing System for Android Platform
160. The impact of cloud technology on the automation of businesses
161. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
162. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
163. Rescue Management System
164. Android Army - Military Apps
165. Android Beauty Parlor
166. Android E Municipality
167. ANDROID NURSE AID
168. Android Customer Care ANDROID, PHP JSON, MySQL


Dot Net IEEE 2016-17
IEEE Transactions on Computers
169. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
170. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
171. TagBook: A Semantic Video Representation without Supervision for Event Detection
172. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
173. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
174. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
175. The Impact of Review Environment on Review Credibility
176. Private Over-threshold Aggregation Protocols over Distributed Datasets
177. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
178. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
179. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
180. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
181. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
182. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
183. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
184. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
185. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
186. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
187. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
188. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
189. What Is Happening in The Video Annotate Video by Sentence
190. Two level QR code for private message sharing and document authentication.
191. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
192. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
193. Mining Health Examination Records A Graph-based Approach
194. A Credibility Analysis System for Assessing Information on Twitter
195. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
196. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
197. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
198. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
199. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
200. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
201. Predicting Personalized Image Emotion Perceptions in Social Networks
202. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
203. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
204. Explaining Missing Answers to Top-k SQL Queries
205. Bilevel Feature Extraction Based Text Mining
206. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
207. Privacy-Preserving Outsourced Media Search
208. Modeling and Verification of Online Shopping Business Processes
209. User Preference Learning for Online Social Recommendation
210. Steganalysis Features for Content-Adaptive JPEG Steganography
211. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
212. PiCode: a New Picture-Embedding 2D Barcode
213. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
214. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
215. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
216. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
217. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
218. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
219. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
220. Cloud workflow scheduling with deadlines and time slot availability
221. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
222. Path-Based Epidemic Spreading in Networks
223. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
224. On the Resiliency of Static Forwarding Tables
225. Network Capability in Localizing Node Failures via End-to-End Path Measurements
226. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
227. DX: Latency-Based Congestion Control for Datacenters


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
228. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
229. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
230. A Forecasting Methodology for Workload Forecasting in Cloud Systems
231. Optimal Shipping Strategy and Return Service Charge Under No-Reason
232. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
233. A Recommendation System to Facilitate Business Process Modeling
234. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
235. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
236. User Differentiated Verifiable File Search on the Cloud
237. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
238. Statistical Features Based Real-time Detection of Drifted Twitter Spam
239. Incremental Consolidation of Data-Intensive Multi-flows
240. Service Pattern: An Integrated Business Process Model for Modern Service Industry
241. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
242. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
243. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
244. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
245. Democratic Diffusion Aggregation for Image Retrieval


ASP.NET MVC Framework
ASP.NET MVC Framework Project
246. Towards Effective Bug Triage with Software Data Reduction Techniques
247. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
248. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
249. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
250. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
251. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
252. Proof of retrievability with public verifiability resilient against related-key attacks
253. Secure Anonymous Key Distribution Scheme for Smart Grid
254. Converses For Secret Key Agreement and Secure Computing
255. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


IEEE PHP Projects
PHP Projects
256. Optimizing Display Advertising Markets
257. Using Knowledge Libraries to Transfer Expert Knowledge
258. Semantic Retrieval of Trademarks Based on Conceptual Similarity
259. Understanding and Predicting Question Subjectivity in Social Question and Answering
260. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
261. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
262. Fast Top-K Path-based Relevance Query on Massive Graphs
263. Web Image Search Re-ranking with Click-based Similarity and Typicality
264. Automatically Mining Facets for Queries from Their Search Results
265. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
266. Statistical Entity Extraction from Web
267. Question Answering System for an Effective Collaborative Learning
268. Lost in Translation: Improving Decoy Documents via Automated Translation
269. Learn to Personalized Image Search from the Photo Sharing Websites
270. In Tags We Trust Trust modeling in social tagging of multimedia content
271. Efficient Anonymous Message Submission
272. Cryptonite: A Secure and Performant Data Repository on Public Clouds


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
273. Rank-Based Similarity Search: Reducing the Dimensional Dependence
274. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
275. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
276. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
277. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
278. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
279. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
280. On the Security of data access control for multiauthority cloud storage system
281. Trust-based Service Management for Social Internet of Things Systems
282. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
283. Formalization and Verification of Group Behavior Interactions
284. Group Key Agreement with Local Connectivity
285. Data Lineage in Malicious Environments
286. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
287. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
288. Enabling Cloud Storage Auditing with Key-Exposure Resistance
289. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
290. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
291. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
292. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
293. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
294. Quantitative Reasoning About Cloud Security Using Service Level Agreements
295. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
296. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
297. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
298. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
299. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
300. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
301. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
302. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
303. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
304. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
305. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
306. Enabling Cloud Storage Auditing with Key-Exposure Resistance
307. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
308. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
309. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
310. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
311. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
312. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
313. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
314. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
315. Secure Auditing and Deduplicating Data in Cloud
316. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
317. Towards reproducibility in online social network Research
318. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
319. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
320. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
321. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
322. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
323. Making Digital Artifacts on the Web Verifiable and Reliable
324. Anonymizing Collections of Tree-Structured Data
325. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
326. FOCS: Fast Overlapped Community Search
327. Sparsity Learning Formulations for Mining Time-Varying Data
328. The Impact of View Histories on Edit Recommendations
329. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
330. Discovery of Ranking Fraud for Mobile Apps
331. Towards Effective Bug Triage with Software Data Reduction Techniques
332. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
333. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
334. Auditing for Distributed Storage Systems
335. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
336. Uploader Intent for Online Video: Typology, Inference and Applications
337. YouTube Video Promotion by Cross-network
338. Semantic-Improved Color Imaging Applications: It Is All About Context
339. Geolocalized Modeling for Dish Recognition
340. Learning to Rank Image Tags with Limited Training Examples
341. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
342. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
343. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
344. Tracking Temporal Community Strength in Dynamic Networks
345. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
346. Towards Information Diffusion in Mobile Social Networks
347. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
348. An Efficient Privacy-Preserving Ranked Keyword Search Method
349. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
350. Dispersing Instant Social Video Service Across Multiple Clouds
351. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
352. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
353. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
354. A Computational Dynamic Trust Model for User Authorization
355. Secure Distributed Deduplication Systems with Improved Reliability
356. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
357. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
358. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
359. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
360. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
361. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
362. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
363. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
364. Hacking is not random: a case-control study of webser ver-compromise risk
365. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
366. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
367. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
368. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
369. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
370. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
371. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
372. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
373. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
374. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
375. Diversifying Web Service Recommendation Results via Exploring Service Usage History
376. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
377. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
378. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
379. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
380. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
381. Cross-Domain Feature Learning in Multimedia
382. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
383. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
384. Saliency-based color accessibility
385. Contextual Online Learning for Multimedia Content Aggregation
386. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
387. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
388. An Attribute-assisted Reranking Model for Web Image Search
389. RRW - A Robust and Reversible Watermarking
390. Steganography Using Reversible Texture Synthesis
391. Single Image Super-Resolution Based on Gradient Profile Sharpness
392. Detection and Rectification of Distorted Fingerprints
393. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
394. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
395. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
396. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
397. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
398. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
399. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
400. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
401. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
402. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
403. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
404. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
405. Authenticated Key Exchange Protocols for Parallel Network File Systems
406. Data Collection in Multi-Application Sharing Wireless Sensor Networks
407. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
408. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
409. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
410. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
411. Optimum Power Allocation in Sensor Networks for Active Radar Applications
412. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
413. Context-based Diversification for Keyword Queries over XML Data
414. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
415. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
416. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
417. Tweet Segmentation and Its Application to Named Entity Recognition
418. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
419. Automatic Group Happiness Intensity Analysis
420. RRW - A Robust and Reversible Watermarking Technique for Relational Data
421. Query Aware Determinization of Uncertain Objects
422. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
423. Leveraging the Tail Time for Saving Energy in Cellular Networks
424. Keylogging-resistant Visual Authentication Protocols
425. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
426. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
427. Preserving Location Privacy in Geo-Social Applications
428. Efficient Authentication for Mobile and Pervasive Computing
429. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
430. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
431. Typicality-Based Collaborative Filtering Recommendation
432. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
433. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
434. Keyword Search Over Probabilistic RDF Graphs
435. Efficient Prediction of Difficult Keyword Queries over Databases
436. Interpreting the Public Sentiment Variations on Twitter
437. An Efficient Recommendation Method for Improving Business Process Modeling
438. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
439. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
440. On the use of Side Information for Mining Text Data
441. Privacy Preserving and Content Protecting Location based Queries
442. Fast Nearest Neighbor Search with Keywords
443. Towards Differential Query Services in Cost-Efficient Clouds
444. Facilitating Document Annotation using Content and Querying Value
445. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
446. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
447. Secure Outsourced Attribute-Based Signatures
448. Supporting Privacy Protection in Personalized Web Search
449. Dealing With Concept Drifts in Process Mining
450. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
451. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
452. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
453. Active Learning of Constraints for Semi-Supervised Clustering
454. Best Keyword Cover Search
455. Personalized Recommendation Combining User Interest and Social Circle
456. Online Feature Selection and Its Applications
457. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
458. Incremental Affinity Propagation Clustering Based on Message Passing
459. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
460. Secure kNN Query Processing in Untrusted Cloud Environments
461. Malware Propagation in Large-Scale Networks
462. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
463. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
464. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
465. Efficient Ranking on Entity Graphs with Personalized Relationships
466. Task Trail: An Effective Segmentation of User Search Behavior
467. Privacy-Preserving Enhanced Collaborative Tagging
468. XSPath Navigation on XML Schemas Made Easy
469. Security Evaluation of Pattern Classifiers under Attack
470. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
471. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
472. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
473. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
474. Nothing is for Free: Security in Searching Shared and Encrypted Data
475. SocialTube: P2P-assisted Video Sharing in Online Social Networks
476. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
477. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
478. Behavioral Malware Detection in Delay Tolerant Networks
479. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
480. Private Searching on Streaming Data Based on Keyword Frequency
481. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
482. On the Security of Trustee-Based Social Authentications
483. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
484. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
485. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
486. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
487. A Two-stage Deanonymization Attack Against Anonymized Social Networks
488. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
489. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
490. Scalable architecture for multi-user encrypted SQL operations on cloud database services
491. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
492. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
493. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
494. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
495. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
496. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
497. Secure kNN Query Processing in Untrusted Cloud Environments
498. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
499. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
500. A Hybrid Cloud Approach for Secure Authorized Deduplication
501. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
502. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
503. A Novel Model for Competition and Cooperation Among Cloud Providers
504. CLOUDQUAL: A Quality Model for Cloud Services
505. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
506. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
507. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
508. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
509. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
510. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
511. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
512. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
513. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
514. Enhanced Security for Association Rule Mining to secure Transactional Databases
515. Operational Pattern Revealing Technique in Text Mining
516. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
517. Personalized web search using Browsing history and domain Knowledge
518. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
519. Data Security the Challenge of Cloud Computing
520. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
521. A Cloud Enviroment for Backup and Data Storage


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
522. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
523. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
524. Cotton Leaf Disease Identification using Pattern Recognition Techniques
525. Efficient Community Formation for Web Services
526. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
527. Secure Mining of Association Rules in Hor izontally Distributed Databases
528. Dynamic Query Forms for Database Queries
529. Secure kNN Query Processing in Untrusted Cloud Environments
530. An Empirical Performance Evaluation of Relational Keyword Search Systems
531. Keyword Query Routing
532. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
533. Demand Bidding Program and Its Application in Hotel Energy Management
534. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
535. Incremental Detection of Inconsistencies in Distributed Data
536. A Cocktail Approach for Travel Package Recommendation
537. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
538. A Random Decision Tree Framework for Privacy-Preserving Data Mining
539. Analysis of Field Data on Web Security Vulnerabilities
540. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
541. A Reliability Improvement Method for SOA-Based Applications
542. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
543. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
544. Web Service Recommendation via Exploiting Location and QoS Information
545. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
546. Exploiting Rateless Codes in Cloud Storage Systems
547. COMIC:Cost Optimization for Internet Content Multihoming
548. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
549. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
550. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
551. Uniform Embedding for Efficient JPEG Steganography
552. Secure Deduplication with Efficient and Reliable Convergent Key Management
553. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
554. Link Quality Aware Code Dissemination in Wireless Sensor Networks
555. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
556. Location Aware Keyword Query Suggestion Based on Document Proximity
557. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
558. A secure data self-destructing scheme in cloud computing
559. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
560. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
561. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
562. Secure kNN Query Processing in Untrusted Cloud Environments
563. Exploiting Rateless Codes in Cloud Storage Systems
564. Fuzzy Authorization for Cloud Storage
565. Planning vs. dynamic control Resource allocation in corporate clouds
566. Automatic Scaling of Internet Applications for Cloud Computing Services
567. Strategy-proof Pricing for Cloud Service Composition
568. Privacy Preserving Delegated Access Control in Public Clouds
569. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
570. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
571. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
572. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
573. A Mechanism Design Approach to Resource Procurement in Cloud Computing
574. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
575. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
576. A Scientometric Analysis of Cloud Computing Literature
577. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
578. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
579. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
580. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
581. FeatureMatch: A General ANNF Estimation Technique and its Applications
582. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
583. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
584. As-Projective-As-Possible Image Stitching with Moving DLT
585. Sharing Visual Secrets in Single Image Random Dot Stereograms
586. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
587. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
588. A New Iterative Triclass Thresholding Technique in Image Segmentation
589. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
590. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
591. An Iranian License Plate Recognition System Based on Color Features
592. Learning Layouts for Single-Page Graphic Designs
593. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
594. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
595. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
596. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
597. Fingerprint Compression Based on Sparse Representation
598. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
599. LBP-Based Edge-Texture Features for Object Recoginition
600. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
601. Toward Experiential Mobile Media Processing
602. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
603. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
604. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
605. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
606. Designing Truthful Spectrum Double Auctions with Local Markets
607. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
608. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
609. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
610. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
611. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
612. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
613. A Study on Clinical Prediction Using Data Mining Techniques
614. Online Payment System using Steganography and Visual Cryptography
615. Efficient Instant-Fuzzy Search with Proximity Ranking
616. Attribute Based Encryption with Privacy Preserving In Clouds
617. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
618. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
619. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
620. User Action Interpretation for Online Content Optimization
621. Spatial Query Integrity with Voronoi Neighbors
622. Spatial Approximate String Search
623. Sensitive Label Privacy Protection on Social Network Data
624. Secure Mining of Association Rules in Horizontally Distributed Databases
625. Secure Logging As a Service Delegating Log Management to the Cloud
626. Robust Module-based Data Management
627. Ranking on Data Manifold with Sink Points
628. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
629. Privacy-Enhanced Web Service Composition
630. Privacy against Aggregate Knowledge Attacks
631. Preventing Private Information Inference Attacks on Social Networks
632. PMSE: A Personalized Mobile Search Engine
633. Personalized QoS-Aware Web Service Recommendation and Visualization
634. Optimal Client-Server Assignment for Internet Distributed Systems
635. Online Search and Buying Behaviour in Consumer Markets
636. M-Privacy for Collaborative Data Publishing
637. Mining User Queries with Markov Chains: Application to Online Image Retrieval
638. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
639. Incentive Compatible Privacy-Preserving Data Analysis
640. Improving Security and Efficiency in Attribute-Based Data Sharing
641. FoCUS: Learning to Crawl Web Forums
642. Fast Nearest Neighbor Search with Keywords
643. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
644. Facilitating Effective User Navigation through Website Structure Improvement
645. Facilitating Document Annotation using Content and Querying Value
646. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
647. Efficient Evaluation of SUM Queries over Probabilistic Data*
648. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
649. Dynamic Query Forms for Database Queries
650. Dynamic Personalized Recommendation on Sparse Data
651. Distributed Strategies for Mining Outliers in Large Data Sets
652. Crowdsourcing Predictors of Behavioral Outcomes
653. Co-Occurrence-Based Diffusion for Expert Search on the Web
654. Comparable Entity Mining from Comparative Questions
655. CloudMoV: Cloud-based Mobile Social TV
656. Anomaly Detection via Online Oversampling Principal Component Analysis
657. Anomaly Detection Approach Using Hidden Markov Model
658. Annotating Search Results from Web Databases
659. A System to Filter Unwanted Messages from OSN User Walls
660. A Survey of XML Tree Patterns
661. A Probabilistic Approach to String Transformation
662. A New Algorithm for Inferring User Search Goals with Feedback Sessions
663. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
664. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
665. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
666. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
667. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
668. Towards Differential Query Services in Cost-Efficient Clouds
669. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
670. SocialTube: P2P-assisted Video Sharing in Online Social Networks
671. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
672. QoS Ranking Prediction for Cloud Services
673. Priority-Based Consolidation of Parallel Workloads in the Cloud
674. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
675. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
676. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
677. Load Rebalancing for Distributed File Systems in Clouds
678. Label-Embedding for Attribute-Based Classification
679. IP-Geolocation Mapping for Moderately Connected Internet Regions
680. Identity-Based Secure Distributed Data Storage Schemes
681. Hint-based Execution of Workloads in Clouds with Nefeli
682. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
683. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
684. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
685. Efficient Two-Server Password-Only Authenticated Key Exchange
686. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
687. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
688. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
689. Winds of Change: From Vendor Lock-In to the Meta Cloud
690. Supporting the Migration of Applications to the Cloud through a Decision Support System
691. Storing Shared Data on the Cloud via Security-Mediator
692. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
693. Privacy-Preserving Public Auditing for Secure Cloud Storage
694. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
695. Outsourcing Privacy-Preserving Social Networks to a Cloud
696. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
697. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
698. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
699. Efficient Security Solution for Privacy-Preserving Cloud Services
700. Collaboration in Multicloud Computing Environments: Framework and Security Issues
701. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
702. Cloud-based DDoS Attacks and Defenses
703. Cloud computing for mobile users can offloading compution save energy
704. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
705. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
706. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
707. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
708. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
709. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
710. Two tales of privacy in online social networks
711. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
712. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
713. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
714. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
715. Security and Privacy-Enhancing Multicloud Architectures
716. Security Using Colors and Armstrong Numbers
717. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
718. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
719. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
720. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
721. Privacy Preserving Data Analytics for Smart Homes
722. On Inference-Proof View Processing of XML Documents
723. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
724. Extracting Spread-Spectrum Hidden Data from Digital Media
725. Efficiently Outsourcing Multiparty Computation under Multiple Keys
726. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
727. Craigslist Scams and Community Composition: Investigating Online Fraud
728. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
729. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
730. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
731. Super-Resolution-based Inpainting
732. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
733. Image Authentication Using Stochastic Diffusion
734. Hierarchical Super-Resolution-Based Inpainting
735. Circular Reranking for Visual Search
736. Bootstrapping Visual Categorization With Relevant Negatives
737. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
738. An extended visual cryptography scheme without pixel expansion for halftone images
739. An Adaptive Cloud Downloading Service
NETWORKING
740. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
741. Topological Conditions for In-Network Stabilization of Dynamical Systems
742. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
743. Price Differentiation for Communication Networks
744. Participatory Privacy: Enabling Privacy in Participatory Sensing
745. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
746. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
747. On the Role of Mobility for Multi-message Gossip
748. Fully Anonymous Profile Matching in Mobile Social Networks
749. Fault Node Recovery Algorithm for a Wireless Sensor Network
750. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
751. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
752. Access Policy Consolidation for Event Processing Systems
753. A Fast Re-Route Method
SOFTWARE ENGINEERING
754. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
755. Vampire attacks: Draining life from wireless ad-hoc sensor networks
756. Towards a Statistical Framework for Source Anonymity in Sensor Networks
757. Search Me If You Can: Privacy-preserving Location Query Service
758. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
759. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
760. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
761. Distributed Cooperative Caching in Social Wireless Networks
762. Community-Aware Opportunistic Routing in Mobile Social Networks
763. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
764. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
765. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
766. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
767. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
768. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
769. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
770. The Target Tracking in Mobile Sensor Networks
771. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
772. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
773. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
774. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
775. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
776. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
777. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
778. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
779. SUSIE: Search Using Services and Information Extraction
780. SeDas: A Self-Destructing Data System Based on Active Storage Framework
781. Secure Mining of Association Rules in Horizontally Distributed Databases
782. Sampling Online Social Networks
783. Privacy Preserving Delegated Access Control in Public Clouds
784. Mining Order-Preserving Submatrices from Data with Repeated Measurements
785. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
786. Ginix : Generalized Inverted Index for Keyword Search
787. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
788. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
789. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
790. Dynamic Query Forms for Database Queries
791. Cost-Based Optimization of Service Compositions
792. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
793. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
794. Automatic Extraction of Top-k Lists from the Web
795. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
796. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
797. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
798. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
799. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
800. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
801. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
802. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
803. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
804. Privacy Preserving Data Sharing With Anonymous ID Assignment
805. Non-Cooperative Location Privacy
806. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
807. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
808. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
809. Cloud based emails boundaries and vulnerabilities
810. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
811. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
812. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
813. Optimal Content Downloading in Vehicular Networks
814. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
815. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Java Projects
SECURE COMPUTING
816. The Devils Behind Web Application Vulnerabilities
817. Security Architecture for Cloud Networking
818. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
819. Secure Overlay Cloud Storage with Access Control and Assured Deletion
820. Risk-Aware Mitigation for MANET Routing Attacks
821. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
822. Privacy-preserving Enforcement of Spatially Aware RBAC
823. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
824. pCloud: A Distributed System for Practical PIR
825. Packet-Hiding Methods for Preventing Selective Jamming Attacks
826. Online Modeling of Proactive Moderation System for Auction Fraud Detection
827. Fast and accurate annotation of short texts with Wikipedia pages
828. FADE: Secure Overlay Cloud Storage with File Assured Deletion
829. Ensuring Distributed Accountability for Data Sharing in the Cloud
830. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
831. Direct and Indirect Discrimination Prevention Methods
832. Detecting Spam Zombies by Monitoring Outgoing Messages
833. Detecting Anomalous Insiders in Collaborative Information Systems
834. Data-Provenance Verification For Secure Hosts
835. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
836. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
837. Payments for Outsourced Computations
838. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
839. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
840. Toward Private Joins on Outsourced Data
841. Statistical Entity Extraction from Web
842. Slicing: A New Approach to Privacy Preserving Data Publishing
843. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
844. Resilient Identity Crime Detection
845. Ranking Model Adaptation for Domain-Specific Search
846. Organizing User Search Histories
847. On the Spectral Characterization and Scalable Mining of Network Communities
848. Multiparty Access Control for Online Social Networks: Model and Mechanisms
849. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
850. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
851. How do Facebookers use Friendlists
852. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
853. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
854. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
855. Enabling Multilevel Trust in Privacy Preserving Data Mining
856. Enabling cross-site interactions in social networks
857. Efficient Similarity Search over Encrypted Data
858. Efficient Extended Boolean Retrieval
859. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
860. Efficient Anonymous Message Submission
861. Effective Pattern Discovery for Text Mining
862. DDD: A New Ensemble Approach for Dealing with Concept Drift
863. Credibility Ranking of Tweets during High Impact Events
864. Creating Evolving User Behavior Profiles Automatically
865. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
866. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
867. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
868. Anomaly Detection for Discrete Sequences: A Survey
869. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
870. Advance Mining of Temporal High Utility Itemset
871. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
872. Reliable Re-encryption in Unreliable Clouds
873. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
874. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
875. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
876. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
877. Gossip-based Resource Management for Cloud Environments
878. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
879. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
880. Cloud Data Protection for the Masses
881. Cloud Computing Security: From Single to Multi-Clouds
882. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
883. In Tags We Trust Trust modeling in social tagging of multimedia content
884. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
885. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
886. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
887. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
888. Cut Detection in Wireless Sensor Networks
889. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
890. TrickleDNS: Bootstrapping DNS Security using Social Trust
891. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
892. Policy-by-Example for Online Social Networks
893. Packet Loss Control Using Tokens at the Network Edge
894. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
895. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
896. Independent Directed Acyclic Graphs for Resilient Multipath Routing
897. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
898. Game-Theoretic Pricing for Video Streaming in Mobile Networks
899. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
900. Auditing for Network Coding Storage
901. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
902. Privacy Preserving Cloud Data Access With Multi-Authorities
903. Movie Rating and Review Summarization in Mobile Environment
904. IDSaaS: Intrusion Detection System as a Service in Public Clouds
905. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
906. BibPro: A Citation Parser Based on Sequence Alignment Techniques
907. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
908. View-invariant action recognition based on Artificial Neural Networks
909. User-aware Image Tag Refinement via Ternary Semantic Analysis
910. Separable Reversible Data Hiding in Encrypted Image
911. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
912. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
913. Robust Face-Name Graph Matching for Movie Character Identification
914. IntentSearch:Capturing User Intention for One-Click Internet Image Search
915. Improving Color Constancy by Photometric Edge Weighting
916. Exploring the design space of social network-based Sybil defenses
917. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
918. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
919. AnnoSearch: Image Auto-Annotation by Search
920. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
921. Scalable Scheduling of Updates in Streaming Data Warehouses
922. Scalable Learning of Collective Behavior
923. Ranking Model Adaptation for Domain-Specific Search
924. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
925. Outsourced Similarity Search on Metric Data Assets
926. Organizing User Search Histories
927. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
928. Mining Web Graphs for Recommendations
929. Joint Top K Spatial Keyword Query Processing
930. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
931. Identifying Content for Planned Events Across Social Media Sites
932. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
933. Generative Models for Item Adoptions Using Social Correlation
934. Efficient Data Mining for XML Queries Answering Support
935. Efficient audit service outsourcing for data integrity in clouds
936. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
937. Effective Pattern Discovery for Text Mining
938. Combined Mining: Discovering Informative Knowledge in Complex Data
939. Decentralized Probabilistic Text Clustering
940. Computing Structural Statistics by Keywords in Databases
941. Bridging Social and Data Networks
942. Answering General Time-Sensitive Queries
943. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
944. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
945. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
946. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
947. Resource-Aware Application State Monitoring
948. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
949. Query Access Assurance in Outsourced Databases
950. Linear and Differential Cryptanalysis
951. Expert Discovery and Interactions in Mixed Service-Oriented Systems
952. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
953. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
954. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
955. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
956. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
957. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
958. ROAuth: Recommendation Based Open Authorization
959. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
960. Recommendation Models for Open Authorization
961. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
962. Packet-Hiding Methods for Preventing Selective Jamming Attacks
963. On Privacy of Encrypted Speech Communications
964. OAuth Web Authorization Protocol
965. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
966. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
967. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
968. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
969. Fast Matrix Embedding by Matrix Extending
970. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
971. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
972. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
973. Access control for online social networks third party applications
SOFTWARE ENGINEERING
974. Measuring Code Quality to Improve Specification Mining
975. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
976. Towards Secure and Dependable Storage Services in Cloud Computing
977. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
978. Remote Display Solutions for Mobile Cloud Computing
979. Privacy Preserving Delegated Access Control in Public Clouds
980. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
981. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
982. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
983. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
984. Load-Balancing Multipath Switching System with Flow Slice
985. Assessing the Veracity of Identity Assertions via OSNs
986. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
987. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
988. A New Cell-Counting-Based Attack Against Tor
989. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
990. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
991. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
992. Network Assisted Mobile Computing with Optimal Uplink Query Processing
993. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
994. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
995. Fast Release Capture Sampling in Large-Scale Sensor Networks
996. Cooperative download in vehicular environments
997. Cooperative Data Dissemination via Roadside WLANs
998. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
999. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1000. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1001. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1002. Hiding Sensitive Association Rule for Privacy Preservation
1003. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1004. Development of Certificate Authority Services for Web Applications
1005. Detecting and Validating Sybil Groups in theWild
1006. Association Rule Extracting Knowledge Using Market Basket Analysis
1007. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
1008. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
1009. RITAS: Services for Randomized Intrusion Tolerance
1010. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
1011. Nymble: Blocking Misbehaving Users in Anonymizing Networks
1012. Modeling and Detection of Camouflaging Worm
1013. Coding for Cryptographic Security Enhancement using Stopping Sets
1014. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
1015. Wireless Sensor Network Security model using Zero Knowledge Protocol
1016. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
1017. Throughput Optimization in Mobile Backbone Networks
1018. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
1019. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
1020. Fast Data Collection in Tree-Based Wireless Sensor Networks
1021. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
1022. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
1023. SPAF: Stateless FSA-based Packet Filters
1024. Selfish Overlay Network Creation and Maintenance
1025. ProgME: Towards Programmable Network MEasurement
1026. Locating Equivalent Servants over P2P Networks
1027. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
1028. Buffer Sizing for 802.11 Based Networks
1029. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
1030. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
1031. Improving Utilization of Infrastructure Clouds
1032. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
1033. CloudTPS: Scalable Transactions for Web Applications in the Cloud
1034. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1035. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
1036. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
1037. Ranking Spatial Data by Quality Preferences
1038. Making Aggregation Work in Uncertain and Probabilistic Databases
1039. Load Shedding in Mobile Systems with MobiQual
1040. Group Enclosing Queries
1041. Extended XML Tree Pattern Matching: Theories and Algorithms
1042. Effective Navigation of Query Results Based on Concept Hierarchies
1043. Discovering Conditional Functional Dependencies
1044. Decision Trees for Uncertain Data
1045. Data Leakage Detection
1046. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


IEEE 2011-2012 Dotnet Projects
NETWORKING
1047. Valuable Detours: Least-Cost Anypath Routing
1048. Self-Reconfigurable Wireless Mesh Networks
1049. Reliability in Layered Networks with Random Link Failures
1050. NABS:Novel Approaches for Biometric Systems
1051. Live Streaming with Receiver-based Peer-division Multiplexing
1052. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1053. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1054. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1055. Virtualized Screen: A Third Element for CloudMobile Convergence
1056. Steganographic Embedding in JPEG Images with Visual Criterion
1057. On the Typical Statistic Features for Image Blind Steganalysis
1058. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1059. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1060. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1061. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1062. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1063. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1064. Vulnerability Analysis in SOA-Based Business Processes
1065. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1066. Service-Centric Framework for a Digital Government Application
1067. Server-Side Streaming Processing of WS-Security
1068. OWLPath: An OWL Ontology-Guided Query Editor
1069. Monitoring Service Systems from a Language-Action Perspective
1070. Extracting Product Features and Sentiments from Chinese Customer Reviews
1071. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1072. Automated Certification for Compliant Cloud-based Business Processes
1073. Addressing Dependability throughout the SOA Life Cycle
1074. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1075. The Geometric Efficient Matching Algorithm for Firewalls
1076. Secure Service-Oriented Architecture for Mobile Transactions
1077. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1078. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1079. Privacy-Preserving Updates to Anonymous and Confidential Databases
1080. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1081. IPAS: Implicit Password Authentication System
1082. Improving Security and Performance in the Tor Network through Tunable Path Selection
1083. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1084. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1085. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1086. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1087. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1088. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1089. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1090. Data Delivery Properties of Human Contact Networks
1091. Converge-Cast: On the Capacity and Delay Tradeoffs
1092. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1093. USHER: Improving Data Quality with Dynamic Forms
1094. The World in a Nutshell: Concise Range Queries
1095. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1096. Scalable Scheduling of Updates in Streaming Data Warehouses
1097. Scalable Learning of Collective Behavior
1098. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1099. Publishing Search Logs A Comparative Study of Privacy Guarantees
1100. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1101. Optimal Service Pricing for a Cloud Cache
1102. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1103. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1104. Mining Web Graphs for Recommendations
1105. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1106. Integration of Sound Signature Authentication System
1107. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1108. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1109. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1110. Exploring Application-Level Semantics for Data Compression
1111. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1112. Data Leakage Detection
1113. Cost-aware rank join with random and sorted access
1114. Collaborative Filtering with Personalized Skylines
1115. Bridging Socially-Enhanced Virtual Communities
1116. Automatic Discovery of Personal Name Aliases from the Web
1117. A Personalized Ontology Model for Web Information Gathering
1118. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1119. A Query Formulation Language for the Data Web
1120. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1121. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1122. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1123. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1124. Towards Secure and Dependable Storage Services in Cloud Computing
1125. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1126. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1127. Data Integrity Proofs in Cloud Storage
1128. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1129. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1130. Feature-level Sentiment Analysis for Chinese Product Reviews
1131. Equal-sized Cells Mean Equal-sized Packets in Tor?
1132. Customer Relationship Management Based on Data Mining Technique
1133. Authentication Schemes for Session Passwords using Color and Images
1134. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


ANDROID APPS
ERP PROEJCT
1135. GPS Employee Tracking System
OUR MODERN SOCITY
1136. Former Student Information
1137. Pets Care
ONLINE CONSUMERS PROCESSING
1138. House Hold Appliancies Warranty Management
1139. GPS Transport Packers and Movers
Android Apps
1140. MY LIBRARY
1141. FACULTY RATING SYSTEM
1142. App for self organizer
1143. ONLINE DOCTOR APPOINTMENT
1144. Conference Event Mobile Assistant
1145. Mobile Prescription
1146. Metastore Application
1147. Android SmartCampus
1148. Android Shopping Mall
1149. TOLL GATE -Barcode Billing System --ANDROID
1150. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1151. Taste Hunt For Restaurants
1152. POLICE APPS
1153. Android Blood Bank
1154. Mobile Expense Claim System Android
1155. Android Intelligent Time Tracking System TICK
1156. Android Course and Attendance Management System
1157. Android Event Reminder
1158. Android Attendance Assessment
1159. Android Advance Shopping
1160. Android CAR POOLING
1161. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1162. Android HOSPITAL
1163. ATHLETE MEET GUIDE
1164. Android Apps PARKING MANAGER
1165. Love and Care
1166. Food Waste Management System
1167. Travel Guide
1168. Android Provisional Store
1169. Best Baby Care with Vaccines Remainder
1170. Android Assist for Lecturer and Student
1171. Android Personal Assistance (PA)
1172. Android Application for College Management System
1173. Tollgate Payment system in android
1174. Intelligence Quotient (IQ) Test
1175. GPS LOCATION ALARM SYSTEM
1176. Location Based Intelligent Mobile Organizer
1177. BANK ACCOUNT TRACKER FOR ANDROID
1178. UNIT CONVERTER
1179. Tips and Tax Calculator in Android
1180. TEXT EDITOR FOR ANDROID
1181. Student Attendance Tracking System
1182. Smart Money With Daily Expenses
1183. Simple And Secure Android TO DO List Application
1184. Restaurant Table Order Management System
1185. Online Shopping
1186. Online Examination System For Android
1187. ANDROID SHOPPING LOCATION IDENTIFIER
1188. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1189. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1190. MICRO CREDIT BANKING ON SMARTPHONE
1191. LOCATION BASED ALARM
1192. Insurance in android
1193. GOOGLE PLACE FINDER
1194. Friend Mapper on Mobiles - Friend Locator
1195. EXPENSE MANAGER
1196. Employee Diractory
1197. Online job search
1198. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1199. ANDROID STUDENT RESULT ANALYZING SYSTEM
1200. CloudMoV : Cloud-based Mobile Social TV
1201. Bus Reservation
1202. Budget Planner
1203. Android SMS Systems
1204. ANDROID LEAVE MANAGEMENT SYSTEM
1205. ANDROID EVENT SCHEDULER/REMINDER
1206. Android Grocery Shopping List
1207. Android Attack Application
1208. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1209. A Mobile Phone Based Medicine In-take Reminder and Monitor


PHP Application Projects
ERP PROJECTS
1210. Employment Knowledge Database
1211. Organise Corporate Training For Client Project s
1212. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1213. ONLINE VEHICLE SHOWROOM SYSTEMS
1214. Online Voting
1215. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1216. School Management System
1217. Secure Online Course Automation
1218. School Automation System
1219. Online Aquarum
1220. Web Direct Recruitment Analysis
PHP Apps
1221. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1222. TRADE / INDUSTRY WEB PORTAL
1223. Feeding the poor from the supermarket
1224. Application for recording your goals and habits
1225. VISUAL WAY TO RAISE AWARENESS
1226. Municipal Corporation
1227. Online Polling For Publishers And Brands
1228. Avoid Food Wastage
1229. Web Doctor
1230. ONLINE FOOD ORDERING SYSTEM
1231. E-Tendering
1232. Improving Rural Communities
1233. Green Planet Awarness
1234. Development of an Online Course Portal for a campus
1235. Auxon Test
1236. WEB BASED LEARNING SYSTEM
1237. Tagging in online social networks
1238. Secured file Downloading system
1239. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1240. searching a image from websites
1241. Online University
1242. Online product Opinion and Ranking System
1243. MNC LEAVE MANAGEMENT SYSTEM
1244. Home appliances online purchase
1245. Freelancer Job
1246. E-Tutor Online Jobs
1247. Statistical Entity Extraction from Web
1248. Effective Collaborative Learning
1249. Development of an e-Post Office System
1250. Question Answering System for an Effective Collaborative Learning


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1251. Online Trends Management Service in It Industry
1252. Session Management System in It Industry
1253. Tools for Non IT Expert Developer
ERP PROJECTS
1254. New Company Policy Clearance System
1255. Recommend To Friend
1256. Consultanting About the Foreign Peoples
1257. Performance System Analysis In Industry
1258. Non It People Performance
MODERN AGRICULTURE
1259. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1260. Agriculture Marketing in Generation
1261. Agriculture Assist
1262. Sponsor For Agriculture
SPORTS
1263. Play Ground Booking
OUR MODERN SOCITY
1264. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1265. RAILWAY SEAT RESERVATION SYSTEM
1266. Railway Management Service
1267. It Park Media
1268. Automation Transport Maintance
1269. Yell Help For Children
1270. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1271. Apartment Maintenance
1272. Power Consumption Monitoring House Hold Electronic Device
1273. Direct Q Less Reservation System in train
Advance Health Care System
1274. MAC Sensing Protocol
1275. World Wide Cloud Inter Hospital Acess Health Care System
1276. Live Doctor
Dotnet Apps
1277. TELEVISION CHANNEL PROGRAM MANAGEMENT
1278. WIN THE TRUST OF AN INDIAN CONSUMER
1279. ONLINE ACCOUNT MANAGEMENT
1280. SMART CAB BOOKING SYSTEM
1281. ONLINE FAST FOOD ORDER
1282. Travel Mate Add Module
1283. Work Order System Call Centre
1284. SPORTS MANAGEMENT SYSTEM
1285. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1286. Pick-It Courier Service
1287. Online Taxi Booking
1288. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1289. INCOMETAX MAINTAINANCE SYSTEM
1290. Hotel Reservation
1291. ERP System
1292. Bug Tracking System
1293. Vendor Information System For Shiping
1294. Top-K ranking System
1295. Secure Medical Image Archive System
1296. Business Activity Coordination Using Web Services
1297. Management Portal
1298. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1299. Secure Data Filtering Recommendation System
1300. Online Resources Sharing via Social Networks
1301. Secure self-destructing in Cloud Computing
1302. Web Resourecs File Authorization Management
1303. Click based image re-ranking system
1304. Tree Structure Data Analiysis Mining
1305. Web Resource Allocation for CorPerate
1306. Web Vulnerabilities and Security
1307. Fuzzy Cloud Search Using XML
1308. Cloud Data Supporting Secure Query Search
1309. Tour Recommender Systems on Web
1310. Distributed Interactive Web Applications
1311. Secure Query Processing for Cloud
1312. Online Data Storage with less pricing
1313. Cost Based Web Content Managemnts
1314. Web Hospital Management
1315. Online Data storage with low price
1316. Secure Online Data Block Authorization
1317. Profitable Onlin web Server System
1318. Online Economies File Manager for Multi Keying
1319. Online Community Management
1320. Key based Online Data Managements
1321. Critical Workflow Management for Web Documents
1322. Secure Online Documents Managements for Group Sharing
1323. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1324. Online Marketing Automation System
1325. Internal organization change management System
1326. Secure confirmation of sensitive transaction data in modern Internet banking services
1327. Privacy security with TPA in cloud computing
1328. Company Information Tracking System
1329. Online Virtualized screen Processing
1330. Web Service for Airline Management
1331. Web Social Club
1332. Quantum Key Cryptography
1333. Patient Data Management Based On Hospital Location
1334. Online Software Developer Community
1335. Online Developed Software sales
1336. Avoid repeated measurements On Genetics Dataset
1337. College Lab Maintenance System
1338. Industrial Manpower Resource Organizer
1339. Web Query Construction and Search on Complex Data
1340. Hospital Emergency Data Management
1341. Data confidentiality On Health-care Information System
1342. Secure Online Trading
1343. Fast Real-Time Event Alert Using social Network
1344. Secure E-Mail Organizer
1345. Web User Service Management System
1346. Easy SQL Query for Non-IT Manager
1347. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1348. Customer Relationship Management (CRM) on Banking
1349. Online Company ERP System
1350. Constructing E-Tourism
1351. Web based Multi Service Ranking System
1352. Dynamic Customer Data Hiding in Banking
1353. Online Distributed Social Clubs
1354. Virtual Shopping with Negative Feedback Reputation Systems
1355. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1356. Web Service Oriented Query Authentication Technique
1357. Web Based Customer Favorite vehicle Search Engine
1358. Web Based Book Publishing System
1359. Virtual Energy- Based Encryption and Keying
1360. Video Fraud Detecting On social Network
1361. Video Compression with Data hiding & Data Extraction
1362. Vendor Information System for Shipping
1363. VALUE ADDED TAX (VAT)
1364. Universal Smart Card
1365. Ultimate Location Information Systems
1366. Top K Ranking System
1367. Techno Task Manager
1368. Supply Chain Management
1369. Substitution-Permutation cryptanalysis System
1370. Streaming Data Warehouse Updations
1371. Step by Step Monitoring for Product Purchasing System
1372. Steganography for Data Reading and Writing AVI files
1373. SQL TUNER
1374. SMS Transaction Security
1375. Session Authentication Passwords using Color
1376. Service Availability Guarantees on Virtual Economy
1377. Server Fraud Detection on Cloud
1378. Sentence Based Search on Cloud
1379. Semantic Web Search Engines
1380. Secured Image communicator
1381. Secure smart application on web application
1382. Secure Service-Oriented Smartcard systems
1383. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1384. Secure Location Identification System
1385. Secure and Cloud Based Patient Information Systems
1386. Reduce the Password Guessing Attacks using Click Point
1387. Recommendation System Based on Graph
1388. Quantum Key Cryptography
1389. Quality Controller
1390. Public Web Status Monitoring System
1391. Project Trade Pool
1392. Product Marketing Analysis On Public Opinion
1393. Predicting Users Behaviors Using Web Mining
1394. Personal Health Information on M-Healthcare Emergency
1395. Optimum Online Knowledge Base
1396. Online Training Program
1397. Online Time sensitive queries
1398. Online Tag Based Image Retrieval and Effective Management
1399. Online Social networks controls using cloud
1400. Online Rental System
1401. Online product Opinion and Ranking System
1402. Online Dynamic form creation for Non-IT Peoples
1403. Online Digital Contract Signing in Mistrusted Parities
1404. Online Aventure
1405. Online Shopping
1406. News Ticker Project
1407. Net Bank in Recharge
1408. Multi User Public Auditing System of Data Storage Security
1409. Multi Location Networked Mobile Auto Intimates
1410. Modern Distributed Business Applications for Supply Chain Management
1411. Market Intelligence Based Public Sentiment Analysis
1412. Leave Management System
1413. Joint processing of spatial keyword queries
1414. Intelligence Missing Items in Shopping Cart
1415. Information Leak Detection and Prevention
1416. Industrial Manpower Resource Organizer
1417. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1418. Human Expertise Search Engine
1419. Home appliances online Purchase
1420. High Secure Corporate Web Search Engine
1421. High Degree Patient Privacy on Secure Data Outsourcing
1422. Group Movement Pattern Discovery
1423. Graph Based Share Market Data Updating
1424. Generic Business Portal
1425. Flight Booking Portal
1426. Firewall using Packet Filtering
1427. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1428. Ethical and Social issues in File sharing system
1429. Enterprener Sales Report Management
1430. Encyclopedia for Computer Science
1431. Employee Based Performance Monitoring and Action Systems
1432. Emerging Patient Health Information Exchange System On Cloud
1433. Efficient Search on Outsourced data using Cloud
1434. Efficient and Secure Data Processing on Queries Similarity
1435. Distributed Database Optimization on HealthCare
1436. Digital Asset Management Systems (DAMS) Using Watermarking
1437. Detecting Fraud on Vehicle Insurance System
1438. Defeating Lazy Servers Database Vs Query Access Assurance
1439. Data Processing for Disease-Treatment Relations
1440. Data Mining Analysis on EB bill system
1441. Data confidential against untrusted servers using attribute-based encryption (ABE)
1442. Data Aggregation using SQL clustering
1443. Customer Sales Analysis System Based On Purchasing
1444. Cryptography on Personal confidential information
1445. Cost Based Secure Cloud Data Systems
1446. Market Based Analysis for consumer correct decision
1447. Construction Company Work Order System
1448. Complete Medical Transcription System(Mts)
1449. Company Security Reporting System(CSRS)
1450. College Result Analysis
1451. Cloud Economic Benefit On Scientific Computing
1452. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1453. Centralized Event Planer across Social Media Sites
1454. Call Center Management
1455. A Reservation-Based Coordination Protocol for Web Services
1456. Building construction and cost estimation
1457. Budget Planner
1458. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1459. Automatically identifying query groups on Web Search Engine
1460. Auditing Data integrity and data storage using cloud
1461. Application layer blocker for preventing on cyber security
1462. Advanced One-Click User Web Search Engine
1463. Advance Patient Management System


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1464. Young Talent Tracker
1465. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1466. International Plant Import and Export
OUR MODERN SOCITY
1467. Trained Volunteers Create A Successful Social Campaign
1468. Finger thump Based Shopping Cart
1469. Finger Print E-Voting Systems
1470. Create a Successful Anti- Nuclear Campaign
1471. Crowding Funding Mobilization
1472. People Power of India
1473. Modern Finger Print Voting System
1474. Election Commission Management
1475. Online Painting Auction
1476. Reality Show Ticket Booking System
1477. Online Broadway Motel Food Ordering System
1478. Fashion Studio Model Management
1479. Women's Selfhelp Group
Advance Health Care System
1480. Organizing medical camp for public health development
1481. Homeopathy Health Record
1482. Consumer Legal Advicer
1483. Raw Requried Online Medicine
1484. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1485. I School
1486. Job fair section process
1487. Advertising in E-Book
1488. Students Skills With Modern Industries
1489. College Placement And College Event
1490. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1491. Cloud Storage Public Digital Certificate
ERP PROJECTS
1492. Customer Relationship Management
1493. Corporate Trouble Shooter
1494. Corporate Event Organisation
1495. Engnering Lab Maintenance
1496. Select Your Age(Business Motivation all age group)
1497. Software Requirements Analysis for Client Side
1498. ERP System (Enterprint Resource Plan
LATEST BANKING
1499. User Opinion For Indian Banking Service And Cashless Economy
1500. Advanced Banking System
1501. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1502. Economic Usage of Solar Energy
1503. Gps Consumers Complients
1504. Online Softskills Tracks
1505. Online Buy And Sale Software
1506. Budget Home Design
1507. Online Product Exchange
1508. Jewellery Management
1509. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1510. Moderate Robatics System with Public Opinion
Java Apps
1511. Online overview of skills really used in jobs
1512. Land Bank for Nursery
1513. Developing Rural Economy
1514. ECOPS - Electronics Police Record Management System
1515. Website Evaluation Using Opinion Mining
1516. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1517. INSURANCE MANAGEMENT SYSTEM
1518. e-Fraud Prevention based on the Self- Authentication of e-Documents
1519. Hope Center
1520. Exam crazy
1521. BUGS REPORTING SYSTEM
1522. LOCATION BASED CONSUMER COMPLAINT
1523. Speed Racing
1524. ROADSTER
1525. META CAFE
1526. ONLINE VIDEO LOCKER
1527. Management System in Metro Train
1528. Plant Shopping on Web
1529. Reporting Online Media News Systems
1530. Informative Content Extraction
1531. E-commerce Complaint Management System
1532. Modern Agriculture Development System
1533. Loan Online Application
1534. Rural Community Developement
1535. LOVE AND CARE
1536. GREEN PLANT
1537. Advance Couier Service
1538. Community Awarness
1539. E_Music
1540. Staff Management System
1541. E-TENDERING
1542. Hotel Management
1543. Crime File Management System
1544. Cloud Cyber Attack
1545. Cloud Cost Management for Customer Sensitive Data
1546. Advance Web based Multimedia Answer Generation
1547. Commaunity Awareness
1548. E-Commerce Complaints
1549. Modern Agriculture Development System
1550. Plant Shopping on Web
1551. ONLINE VIDEO LOCKER
1552. ONLINE VIDEO LOCKER
1553. Reporting Online Media News Systems
1554. Online Plant Shopping
1555. Community Awareness
1556. Loan Online Application
1557. Modern Agriculture Development System
1558. Online Digital Library
1559. Geo Base Services
1560. Civil Supplies and Consumer Protection Department
1561. Citizen Opinions vs Government Policies
1562. Protecting Used Data Privacy for Attackers
1563. Web Hospital Management
1564. Easy SQL Query for Non-IT Manager
1565. Online Shopping with Fraud detection
1566. Efficient Spatial Query Processing
1567. Cryptographic Key Exchange Authentication
1568. Online Global Information Service Center
1569. Contracts Business Events Management
1570. Online Secure image Social Networks
1571. Outsourcing of Online Image Reconstruction
1572. Trust based Profile Matching Secure Social Network
1573. Secure and Distance based Online Social Network (OSN)
1574. Efficient Online Image Retrieval System
1575. Data Sharing In Cloud Storage by Using Key-Aggregate
1576. Multicast Key Management for Cloud
1577. Face-to-face contact on Mobile Social Networks
1578. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1579. Dynamically Growing Online Survey for Behavioral Outcomes
1580. Advance Web based Multimedia Answer Generation
1581. College Result Analysis with Horizontally Distributed Databases
1582. Feedback Decision Support for mHealth monitoring
1583. Exchange Secrete Key for Data Producers and Consumers
1584. Efficient Information Retrieval Using Ranked Query (EIRQ)
1585. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1586. Web Hosting On Cloud
1587. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1588. Web Server Security with Web Client Management System
1589. Web Parser on Sequence Alignment Techniques
1590. Web Page re-Ranking System for Library
1591. Web Eye
1592. Voting System for Web Library
1593. VIRTUAL CLASSROOM SYSTEM
1594. Unique Web Resources Utilization Monitoring System
1595. Transport Management System
1596. Pre-paid Recharging System on Banking
1597. Tollgate Management
1598. Time To Time Stock Market Updater and Monitoring System
1599. Sql Tuner
1600. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1601. SMS Based Mobile Banking with Security
1602. Sms Topup
1603. Vendor Information System For Shipping
1604. Sequential Anomaly Detection from User Behaviour
1605. Secure SMS Transaction System on banking
1606. Secure Online Documents Management System in Cloud
1607. Secure File Uploading Server with Advance Protecting System
1608. Secure File Monitoring System on Cloud
1609. Relational Logic Search Engine On Healthcare
1610. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1611. Quick Customer decision support on Web Sales Portal
1612. Query Response System for File Management
1613. Quality Visualization on Web TV
1614. Project Work Tracking System
1615. Product Market Manipulations on Asian stock market
1616. Predicting Top Company Share Based on High Utility Data
1617. Automation of Analysis and Development Management
1618. Pharmacy Information System
1619. Personalize Your News on Web
1620. Online University
1621. Online tagging for multimedia content
1622. Online Search Ranking On Multiple Domain
1623. Online Rental House Web Portal
1624. Online Recruitment System
1625. Online Real Estate Property Management
1626. Online Multi Type Documents Search Engine
1627. ONLINE MOBILE BILLING SYSTEM
1628. Online Jewelry Management
1629. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1630. Online Examination System
1631. Online Ensemble Learning Approach
1632. Online Banking With Fraud Detecting
1633. Online Auction Bit
1634. ONLINE ADVERTISING SYSTEM
1635. Nutraceuticals Management System
1636. Nearest Shopping Location Identification Systems
1637. Multilevel Images Authentication Systems
1638. Multi New Product Survey Management
1639. Movie Recommender Systems via User- Item Subgroups
1640. Movie Rating and Recommendation on Mobile
1641. Modern Municipal Corporation
1642. Mobile TV Quality Management
1643. Mobile Banking WAP
1644. Manifold Entrust Scheme
1645. Management System in Train
1646. Secure Mailing System
1647. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1648. LEAVE MANAGEMENT SYSTEM FOR MNC
1649. Knowledge Based Decision Support System(KMS)
1650. Key Management for Content Integration
1651. Inter Bank Fund Transfer in Distributed Network
1652. Information and Knowledge Extracting from a large amount of data
1653. Industry Standard Authorization For Sensitive Resources
1654. Implementation and Validating Environmental and Health
1655. iKnoweb Extracting and Integrating Entity Information System
1656. HUMAN ASSURANCE ADMINISTRATION
1657. High_level network Security Using Packet Filtering
1658. High and Low Level SQL Query Executor
1659. GLOBAL COUNSELLING SYSTEM
1660. A Game Theory for Online Security
1661. Distributed Transaction Proxy
1662. Freelancer Job
1663. File Security With Multi Database System
1664. FILE SEARCH ENGINE
1665. Fertilizer Management System
1666. Fast Web Information Gathering with Alias Detection
1667. E-Tutor Online Jobs
1668. Enterprise Stock and Accounting System
1669. Ensuring Data Storage Security in Cloud Computing
1670. Encrypted IT Auditing on Cloud Computing
1671. Encrypted Data Storage Vs Data Against illegal Access
1672. Enabling Site Interaction In Social Community
1673. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1674. E-Music world
1675. Employee Resource Management
1676. Employee Management System
1677. E-Learning
1678. E Fraud Prevention based on the Self Authentication of e Documents
1679. Distribution System for Discount Sales
1680. Distributed Data Integration on Electricity Board
1681. Disease Information Hiding on Publishing Healthcare Data
1682. Digital Documents Attestation Systems
1683. Defending Against Web Application Vulnerabilities
1684. Defects Analysis Systems
1685. Data theft detection mobile cloud computing
1686. Data Base Fraud Detection Systems
1687. Customer Information Hiding for Data Mismanagement in Banking
1688. Company Security Reporting System(CSRS)
1689. E -Crime File Management System
1690. Credit Card Management System
1691. Corporate Requirement System
1692. Consumer Sales Online Fake Product Detection and Deletion
1693. Company Information Tracking System
1694. Cloud Policy-Based File Assure Deletion
1695. Cloud Data Theft Attacks
1696. Cloud Cyber Attacks against Social Networks
1697. Cloud Cost Management for Customer Sensitive Data
1698. Client Favorite Photo Search Engine on Web
1699. Citizen Card System
1700. Card Management System
1701. Design &Development of Car Parking and Automation Billing Systems
1702. Customer Care Service
1703. BPO Call Center
1704. Automation of IT Process Management
1705. Modeling and Automated Containment of Worms
1706. Attribute Key Based Data Security System
1707. As Needed Basis Accountability for Cloud Data Sharing
1708. Annotation of short texts With Wikipedia pages
1709. AIRLINE RESERVATION SYSTEM
1710. Advance User Management on Social Website
1711. A Semantic Web Based Scientific News Aggregator


Struts Application Projects
Struts Apps
1712. Public Sentiment Analysis with Online Shopping Using Struts
1713. Modern distributed business for supply-chain management
1714. High Confidential Personal Disease Reporting System
1715. Distributor Sensitive Data Management Using Struts
1716. Development of Certificate Authority Services for Web Applications
1717. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1718. Website Tracking System
1719. Website Ranking System
1720. Treasure Warehouse
1721. Student Information System
1722. Storage security
1723. PRISON MANAGEMENT SYSTEM
1724. E-Licence Investigation System
1725. Online Secure File Transfer System
1726. Online Medicine Purchase
1727. ONLINE EDUCATION
1728. Online Agriculture System
1729. Mobile Survey
1730. ISSUE TRACKING SYSYTEM
1731. HOSPITAL MANAGEMENT SYSYTEMS
1732. HealthCare Management System
1733. Global Employee Acclaimer
1734. E-VOTING FOR ASSOCIATION
1735. Encrypted Register Form
1736. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1737. E INSURANCE
1738. Courier Tracking Systems
1739. corporate Transportation
1740. Collectorate Communication Systems
1741. Budget Approval System
1742. BLOOD BANK MANAGEMENT SYSTEMS
1743. ATTENDANCE MANAGEMENT SYSTEM
1744. Activity management


Dotnet Mini Projects
Mini Projects
1745. VALUE ADDED TAX (VAT)
1746. User Oriented Network Attacks
1747. Secure Back Up
1748. Screen Capture And Mouse I/O
1749. Sales Bill Printing System using Excel
1750. Password Security
1751. Online User Mobile Rating
1752. Online Sensex Graph System
1753. Online Book Publishing
1754. NEWS TICKER PROJECT
1755. Multi Storage file
1756. Message Chating
1757. Medical Equipment in WAP
1758. Login Authentication Scheme
1759. Information Alert System
1760. Image Encryption And Decryption
1761. Generic Business Portal
1762. Flight Booking Portal
1763. File Transfer using Cryptography Techniques
1764. File Splitting
1765. Excel Format in Report
1766. EB Management System
1767. Dynamic Web Form Creation
1768. Android Image Search


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1769. Sponsor For Agriculture
1770. Agriculture Assist
1771. Agriculture Marketing in Generation
1772. International Plant Import and Export
MODERN EDUCATION SYSTEM
1773. Old In Gold
1774. I School
1775. College Placement And Events
1776. Rural Area Educational Trouble Shooter
1777. Web Direct Recruitment Analysis
1778. Online Aquarum
1779. School Automation System
1780. Secure Online Course Automation
1781. Session Management System in It Industry
1782. Tools for Non IT Expert Developer
1783. Students Skills With Modern Industries
MODERN TECHNOLOGY
1784. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1785. Customer Favarate Greeting Card Design
1786. GPS Transport Packers and Movers
1787. House Hold Appliancies Warranty Management
1788. Direct Q Less Reservation System in train
1789. Power Consumption Monitoring House Hold Electronic Device
1790. Apartment Maintenance
1791. Budget Home Design
1792. Online Buy And Sale Software
1793. Online Softskills Tracks
1794. Gps Consumers Complients
1795. Economic Usage of Solar Energy
Advance Health Care System
1796. Organizing medical camp for public health development
1797. LIVE WEB DOCTOR CONSULTATION
1798. World Wide Cloud Inter Hospital Acess Health Care System
1799. MAC Sensing Protocol
1800. Medical Record Authentication
1801. Raw Requried Online Medicine
1802. Consumer Legal Advicer
1803. Homeopathy Health Record
SPORTS
1804. Play Ground Booking
1805. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1806. Cloud Storage Public Digital Certificate
ERP PROJECTS
1807. Corporate Trouble Shooter
1808. Entrepreneur Fault Analysis
1809. Organise Corporate Training For Client Projects
1810. Employment Knowledge Database
1811. GPS Employee Tracking System
1812. Non It People Performance
1813. Performance System Analysis In Industry
1814. Consultanting About the Foreign Peoples
1815. Recommend To Friend
1816. New Company Policy Clearance System
1817. ERP System (Enterprint Resource Plan
1818. Software Requirements Analysis for Client Side
1819. Select Your Age(Business Motivation all age group)
1820. Engnering Lab Maintenance
1821. Corporate Event Organisation
LATEST BANKING
1822. EyeBank Management System
1823. Advanced Banking System
OUR MODERN SOCIETY
1824. Trained Volunteers Create A Successful Social Campaign
1825. Finger thump Based Shopping Cart
1826. Railway Management Service
1827. Create a Successful Anti- Nuclear Campaign
1828. Crowding Funding Mobilization
1829. People Power of India
1830. Pets Care
1831. Feature in Best Potitical Leader in India
1832. Yell Help For Children
1833. Automation Transport Maintance
1834. It Park Media
1835. Online Painting Auction
1836. Election Commission Management
1837. Modern Finger Print Voting System


ANGULAR JS ,
ANGULAR JS
1838. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1839. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1840. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1841. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1842. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1843. Generating Query Facets using Knowledge Bases
1844. Private Over-threshold Aggregation Protocols over Distributed Datasets
1845. Private Over-threshold Aggregation Protocols over Distributed Datasets


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1846. User-Centric Similarity Search
1847. Efficient Processing of Skyline Queries Using MapReduce


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1848. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1849. Dynamic Facet Ordering for Faceted Product Search Engines
1850. Continuous Top-k Monitoring on Document Streams


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1851. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1852. Filtering out Infrequent Behavior from Business Process Event Logs


Dot Net IEEE 2017-18
IEEE Transactions on Knowledge and Data Engineering
1853. Continuous Top-k Monitoring on Document Streams
1854. Generating Query Facets using Knowledge Bases
1855. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANDROID IEEE 2017 -18
Transactions on Mobile Computing
1856. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


JAVA IEEE 2017-18
IEEE Transactions on Information Forensics and Security
1857. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved