Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
JOB-PYTHON PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) BLOCK CHAIN TECH - BITCOIN
PYTHON APPLICATION PROJECTS LATEST PROJECTS UPDATES JAVA IEEE LATEST Internet of things (IoT) -BLOCKCHAIN
PhD Guidance Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN JAVA SPRING AND HIBERNATE JAVA IEEE 2016-17
IEEE 2014-2015 Java Projects Latest IEEE 2015-2016 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects
IEEE 2011-2012 Java Project Java Application Projects Java Mini Projects NEW TECHNOLOGY-HELP VIDEO
R - DATA SCIENCE - ML WEKA-Machine Learning BIG DATA - HADOOP PROJECTS BIGDATA- MONGO DB 2017-2018
BIGDATA mongoDB ANDROID APPS IEEE ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID
ANDOROID JSON PHP ANDROID APPS COLLEGE MINI PROJECTS IEEE PHP Projects 2017-18
IEEE PHP Projects PHP Application Projects ASP.NET MVC Framework Dot Net IEEE 2017-18
ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18 RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17
Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects
IEEE 2011-2012 Dotnet Projects Dotnet Application Projects Dotnet Mini Projects Struts Application Projects
SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS
BANKING PROJECTS RESTful Web services
 
JOB-PYTHON
Machine Learning Engineer
Data Analyst
Software Engineer
Python Developer
Full-Stack Developers


PYTHON PROJECT - IEEE
Latest Update
1. Monitoring and predicting land use and land cover changes using remote sensing and GIS
2. CAPSULE NETWORKS TO DETECT FORGED IMAGESAND VIDEOS
3. Ambulance response time using image processing and critical path mapping based on traffic control
4. COVID-19 Detection Through Transfer Learning Using Multimodal Imaging Data
5. Detection DDOS
6. Price Trailing for Financial Trading Using Deep Reinforcement Learning
7. PredCom: A Predictive Approach to CollectingApproximated Communication Traces
8. DNA Encryption
9. KiRTi: A Blockchain-based Credit Recommender System for Financial Institutions
10. An Approach to Get Legal Assistance UsingArtificial Intelligence
11. TensorFlow-based Automatic Personality Recognition Used in Asynchronous Video Interviews
12. Applications of Machine Learning in Cancer Predictionand Prognosis
13. Lung Cancer Dettecttiion Usiing ConvolluttiionallNeurall Nettwork
14. AgroAVNET for crops and weeds classification: A step forward in automaticfarming
15. Face Recognition Based Student Attendance System
MORE PYTHON IEEE
16. A Cooperative Distributed Model Predictive Control Approach to Supply Chain Management
17. Authorization policy existence problem
18. BlockMaze An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs
19. Karst Transactional Data Ingestion without Blocking on a Scalable Architecture
20. MAS-Encryption and Its Applications in Privacy-Preserving Classifiers
21. PredCom A Predictive Approach to Collecting Approximated Communication Traces
22. Price Trailing for Financial Trading Using Deep Reinforcement Learning
23. Sentiment Analysis of Comment Texts based on BiLSTM
24. Stock Market Prediction Using Machine Learning
25. Location Based Crime Analysis
26. A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
27. End-to-end Active Object Tracking and Its Real-world Deployment via Reinforcement Learning
28. Leveraging Unlabelled Data for Emotion Recognition with Enhanced Collaborative Semi-Supervised
29. Education data Analysis and Predict of Performance using Machine Learning
30. Design of QR Code based Mall Shopping Guide System
31. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
32. Sentiment Lexicon
33. SUBWAY PASSENGER FLOW FORECASTING WITH MULTI-STATION AND EXTERNAL FACTORS
34. Personalized Recommendation of Social Images by Constructing a User Interest
35. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
36. Opinion Mining using Ontological Spam Detection
37. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
38. Phishing Web Sites Features Classification
39. using data mining to predict hospital admissions from the emergency department
40. Correlated Matrix Factorization for Recommendation with Implicit Feedback
41. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
42. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
43. Text Detection and Recognition
44. Blue Eyes Technology-identifies human emotions (sad, happy, Angry or surprised
45. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
46. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
47. Iris Recognition
48. Currency Recognition System
PYTHON TRAINING WITH PROJECT
49. IPT - CODING DEVELOPMENT
50. IPT - CODING DEVELOPMENT
51. IPT - IEEE PROJECTS
52. Privacy Characterization and Quantification in Data Publishing
53. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
54. Opinion Mining using Ontological Spam Detection
55. Predicting the top-N popular videos via cross-domain hybrid model
56. Fraquent itemsets mining with differential privacy over large scale data
57. Phishing Web Sites Features Classification
58. Dynamic Facet Ordering for Faceted Product Search Engines
59. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
60. Machine Learning and Deep Learning Methods for Cybersecurity
61. Linear Regression Algorithm Predict the volution of Community in Future
62. A User-Centric Machine Learning Framework for Cyber Security Operations Center
63. Linear Regression Algorithm
64. A Machine Learning Approach to Routing
65. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
66. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
67. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
68. CYBER SECURITY
69. Automatic Sentiment Detection in Naturalistic Audio
70. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
71. Student Performance Analysis - PYTHON
72. E-assessment using image processing in ∞Exams
73. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
74. NLP - NATURAL LANGUAGE PROCESSING
75. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
76. Image Based Appraisal of Real Estate Properties-IEEE 2017
77. FOOD WASTE ORGANIZER
78. PYTHON PROJECT FLOW
79. PYTHON PROGRAM EXECUTION
80. PYTHON INSTALLATION
PYTHON APPLICATION
81. Fake News Analysis using Machine Learning - ML
82. Brain Tumor Detection Image Segmentation Using OpenCV
83. Road Accident Analysis Using Machine Learning
84. Inferring Salient Objects from Human Fixations
85. ROTOSCOPING APPEARANCE MODELS
86. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
87. Consumer Attitudes towards Insurance Products
88. Organic Food
89. BOOK RECOMMENDATION SYSTEM PYTHON
90. Web Scraping Using PYTHON
91. MULTIMEDIA CONTENT PROTECTION
92. Student Performance Analysis - PYTHON
93. HOTEL MANAGEMENT
94. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Reinforcement Learning
95. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
96. End-to-end Active Object Tracking and Its Real-world Deployment via Reinforcement Learning
Unsupervised Learning
97. Location Based Crime Analysis
98. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
99. Event Management With Analysis - Python
Supervised Learning
100. Sentiment Analysis of Comment Texts based on BiLSTM
101. Stock Market Prediction Using Machine Learning
102. A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
103. Leveraging Unlabelled Data for Emotion Recognition with Enhanced Collaborative Semi-Supervised
104. Education data Analysis and Predict of Performance using Machine Learning
105. Design of QR Code based Mall Shopping Guide System
106. Blue Eyes Technology -identifies human emotions (sad, happy, Angry or surprised
107. Fake News Analysis using Machine Learning - ML
108. Road Accident Analysis Using Machine Learning
109. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
110. IPT - IEEE PROJECTS
111. Text Detection and Recognition
112. ROTOSCOPING APPEARANCE MODELS
113. Inferring Salient Objects from Human Fixations
114. Privacy Data Mess-apps
115. Speech Recognition in Social Care - NLP
116. Text-to-Speech (TTS)- NLP
117. Voice Scheduler - NLP
118. VOICE SEARCH ENGINE - NLP
119. LINEAR REGRESSION - PYTHON
120. LATENT DIRICHLET ALLOCATION
121. DIGITAL IMAGE PROCESSING - PYTHON
122. DECISION TREE LEARNING - ALGORITHM
123. NAIVE BAYES CLASSIFIER
124. K - MEANS CLUSTERING
125. Dengu Data Analysis Using R-program
126. Shopping Data set Analyse Using R Machine Learning
127. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
128. Polynomial Time Algorithm-PTA
129. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
130. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
131. K-Means For Clustering


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
132. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
133. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
134. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
135. Blockchain for AI
136. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


PYTHON APPLICATION PROJECTS
PYTHON-AI APPLICATION
137. Ecommerce Food Products Sales Forecasting System
138. Website Blocker
139. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
140. Heart Disease Prediction System
141. Web Scraping Using
142. BOOK RECOMMENDATION SYSTEM PYTHON
143. Road Accident Analysis Using Machine Learning
144. Organic Food
145. Consumer Attitudes towards Insurance Products
146. Brain Tumor Detection Image Segmentation Using OpenCV
147. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
148. ROTOSCOPING APPEARANCE MODELS
149. Inferring Salient Objects from Human Fixations
150. Fake News Analysis using Machine Learning


LATEST PROJECTS UPDATES
BIG DATA JAVA - NOSQL- MONGODB
151. Data Mining on AcademicPerformance through Exploration of Student'sBackground and Social Activities
152. Blockchain for AI
PYTHON - AI
153. Sentiment Analysis of Comment Texts based on BiLSTM
154. Stock Market Prediction Using Machine Learning
155. Location Based Crime Analysis
156. A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
157. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
158. Object Tracking and Its Real-world Deployment via Reinforcement Learning
159. Text Detection and Recognition
160. Education data Analysis and Predict of Performance using Machine Learning
161. Design of QR Code based Mall Shopping Guide System
162. Blue Eyes Technology which identifies human emotions (sad, happy, Angry or surprised)
163. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
164. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
165. Inferring Salient Objects from Human Fixations
166. ROTOSCOPING APPEARANCE MODELS
167. Event Management With Analysis - Python
168. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
169. Iris Recognition
170. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
171. Object Detection
172. Rainfall Rate Prediction
173. Drug Usage in Social Media
174. SUBWAY PASSENGER FLOW FORECASTING


JAVA IEEE LATEST
IEEE Transactions on Big Data
175. Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective
176. Patient Oriented Framework Using Bigdata
177. Improving Instance Selection Methods for Big Data Classification
178. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
179. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
180. FINE A Framework for Distributed Learning
181. Sentiment Analysis of Comment Texts based
182. AIR5: Five Pillars of Artificial Intelligence Research
183. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
184. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
185. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
186. Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
187. A Fog-centric Secure Cloud Storage Scheme
188. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
189. Performance Enhancement of Information Retrieval via Artificial Intelligence
190. Crime Pattern Analysis, Visualization And Prediction Using Data Mining
191. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
192. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
193. A Web Service Discovery Approach Based on Common Topic Groups Extraction
194. Dynamic Facet Ordering for Faceted Product Search Engines
195. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
196. Flexible Wildcard Searchable Encryption System
197. QoS Recommendation in Cloud Services
198. Securing Aggregate Queries for DNA Databases
199. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
200. A robust reputation management mechanism in the federated cloud
201. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
202. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
203. Data Mining Analysis on Student's Academic Performance through Exploration of Student's Background and Social Activities
204. Secure Data Group Sharing and Conditional
205. A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding
206. Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis
207. FraudFind Financial Fraud Detection by Analyzing Human Behavior
208. Cancer Disease Prediction Survey Analysis
209. RoadSense: Smartphone Application to Estimate Road Conditions using Accelerometer and Gyroscope
210. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
211. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
212. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
213. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
214. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
215. Energy-efficient Query Processing in Web Search Engines
216. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
217. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
218. BiRank: Towards Ranking on Bipartite Graphs
219. QoS Recommendation in Cloud Services
220. Public Interest Analysis Based on Implicit Feedback of IPTV Users
221. Search Rank Fraud and Malware Detection in Google Play
222. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
223. Influence Maximization in Trajectory Databases
224. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
225. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
226. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
227. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
228. Computing Semantic Similarity of Concepts in Knowledge Graphs
229. QDA: A Query-Driven Approach to Entity Resolution
230. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
231. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
232. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
233. CONTENT BASED IMAGE RETRIEVAL
234. Identifying At Risk Students for Early Interventions A Time Series Clustering
235. Two Layer Clustering model for Mobile Customer Analysis
236. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
237. Consumer oriented web services ranking and classification
238. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
239. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
240. Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems
241. Measures of Scatter and Fisher Discriminant Analysis for Uncertain Data
242. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
243. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
244. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
245. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
246. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
247. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
248. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
249. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


Internet of things (IoT) -BLOCKCHAIN
IOT Under Developing - Topic
250. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
251. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
252. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
253. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
254. Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality
255. Review of Standard Ontologies for the Web of Things
IoT Projects
256. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
257. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
258. Who Moved My Data? Privacy Protection in Smartphones
259. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
260. IOT Projects
261. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
262. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
263. FogRoute: DTN-based Data Dissemination Model in Fog Computing


PhD Guidance
Cyber Security and Privacy
264. Location Based Crime Analysis
265. Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment
266. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
267. Blockchain for AI
Developing PhD proposal
268. Inferring Salient Objects from Human Fixations
269. ROTOSCOPING APPEARANCE MODELS
270. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
271. Review of Standard Ontologies for the Web of Things
272. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
273. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
274. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
275. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
276. Approximate Data Aggregation in Sensor Equipped IoT Networks
277. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
278. Diabetics Dataset
279. MEDICAL DATA ANALYSES
280. R IEEE PROJECTS
281. PhD Project Guidance
282. PhD Projects


Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PYTHON PROJECT WITH PLACEMENT TRAINING
283. IPT - CODING DEVELOPMENT
284. IPT - IEEE PROJECTS
285. Reinforcement learning - AI
286. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
287. Fake News Analysis using Machine Learning - ML
288. Brain Tumor Detection Image Segmentation Using OpenCV
289. Blockchain for AI: Review and Open Research Challenges
290. Road Accident Analysis Using Machine Learning
291. E-assessment using image processing in ∞Exams
292. NLP - NATURAL LANGUAGE PROCESSING
293. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
294. Dengu Data Analysis Using R-program
295. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
296. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
297. Big Scholarly Data: A Survey
298. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
299. Big Data, Big Knowledge Big Data for Personalized Healthcare
300. Deduplication on Encrypted Big Data in Cloud
301. Secure Sensitive Data Sharing on a Big Data Platform
302. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
303. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
304. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
305. Self-Healing in Mobile Networks with Big Data
306. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
307. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
308. Child Monitoring - ANDROID APPS
309. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
310. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
311. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
312. Developing Apps for visually imapired people: Lessons learned from social network
313. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
314. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
315. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
316. Design of secure location and message sharing system for android platform
317. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
318. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
319. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
320. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
321. Privacy Protection based Access Control Scheme in Cloud-based Services
322. Privacy-Preserving Selective Aggregation of Online User Behavior Data
323. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
324. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
325. FISHING DISASTER MANAGEMENT SYSTEM
326. SPRING AND HIBERNATE


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
327. Two-Factor Data Security Protection Mechanism for Cloud Storage System
328. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
329. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
330. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
331. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
332. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
333. Where You Are Is Who You Are User Identification by Matching Statistics
334. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
335. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
336. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
337. Online Subgraph Skyline Analysis Over Knowledge Graphs
338. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
339. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
340. ID2S Password-Authenticated Key Exchange Protocols
341. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
342. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
343. Classification model to predict the learners' academic performance using big data
344. Electronic Commerce Meets the Semantic Web
345. Mining High Utility Patterns in One Phase without Generating Candidates
346. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
347. Automatic Generation of Social Event Storyboard from Image Click-through Data
348. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
349. Understanding Deep Representations Learned in Modeling Users Likes
350. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
351. Topic-Oriented Exploratory Search Based on an Indexing Network
352. Relevance Feedback Algorithms Inspired By Quantum Detection
353. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
354. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
355. Efficiently Estimating Statistics of Points of Interests on Maps
356. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
357. Aspect-level Influence Discovery from Graphs
358. Sentiment Embeddings with Applications to Sentiment Analysis
359. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
360. Resolving Multi-party Privacy Conflicts in Social Media
361. Encrypted Data Management with Deduplication in Cloud Computing
362. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
363. Crawling Hidden Objects with kNN Queries
364. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
365. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
366. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
367. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
368. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
369. Nearest Keyword Set Search in Multi-dimensional Datasets
370. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
371. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
372. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
373. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
374. Immutable Authentication and Integrity Schemes for Outsourced Databases
375. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
376. Server-Aided Public Key Encryption with Keyword Search
377. Online Learning in Large-Scale Contextual Recommender Systems
378. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
379. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
380. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
381. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
382. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
383. Multi-Modal Event Topic Model for Social Event Analysis
384. Social friend recommendation on multiple network correlation
385. Tag Based Image Search by Social Re-ranking
386. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
387. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
388. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
389. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
390. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
391. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
392. Packet-Scale Congestion Control Paradigm


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
393. Leveraging the Tail Time for Saving Energy in Cellular Networks
394. Keylogging-resistant Visual Authentication Protocols
395. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
396. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
397. Preserving Location Privacy in Geo-Social Applications
398. Efficient Authentication for Mobile and Pervasive Computing
399. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
400. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
401. Typicality-Based Collaborative Filtering Recommendation
402. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
403. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
404. Keyword Search Over Probabilistic RDF Graphs
405. Efficient Prediction of Difficult Keyword Queries over Databases
406. Interpreting the Public Sentiment Variations on Twitter
407. An Efficient Recommendation Method for Improving Business Process Modeling
408. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
409. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
410. On the use of Side Information for Mining Text Data
411. Privacy Preserving and Content Protecting Location based Queries
412. Fast Nearest Neighbor Search with Keywords
413. Towards Differential Query Services in Cost-Efficient Clouds
414. Facilitating Document Annotation using Content and Querying Value
415. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
416. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
417. Secure Outsourced Attribute-Based Signatures
418. Supporting Privacy Protection in Personalized Web Search
419. Dealing With Concept Drifts in Process Mining
420. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
421. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
422. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
423. Active Learning of Constraints for Semi-Supervised Clustering
424. Best Keyword Cover Search
425. Personalized Recommendation Combining User Interest and Social Circle
426. Online Feature Selection and Its Applications
427. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
428. Incremental Affinity Propagation Clustering Based on Message Passing
429. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
430. Secure kNN Query Processing in Untrusted Cloud Environments
431. Malware Propagation in Large-Scale Networks
432. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
433. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
434. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
435. Efficient Ranking on Entity Graphs with Personalized Relationships
436. Task Trail: An Effective Segmentation of User Search Behavior
437. Privacy-Preserving Enhanced Collaborative Tagging
438. XSPath Navigation on XML Schemas Made Easy
439. Security Evaluation of Pattern Classifiers under Attack
440. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
441. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
442. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
443. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
444. Nothing is for Free: Security in Searching Shared and Encrypted Data
445. SocialTube: P2P-assisted Video Sharing in Online Social Networks
446. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
447. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
448. Behavioral Malware Detection in Delay Tolerant Networks
449. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
450. Private Searching on Streaming Data Based on Keyword Frequency
451. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
452. On the Security of Trustee-Based Social Authentications
453. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
454. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
455. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
456. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
457. A Two-stage Deanonymization Attack Against Anonymized Social Networks
458. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
459. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
460. Scalable architecture for multi-user encrypted SQL operations on cloud database services
461. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
462. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
463. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
464. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
465. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
466. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
467. Secure kNN Query Processing in Untrusted Cloud Environments
468. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
469. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
470. A Hybrid Cloud Approach for Secure Authorized Deduplication
471. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
472. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
473. A Novel Model for Competition and Cooperation Among Cloud Providers
474. CLOUDQUAL: A Quality Model for Cloud Services
475. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
476. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
477. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
478. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
479. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
480. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
481. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
482. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
483. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
484. Enhanced Security for Association Rule Mining to secure Transactional Databases
485. Operational Pattern Revealing Technique in Text Mining
486. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
487. Personalized web search using Browsing history and domain Knowledge
488. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
489. Data Security the Challenge of Cloud Computing
490. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
491. A Cloud Enviroment for Backup and Data Storage


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
492. Rank-Based Similarity Search: Reducing the Dimensional Dependence
493. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
494. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
495. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
496. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
497. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
498. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
499. On the Security of data access control for multiauthority cloud storage system
500. Trust-based Service Management for Social Internet of Things Systems
501. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
502. Formalization and Verification of Group Behavior Interactions
503. Group Key Agreement with Local Connectivity
504. Data Lineage in Malicious Environments
505. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
506. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
507. Enabling Cloud Storage Auditing with Key-Exposure Resistance
508. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
509. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
510. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
511. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
512. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
513. Quantitative Reasoning About Cloud Security Using Service Level Agreements
514. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
515. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
516. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
517. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
518. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
519. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
520. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
521. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
522. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
523. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
524. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
525. Enabling Cloud Storage Auditing with Key-Exposure Resistance
526. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
527. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
528. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
529. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
530. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
531. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
532. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
533. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
534. Secure Auditing and Deduplicating Data in Cloud
535. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
536. Towards reproducibility in online social network Research
537. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
538. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
539. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
540. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
541. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
542. Making Digital Artifacts on the Web Verifiable and Reliable
543. Anonymizing Collections of Tree-Structured Data
544. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
545. FOCS: Fast Overlapped Community Search
546. Sparsity Learning Formulations for Mining Time-Varying Data
547. The Impact of View Histories on Edit Recommendations
548. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
549. Discovery of Ranking Fraud for Mobile Apps
550. Towards Effective Bug Triage with Software Data Reduction Techniques
551. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
552. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
553. Auditing for Distributed Storage Systems
554. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
555. Uploader Intent for Online Video: Typology, Inference and Applications
556. YouTube Video Promotion by Cross-network
557. Semantic-Improved Color Imaging Applications: It Is All About Context
558. Geolocalized Modeling for Dish Recognition
559. Learning to Rank Image Tags with Limited Training Examples
560. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
561. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
562. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
563. Tracking Temporal Community Strength in Dynamic Networks
564. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
565. Towards Information Diffusion in Mobile Social Networks
566. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
567. An Efficient Privacy-Preserving Ranked Keyword Search Method
568. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
569. Dispersing Instant Social Video Service Across Multiple Clouds
570. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
571. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
572. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
573. A Computational Dynamic Trust Model for User Authorization
574. Secure Distributed Deduplication Systems with Improved Reliability
575. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
576. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
577. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
578. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
579. User Action Interpretation for Online Content Optimization
580. Spatial Query Integrity with Voronoi Neighbors
581. Spatial Approximate String Search
582. Sensitive Label Privacy Protection on Social Network Data
583. Secure Mining of Association Rules in Horizontally Distributed Databases
584. Secure Logging As a Service Delegating Log Management to the Cloud
585. Robust Module-based Data Management
586. Ranking on Data Manifold with Sink Points
587. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
588. Privacy-Enhanced Web Service Composition
589. Privacy against Aggregate Knowledge Attacks
590. Preventing Private Information Inference Attacks on Social Networks
591. PMSE: A Personalized Mobile Search Engine
592. Personalized QoS-Aware Web Service Recommendation and Visualization
593. Optimal Client-Server Assignment for Internet Distributed Systems
594. Online Search and Buying Behaviour in Consumer Markets
595. M-Privacy for Collaborative Data Publishing
596. Mining User Queries with Markov Chains: Application to Online Image Retrieval
597. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
598. Incentive Compatible Privacy-Preserving Data Analysis
599. Improving Security and Efficiency in Attribute-Based Data Sharing
600. FoCUS: Learning to Crawl Web Forums
601. Fast Nearest Neighbor Search with Keywords
602. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
603. Facilitating Effective User Navigation through Website Structure Improvement
604. Facilitating Document Annotation using Content and Querying Value
605. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
606. Efficient Evaluation of SUM Queries over Probabilistic Data*
607. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
608. Dynamic Query Forms for Database Queries
609. Dynamic Personalized Recommendation on Sparse Data
610. Distributed Strategies for Mining Outliers in Large Data Sets
611. Crowdsourcing Predictors of Behavioral Outcomes
612. Co-Occurrence-Based Diffusion for Expert Search on the Web
613. Comparable Entity Mining from Comparative Questions
614. CloudMoV: Cloud-based Mobile Social TV
615. Anomaly Detection via Online Oversampling Principal Component Analysis
616. Anomaly Detection Approach Using Hidden Markov Model
617. Annotating Search Results from Web Databases
618. A System to Filter Unwanted Messages from OSN User Walls
619. A Survey of XML Tree Patterns
620. A Probabilistic Approach to String Transformation
621. A New Algorithm for Inferring User Search Goals with Feedback Sessions
622. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
623. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
624. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
625. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
626. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
627. Towards Differential Query Services in Cost-Efficient Clouds
628. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
629. SocialTube: P2P-assisted Video Sharing in Online Social Networks
630. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
631. QoS Ranking Prediction for Cloud Services
632. Priority-Based Consolidation of Parallel Workloads in the Cloud
633. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
634. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
635. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
636. Load Rebalancing for Distributed File Systems in Clouds
637. Label-Embedding for Attribute-Based Classification
638. IP-Geolocation Mapping for Moderately Connected Internet Regions
639. Identity-Based Secure Distributed Data Storage Schemes
640. Hint-based Execution of Workloads in Clouds with Nefeli
641. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
642. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
643. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
644. Efficient Two-Server Password-Only Authenticated Key Exchange
645. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
646. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
647. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
648. Winds of Change: From Vendor Lock-In to the Meta Cloud
649. Supporting the Migration of Applications to the Cloud through a Decision Support System
650. Storing Shared Data on the Cloud via Security-Mediator
651. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
652. Privacy-Preserving Public Auditing for Secure Cloud Storage
653. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
654. Outsourcing Privacy-Preserving Social Networks to a Cloud
655. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
656. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
657. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
658. Efficient Security Solution for Privacy-Preserving Cloud Services
659. Collaboration in Multicloud Computing Environments: Framework and Security Issues
660. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
661. Cloud-based DDoS Attacks and Defenses
662. Cloud computing for mobile users can offloading compution save energy
663. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
664. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
665. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
666. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
667. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
668. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
669. Two tales of privacy in online social networks
670. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
671. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
672. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
673. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
674. Security and Privacy-Enhancing Multicloud Architectures
675. Security Using Colors and Armstrong Numbers
676. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
677. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
678. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
679. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
680. Privacy Preserving Data Analytics for Smart Homes
681. On Inference-Proof View Processing of XML Documents
682. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
683. Extracting Spread-Spectrum Hidden Data from Digital Media
684. Efficiently Outsourcing Multiparty Computation under Multiple Keys
685. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
686. Craigslist Scams and Community Composition: Investigating Online Fraud
687. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
688. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
689. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
690. Super-Resolution-based Inpainting
691. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
692. Image Authentication Using Stochastic Diffusion
693. Hierarchical Super-Resolution-Based Inpainting
694. Circular Reranking for Visual Search
695. Bootstrapping Visual Categorization With Relevant Negatives
696. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
697. An extended visual cryptography scheme without pixel expansion for halftone images
698. An Adaptive Cloud Downloading Service
NETWORKING
699. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
700. Topological Conditions for In-Network Stabilization of Dynamical Systems
701. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
702. Price Differentiation for Communication Networks
703. Participatory Privacy: Enabling Privacy in Participatory Sensing
704. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
705. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
706. On the Role of Mobility for Multi-message Gossip
707. Fully Anonymous Profile Matching in Mobile Social Networks
708. Fault Node Recovery Algorithm for a Wireless Sensor Network
709. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
710. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
711. Access Policy Consolidation for Event Processing Systems
712. A Fast Re-Route Method
SOFTWARE ENGINEERING
713. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
714. Vampire attacks: Draining life from wireless ad-hoc sensor networks
715. Towards a Statistical Framework for Source Anonymity in Sensor Networks
716. Search Me If You Can: Privacy-preserving Location Query Service
717. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
718. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
719. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
720. Distributed Cooperative Caching in Social Wireless Networks
721. Community-Aware Opportunistic Routing in Mobile Social Networks
722. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
723. The Devils Behind Web Application Vulnerabilities
724. Security Architecture for Cloud Networking
725. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
726. Secure Overlay Cloud Storage with Access Control and Assured Deletion
727. Risk-Aware Mitigation for MANET Routing Attacks
728. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
729. Privacy-preserving Enforcement of Spatially Aware RBAC
730. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
731. pCloud: A Distributed System for Practical PIR
732. Packet-Hiding Methods for Preventing Selective Jamming Attacks
733. Online Modeling of Proactive Moderation System for Auction Fraud Detection
734. Fast and accurate annotation of short texts with Wikipedia pages
735. FADE: Secure Overlay Cloud Storage with File Assured Deletion
736. Ensuring Distributed Accountability for Data Sharing in the Cloud
737. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
738. Direct and Indirect Discrimination Prevention Methods
739. Detecting Spam Zombies by Monitoring Outgoing Messages
740. Detecting Anomalous Insiders in Collaborative Information Systems
741. Data-Provenance Verification For Secure Hosts
742. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
743. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
744. Payments for Outsourced Computations
745. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
746. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
747. Toward Private Joins on Outsourced Data
748. Statistical Entity Extraction from Web
749. Slicing: A New Approach to Privacy Preserving Data Publishing
750. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
751. Resilient Identity Crime Detection
752. Ranking Model Adaptation for Domain-Specific Search
753. Organizing User Search Histories
754. On the Spectral Characterization and Scalable Mining of Network Communities
755. Multiparty Access Control for Online Social Networks: Model and Mechanisms
756. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
757. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
758. How do Facebookers use Friendlists
759. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
760. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
761. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
762. Enabling Multilevel Trust in Privacy Preserving Data Mining
763. Enabling cross-site interactions in social networks
764. Efficient Similarity Search over Encrypted Data
765. Efficient Extended Boolean Retrieval
766. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
767. Efficient Anonymous Message Submission
768. Effective Pattern Discovery for Text Mining
769. DDD: A New Ensemble Approach for Dealing with Concept Drift
770. Credibility Ranking of Tweets during High Impact Events
771. Creating Evolving User Behavior Profiles Automatically
772. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
773. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
774. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
775. Anomaly Detection for Discrete Sequences: A Survey
776. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
777. Advance Mining of Temporal High Utility Itemset
778. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
779. Reliable Re-encryption in Unreliable Clouds
780. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
781. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
782. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
783. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
784. Gossip-based Resource Management for Cloud Environments
785. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
786. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
787. Cloud Data Protection for the Masses
788. Cloud Computing Security: From Single to Multi-Clouds
789. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
790. In Tags We Trust Trust modeling in social tagging of multimedia content
791. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
792. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
793. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
794. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
795. Cut Detection in Wireless Sensor Networks
796. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
797. TrickleDNS: Bootstrapping DNS Security using Social Trust
798. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
799. Policy-by-Example for Online Social Networks
800. Packet Loss Control Using Tokens at the Network Edge
801. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
802. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
803. Independent Directed Acyclic Graphs for Resilient Multipath Routing
804. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
805. Game-Theoretic Pricing for Video Streaming in Mobile Networks
806. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
807. Auditing for Network Coding Storage
808. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
809. Privacy Preserving Cloud Data Access With Multi-Authorities
810. Movie Rating and Review Summarization in Mobile Environment
811. IDSaaS: Intrusion Detection System as a Service in Public Clouds
812. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
813. BibPro: A Citation Parser Based on Sequence Alignment Techniques
814. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
815. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
816. RITAS: Services for Randomized Intrusion Tolerance
817. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
818. Nymble: Blocking Misbehaving Users in Anonymizing Networks
819. Modeling and Detection of Camouflaging Worm
820. Coding for Cryptographic Security Enhancement using Stopping Sets
821. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
822. Wireless Sensor Network Security model using Zero Knowledge Protocol
823. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
824. Throughput Optimization in Mobile Backbone Networks
825. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
826. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
827. Fast Data Collection in Tree-Based Wireless Sensor Networks
828. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
829. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
830. SPAF: Stateless FSA-based Packet Filters
831. Selfish Overlay Network Creation and Maintenance
832. ProgME: Towards Programmable Network MEasurement
833. Locating Equivalent Servants over P2P Networks
834. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
835. Buffer Sizing for 802.11 Based Networks
836. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
837. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
838. Improving Utilization of Infrastructure Clouds
839. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
840. CloudTPS: Scalable Transactions for Web Applications in the Cloud
841. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
842. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
843. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
844. Ranking Spatial Data by Quality Preferences
845. Making Aggregation Work in Uncertain and Probabilistic Databases
846. Load Shedding in Mobile Systems with MobiQual
847. Group Enclosing Queries
848. Extended XML Tree Pattern Matching: Theories and Algorithms
849. Effective Navigation of Query Results Based on Concept Hierarchies
850. Discovering Conditional Functional Dependencies
851. Decision Trees for Uncertain Data
852. Data Leakage Detection
853. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
854. Young Talent Tracker
855. Cricket Stadium Seat Booking
MODERN AGRICULTRE
856. i VILLAGE
857. International Plant Import and Export
OUR MODERN SOCITY
858. Passport Automation
859. Helping Hands
860. SMART TAXI BOOKING
861. Metro Rail Corporation
862. Trained Volunteers Create A Successful Social Campaign
863. Finger thump Based Shopping Cart
864. Finger Print E-Voting Systems
865. Create a Successful Anti- Nuclear Campaign
866. Crowding Funding Mobilization
867. People Power of India
868. Modern Finger Print Voting System
869. Election Commission Management
870. Online Painting Auction
871. Reality Show Ticket Booking System
872. Online Broadway Motel Food Ordering System
873. Fashion Studio Model Management
874. Women's Selfhelp Group
Advance Health Care System
875. Gracelife - Charity one click away
876. Medical Reporting System
877. Organizing medical camp for public health development
878. Homeopathy Health Record
879. Consumer Legal Advicer
880. Raw Requried Online Medicine
881. Medical Record Authentication
MORDERN EDUCATION SYSTEM
882. I School
883. Job fair section process
884. Advertising in E-Book
885. Students Skills With Modern Industries
886. College Placement And College Event
887. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
888. Cloud Storage Public Digital Certificate
ERP PROJECTS
889. Customer Relationship Management
890. Corporate Trouble Shooter
891. Corporate Event Organisation
892. Engnering Lab Maintenance
893. Select Your Age(Business Motivation all age group)
894. Software Requirements Analysis for Client Side
895. ERP System (Enterprint Resource Plan
LATEST BANKING
896. User Opinion For Indian Banking Service And Cashless Economy
897. Advanced Banking System
898. EyeBank Management System
ONLINE CONSUMERS PROCESSING
899. Economic Usage of Solar Energy
900. Gps Consumers Complients
901. Online Softskills Tracks
902. Online Buy And Sale Software
903. Budget Home Design
904. Online Product Exchange
905. Jewellery Management
906. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
907. E TENDERING -JAVA
908. Moderate Robatics System with Public Opinion
Java Apps
909. Online overview of skills really used in jobs
910. Land Bank for Nursery
911. Developing Rural Economy
912. ECOPS - Electronics Police Record Management System
913. Website Evaluation Using Opinion Mining
914. Monitoring Suspicious Discussions on Online Forums Using Data Mining
915. INSURANCE MANAGEMENT SYSTEM
916. e-Fraud Prevention based on the Self- Authentication of e-Documents
917. Hope Center
918. Exam crazy
919. BUGS REPORTING SYSTEM
920. LOCATION BASED CONSUMER COMPLAINT
921. Speed Racing
922. ROADSTER
923. META CAFE
924. ONLINE VIDEO LOCKER
925. Management System in Metro Train
926. Plant Shopping on Web
927. Reporting Online Media News Systems
928. Informative Content Extraction
929. E-commerce Complaint Management System
930. Modern Agriculture Development System
931. Loan Online Application
932. Rural Community Developement
933. LOVE AND CARE
934. GREEN PLANT
935. Advance Couier Service
936. Community Awarness
937. E_Music
938. Staff Management System
939. E-TENDERING
940. Hotel Management
941. Crime File Management System
942. Cloud Cyber Attack
943. Cloud Cost Management for Customer Sensitive Data
944. Advance Web based Multimedia Answer Generation
945. Commaunity Awareness
946. E-Commerce Complaints
947. Modern Agriculture Development System
948. Plant Shopping on Web
949. ONLINE VIDEO LOCKER
950. ONLINE VIDEO LOCKER
951. Reporting Online Media News Systems
952. Online Plant Shopping
953. Community Awareness
954. Loan Online Application
955. Modern Agriculture Development System
956. Online Digital Library
957. Geo Base Services
958. Civil Supplies and Consumer Protection Department
959. Citizen Opinions vs Government Policies
960. Protecting Used Data Privacy for Attackers
961. Web Hospital Management
962. Easy SQL Query for Non-IT Manager
963. Online Shopping with Fraud detection
964. Efficient Spatial Query Processing
965. Cryptographic Key Exchange Authentication
966. Online Global Information Service Center
967. Contracts Business Events Management
968. Online Secure image Social Networks
969. Outsourcing of Online Image Reconstruction
970. Trust based Profile Matching Secure Social Network
971. Secure and Distance based Online Social Network (OSN)
972. Efficient Online Image Retrieval System
973. Data Sharing In Cloud Storage by Using Key-Aggregate
974. Multicast Key Management for Cloud
975. Face-to-face contact on Mobile Social Networks
976. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
977. Dynamically Growing Online Survey for Behavioral Outcomes
978. Advance Web based Multimedia Answer Generation
979. College Result Analysis with Horizontally Distributed Databases
980. Feedback Decision Support for mHealth monitoring
981. Exchange Secrete Key for Data Producers and Consumers
982. Efficient Information Retrieval Using Ranked Query (EIRQ)
983. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
984. Web Hosting On Cloud
985. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
986. Web Server Security with Web Client Management System
987. Web Parser on Sequence Alignment Techniques
988. Web Page re-Ranking System for Library
989. Web Eye
990. Voting System for Web Library
991. VIRTUAL CLASSROOM SYSTEM
992. Unique Web Resources Utilization Monitoring System
993. Transport Management System
994. Pre-paid Recharging System on Banking
995. Tollgate Management
996. Time To Time Stock Market Updater and Monitoring System
997. Sql Tuner
998. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
999. SMS Based Mobile Banking with Security
1000. Sms Topup
1001. Vendor Information System For Shipping
1002. Sequential Anomaly Detection from User Behaviour
1003. Secure SMS Transaction System on banking
1004. Secure Online Documents Management System in Cloud
1005. Secure File Uploading Server with Advance Protecting System
1006. Secure File Monitoring System on Cloud
1007. Relational Logic Search Engine On Healthcare
1008. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1009. Quick Customer decision support on Web Sales Portal
1010. Query Response System for File Management
1011. Quality Visualization on Web TV
1012. Project Work Tracking System
1013. Product Market Manipulations on Asian stock market
1014. Predicting Top Company Share Based on High Utility Data
1015. Automation of Analysis and Development Management
1016. Pharmacy Information System
1017. Personalize Your News on Web
1018. Online University
1019. Online tagging for multimedia content
1020. Online Search Ranking On Multiple Domain
1021. Online Rental House Web Portal
1022. Online Recruitment System
1023. Online Real Estate Property Management
1024. Online Multi Type Documents Search Engine
1025. ONLINE MOBILE BILLING SYSTEM
1026. Online Jewelry Management
1027. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1028. Online Examination System
1029. Online Ensemble Learning Approach
1030. Online Banking With Fraud Detecting
1031. Online Auction Bit
1032. ONLINE ADVERTISING SYSTEM
1033. Nutraceuticals Management System
1034. Nearest Shopping Location Identification Systems
1035. Multilevel Images Authentication Systems
1036. Multi New Product Survey Management
1037. Movie Recommender Systems via User- Item Subgroups
1038. Movie Rating and Recommendation on Mobile
1039. Modern Municipal Corporation
1040. Mobile TV Quality Management
1041. Mobile Banking WAP
1042. Manifold Entrust Scheme
1043. Management System in Train
1044. Secure Mailing System
1045. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1046. LEAVE MANAGEMENT SYSTEM FOR MNC
1047. Knowledge Based Decision Support System(KMS)
1048. Key Management for Content Integration
1049. Inter Bank Fund Transfer in Distributed Network
1050. Information and Knowledge Extracting from a large amount of data
1051. Industry Standard Authorization For Sensitive Resources
1052. Implementation and Validating Environmental and Health
1053. iKnoweb Extracting and Integrating Entity Information System
1054. HUMAN ASSURANCE ADMINISTRATION
1055. High_level network Security Using Packet Filtering
1056. High and Low Level SQL Query Executor
1057. GLOBAL COUNSELLING SYSTEM
1058. A Game Theory for Online Security
1059. Distributed Transaction Proxy
1060. Freelancer Job
1061. File Security With Multi Database System
1062. FILE SEARCH ENGINE
1063. Fertilizer Management System
1064. Fast Web Information Gathering with Alias Detection
1065. E-Tutor Online Jobs
1066. Enterprise Stock and Accounting System
1067. Ensuring Data Storage Security in Cloud Computing
1068. Encrypted IT Auditing on Cloud Computing
1069. Encrypted Data Storage Vs Data Against illegal Access
1070. Enabling Site Interaction In Social Community
1071. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1072. E-Music world
1073. Employee Resource Management
1074. Employee Management System
1075. E-Learning
1076. E Fraud Prevention based on the Self Authentication of e Documents
1077. Distribution System for Discount Sales
1078. Distributed Data Integration on Electricity Board
1079. Disease Information Hiding on Publishing Healthcare Data
1080. Digital Documents Attestation Systems
1081. Defending Against Web Application Vulnerabilities
1082. Defects Analysis Systems
1083. Data theft detection mobile cloud computing
1084. Data Base Fraud Detection Systems
1085. Customer Information Hiding for Data Mismanagement in Banking
1086. Company Security Reporting System(CSRS)
1087. E -Crime File Management System
1088. Credit Card Management System
1089. Corporate Requirement System
1090. Consumer Sales Online Fake Product Detection and Deletion
1091. Company Information Tracking System
1092. Cloud Policy-Based File Assure Deletion
1093. Cloud Data Theft Attacks
1094. Cloud Cyber Attacks against Social Networks
1095. Cloud Cost Management for Customer Sensitive Data
1096. Client Favorite Photo Search Engine on Web
1097. Citizen Card System
1098. Card Management System
1099. Design &Development of Car Parking and Automation Billing Systems
1100. Customer Care Service
1101. BPO Call Center
1102. Automation of IT Process Management
1103. Modeling and Automated Containment of Worms
1104. Attribute Key Based Data Security System
1105. As Needed Basis Accountability for Cloud Data Sharing
1106. Annotation of short texts With Wikipedia pages
1107. AIRLINE RESERVATION SYSTEM
1108. Advance User Management on Social Website
1109. A Semantic Web Based Scientific News Aggregator


Java Mini Projects
Mini Projects
1110. Website Tracking System
1111. Website Ranking System
1112. Treasure Warehouse
1113. Student Information System
1114. Storage security
1115. PRISON MANAGEMENT SYSTEM
1116. E-Licence Investigation System
1117. Online Secure File Transfer System
1118. Online Medicine Purchase
1119. ONLINE EDUCATION
1120. Online Agriculture System
1121. Mobile Survey
1122. ISSUE TRACKING SYSYTEM
1123. HOSPITAL MANAGEMENT SYSYTEMS
1124. HealthCare Management System
1125. Global Employee Acclaimer
1126. E-VOTING FOR ASSOCIATION
1127. Encrypted Register Form
1128. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1129. E INSURANCE
1130. Courier Tracking Systems
1131. corporate Transportation
1132. Collectorate Communication Systems
1133. Budget Approval System
1134. BLOOD BANK MANAGEMENT SYSTEMS
1135. ATTENDANCE MANAGEMENT SYSTEM
1136. Activity management


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
1137. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
1138. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
1139. NAIVE BAYES CLASSIFIER
1140. K - MEANS CLUSTERING
1141. LINEAR REGRESSION - PYTHON
1142. LATENT DIRICHLET ALLOCATION
1143. DIGITAL IMAGE PROCESSING - PYTHON
1144. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
1145. MACHINE LEARNING-ML ALGORITHM
1146. WHAT IS MACHINE LEARNING - AI
1147. NATURAL LANGAUAGE PROCESSING - NLP
1148. VISION - Visual Data


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
1149. R - ADVANCE IMAGE PROCESSING
1150. Dengu Data Analysis Using R-program
1151. Shopping Data set Analysis Using R Machine Learning
1152. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
1153. R PROGRAM TRAINING
1154. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
1155. COMAPRISON OF VARIOUS DOCKING SCORES
1156. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
1157. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
1158. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
1159. MICRO ARRAY GENE EXPRESSION ANALYSIS
1160. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
1161. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
1162. Diabetics Dataset
1163. Excercise Dataset
1164. MEDICAL DATA ANALYSES
1165. WEKA PRIVACY DATA SET ANALYSES


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
1166. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
1167. MRSIM: Mitigating Reducer Skew In MapReduce
1168. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
1169. HADOOP WITH HEALTHCARE DATA ANALYSYS
1170. HADOOP WEBLOG DATA ANALYSES
1171. BANK DATA ANALYTIC WITH HADOOP
1172. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1173. Bucket Based Data Deduplication Technique for Big Data Storage System
1174. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
1175. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
1176. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
1177. Efficient Recommendation of De-identification Policies using MapReduce
1178. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
1179. Big Scholarly Data: A Survey
1180. SocialQ&A: An Online Social Network Based Question and Answer System
1181. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1182. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1183. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
1184. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1185. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
1186. User-Centric Similarity Search
1187. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
1188. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
1189. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
1190. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
1191. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
1192. Processing Incomplete k Nearest Neighbor Search
1193. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
1194. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
1195. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
1196. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
1197. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
1198. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
1199. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
1200. Deduplication on Encrypted Big Data in Cloud
1201. Dynamic Resource Allocation for MapReduce with Partitioning Skew
1202. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
1203. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
1204. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
1205. Self-Healing in Mobile Networks with Big Data
1206. Secure Sensitive Data Sharing on a Big Data Platform
1207. Big Data, Big Knowledge: Big Data for Personalized Healthcare
1208. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
1209. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
1210. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1211. Differentially Private Frequent Itemset Mining via Transaction Splitting
1212. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
1213. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
1214. Fast Best-Effort Pattern Matching in Large Attributed Graphs


ANDROID APPS IEEE
IEEE TRANSACTIONS ON BIG DATA
1215. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
1216. BusTracking
1217. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
1218. Who Moved My Data? Privacy Protection in Smartphones
1219. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
1220. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
1221. Android User Privacy Preserving through Crowdsourcing
1222. DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection
1223. Verbal Authentication for Personal Digital Assistants
1224. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
1225. Privacy-Preserving Aggregate Queries for Optimal Location Selection
1226. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
1227. 5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds
1228. Mobile Attendance using Near Field Communication And One-Time Password
1229. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
1230. Efficient Clue-based Route Search on Road Networks
1231. Privacy-Preserving Location-Proximity for Mobile Apps
1232. Cooperative Query Answer Authentication
1233. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
1234. Blood Bank APPS
1235. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
1236. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
1237. ZapDroid: Managing Infrequently Used Applications on Smartphones
1238. Searching Trajectories by Regions of Interest
1239. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
1240. A Classroom Scheduling Service for Smart Classes
1241. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
1242. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
1243. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
1244. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
1245. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1246. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
1247. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1248. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
1249. Authentication of Smartphone Users Using Behavioral Biometrics
1250. An Exploration of Geographic Authentication Schemes
1251. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
1252. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
1253. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
1254. Distributed secret sharing approach with cheater prevention
1255. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
1256. Efficient privacy preserving location based query over outsourced encrypted data
1257. Utilizing the Cloud to Store Hijacked Camera Images
1258. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
1259. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
1260. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
1261. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
1262. Enabling privacy preserving location proof for mobile users.
1263. Optimizing User Experience in Choosing Android Applications
1264. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
1265. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
1266. FoodForCare: An Android Application for Self-Care with Healthy Food
1267. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
1268. Silence is Golden: Enhancing Privacy of Location-Based Services
1269. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
1270. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
1271. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
1272. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
1273. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
1274. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
1275. Adapting to User Interest Drift for POI Recommendation
1276. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
1277. Developing Apps for visually imapired people: Lessons learned from social network
1278. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
1279. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
1280. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
1281. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
1282. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
1283. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
1284. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
1285. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1286. Mobile cloud support for semantic enriched speech recognition in social care
1287. Distributing secret sharing approach with cheater prevention based on QR code
1288. Design of Secure Location and Message Sharing System for Android Platform
1289. The impact of cloud technology on the automation of businesses
1290. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
1291. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
1292. Rescue Management System
1293. Android Army - Military Apps
1294. Android Beauty Parlor
1295. Android E Municipality
1296. ANDROID NURSE AID
1297. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
1298. Human Resource (HR)- APPS
1299. GPS Employee Tracking System
OUR MODERN SOCITY
1300. GENERIC MEDICINE
1301. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
1302. RECYCLE APP WASTE COLLECTION REUSE
1303. Bikes Rental - APPS
1304. Location Based Alarm - GPS
1305. ANDROID APPS FOR INSURANCE SYSTEM
1306. BUDGET HOME DESIGN -ANDROID APPS
1307. Former To Former Apps
1308. Pets Care
ONLINE CONSUMERS PROCESSING
1309. House Hold Appliancies Warranty Management
1310. GPS Transport Packers and Movers
Android Apps
1311. MY LIBRARY
1312. FACULTY RATING SYSTEM
1313. App for self organizer
1314. ONLINE DOCTOR APPOINTMENT
1315. Conference Event Mobile Assistant
1316. Mobile Prescription
1317. Metastore Application
1318. Android SmartCampus
1319. Android Shopping Mall
1320. TOLL GATE -Barcode Billing System --ANDROID
1321. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1322. Taste Hunt For Restaurants
1323. POLICE APPS
1324. Android Blood Bank
1325. Mobile Expense Claim System – Android
1326. Android Intelligent Time Tracking System TICK
1327. Android Course and Attendance Management System
1328. Android Event Reminder
1329. Android Attendance Assessment
1330. Android Advance Shopping
1331. Android CAR POOLING
1332. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1333. Android HOSPITAL
1334. ATHLETE MEET GUIDE
1335. Android Apps PARKING MANAGER
1336. Love and Care
1337. Food Waste Management System
1338. Travel Guide
1339. Android Provisional Store
1340. Best Baby Care with Vaccines Remainder
1341. Android Assist for Lecturer and Student
1342. Android Personal Assistance (PA)
1343. Android Application for College Management System
1344. Tollgate Payment system in android
1345. Intelligence Quotient (IQ) Test
1346. GPS LOCATION ALARM SYSTEM
1347. Location Based Intelligent Mobile Organizer
1348. BANK ACCOUNT TRACKER FOR ANDROID
1349. UNIT CONVERTER
1350. Tips and Tax Calculator in Android
1351. TEXT EDITOR FOR ANDROID
1352. Student Attendance Tracking System
1353. Smart Money With Daily Expenses
1354. Simple And Secure Android TO DO List Application
1355. Restaurant Table Order Management System
1356. Online Shopping
1357. Online Examination System For Android
1358. ANDROID SHOPPING LOCATION IDENTIFIER
1359. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1360. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1361. MICRO CREDIT BANKING ON SMARTPHONE
1362. LOCATION BASED ALARM
1363. Insurance in android
1364. GOOGLE PLACE FINDER
1365. Friend Mapper on Mobiles - Friend Locator
1366. EXPENSE MANAGER
1367. Employee Diractory
1368. Online job search
1369. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1370. ANDROID STUDENT RESULT ANALYZING SYSTEM
1371. CloudMoV : Cloud-based Mobile Social TV
1372. Bus Reservation
1373. Budget Planner
1374. Android SMS Systems
1375. ANDROID LEAVE MANAGEMENT SYSTEM
1376. ANDROID EVENT SCHEDULER/REMINDER
1377. Android Grocery Shopping List
1378. Android Attack Application
1379. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1380. A Mobile Phone Based Medicine In-take Reminder and Monitor


COLLEGE MINI PROJECTS
DOT NET MINI PROJECTS
PHP - MINI PROJECTS
JAVA -MINI PROJECT
PYTHON
1381. HOTEL MANAGEMENT
1382. GYM MANAGEMENT APPLICATION
1383. ONLINE BOOK STORE


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1384. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1385. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
1386. Optimizing Display Advertising Markets
1387. Using Knowledge Libraries to Transfer Expert Knowledge
1388. Semantic Retrieval of Trademarks Based on Conceptual Similarity
1389. Understanding and Predicting Question Subjectivity in Social Question and Answering
1390. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
1391. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
1392. Fast Top-K Path-based Relevance Query on Massive Graphs
1393. Web Image Search Re-ranking with Click-based Similarity and Typicality
1394. Automatically Mining Facets for Queries from Their Search Results
1395. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
1396. Statistical Entity Extraction from Web
1397. Question Answering System for an Effective Collaborative Learning
1398. Lost in Translation: Improving Decoy Documents via Automated Translation
1399. Learn to Personalized Image Search from the Photo Sharing Websites
1400. In Tags We Trust Trust modeling in social tagging of multimedia content
1401. Efficient Anonymous Message Submission
1402. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
1403. Employment Knowledge Database
1404. Organise Corporate Training For Client Project s
1405. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1406. ONLINE VEHICLE SHOWROOM SYSTEMS
1407. Online Voting
1408. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1409. School Management System
1410. Secure Online Course Automation
1411. School Automation System
1412. Online Aquarum
1413. Web Direct Recruitment Analysis
PHP Apps
1414. Project Approval System
1415. Movie Ticket Booking
1416. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1417. TRADE / INDUSTRY WEB PORTAL
1418. Feeding the poor from the supermarket
1419. Application for recording your goals and habits
1420. VISUAL WAY TO RAISE AWARENESS
1421. Municipal Corporation
1422. Online Polling For Publishers And Brands
1423. Avoid Food Wastage
1424. Web Doctor
1425. ONLINE FOOD ORDERING SYSTEM
1426. E-Tendering
1427. Improving Rural Communities
1428. Green Planet Awarness
1429. Development of an Online Course Portal for a campus
1430. Auxon Test
1431. WEB BASED LEARNING SYSTEM
1432. Tagging in online social networks
1433. Secured file Downloading system
1434. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1435. searching a image from websites
1436. Online University
1437. Online product Opinion and Ranking System
1438. MNC LEAVE MANAGEMENT SYSTEM
1439. Home appliances online purchase
1440. Freelancer Job
1441. E-Tutor Online Jobs
1442. Statistical Entity Extraction from Web
1443. Effective Collaborative Learning
1444. Development of an e-Post Office System
1445. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
1446. Towards Effective Bug Triage with Software Data Reduction Techniques
1447. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
1448. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
1449. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
1450. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
1451. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
1452. Proof of retrievability with public verifiability resilient against related-key attacks
1453. Secure Anonymous Key Distribution Scheme for Smart Grid
1454. Converses For Secret Key Agreement and Secure Computing
1455. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
1456. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
1457. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1458. Privacy Protection based Access Control Scheme in Cloud-based Services
1459. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
1460. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
1461. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1462. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1463. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1464. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1465. Explaining Missing Answers to Top-k SQL Queries
1466. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1467. Continuous Top-k Monitoring on Document Streams
1468. Generating Query Facets using Knowledge Bases
1469. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1470. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1471. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1472. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1473. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1474. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1475. Generating Query Facets using Knowledge Bases
1476. Private Over-threshold Aggregation Protocols over Distributed Datasets
1477. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1478. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1479. Privacy Protection based Access Control Scheme in Cloud-based Services
1480. Dynamic Facet Ordering for Faceted Product Search Engines
1481. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1482. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1483. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1484. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1485. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1486. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1487. A Recommendation System to Facilitate Business Process Modeling
1488. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1489. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1490. User Differentiated Verifiable File Search on the Cloud
1491. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1492. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1493. Incremental Consolidation of Data-Intensive Multi-flows
1494. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1495. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1496. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1497. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1498. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1499. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1500. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1501. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1502. TagBook: A Semantic Video Representation without Supervision for Event Detection
1503. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1504. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1505. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1506. The Impact of Review Environment on Review Credibility
1507. Private Over-threshold Aggregation Protocols over Distributed Datasets
1508. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1509. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1510. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1511. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1512. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1513. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1514. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1515. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1516. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1517. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1518. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1519. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1520. What Is Happening in The Video Annotate Video by Sentence
1521. Two level QR code for private message sharing and document authentication.
1522. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1523. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1524. Mining Health Examination Records A Graph-based Approach
1525. A Credibility Analysis System for Assessing Information on Twitter
1526. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1527. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1528. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1529. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1530. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1531. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1532. Predicting Personalized Image Emotion Perceptions in Social Networks
1533. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1534. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1535. Explaining Missing Answers to Top-k SQL Queries
1536. Bilevel Feature Extraction Based Text Mining
1537. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1538. Privacy-Preserving Outsourced Media Search
1539. Modeling and Verification of Online Shopping Business Processes
1540. User Preference Learning for Online Social Recommendation
1541. Steganalysis Features for Content-Adaptive JPEG Steganography
1542. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1543. PiCode: a New Picture-Embedding 2D Barcode
1544. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1545. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1546. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1547. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1548. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1549. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1550. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1551. Cloud workflow scheduling with deadlines and time slot availability
1552. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1553. Path-Based Epidemic Spreading in Networks
1554. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1555. On the Resiliency of Static Forwarding Tables
1556. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1557. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1558. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1559. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1560. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1561. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1562. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1563. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1564. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1565. Hacking is not random: a case-control study of webser ver-compromise risk
1566. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1567. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1568. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1569. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1570. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1571. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1572. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1573. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1574. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1575. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1576. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1577. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1578. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1579. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1580. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1581. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1582. Cross-Domain Feature Learning in Multimedia
1583. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1584. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1585. Saliency-based color accessibility
1586. Contextual Online Learning for Multimedia Content Aggregation
1587. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1588. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1589. An Attribute-assisted Reranking Model for Web Image Search
1590. RRW - A Robust and Reversible Watermarking
1591. Steganography Using Reversible Texture Synthesis
1592. Single Image Super-Resolution Based on Gradient Profile Sharpness
1593. Detection and Rectification of Distorted Fingerprints
1594. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1595. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1596. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1597. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1598. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1599. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1600. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1601. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1602. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1603. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1604. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1605. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1606. Authenticated Key Exchange Protocols for Parallel Network File Systems
1607. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1608. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1609. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1610. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1611. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1612. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1613. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1614. Context-based Diversification for Keyword Queries over XML Data
1615. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1616. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1617. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1618. Tweet Segmentation and Its Application to Named Entity Recognition
1619. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1620. Automatic Group Happiness Intensity Analysis
1621. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1622. Query Aware Determinization of Uncertain Objects
1623. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1624. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1625. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1626. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1627. Efficient Community Formation for Web Services
1628. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1629. Secure Mining of Association Rules in Hor izontally Distributed Databases
1630. Dynamic Query Forms for Database Queries
1631. Secure kNN Query Processing in Untrusted Cloud Environments
1632. An Empirical Performance Evaluation of Relational Keyword Search Systems
1633. Keyword Query Routing
1634. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1635. Demand Bidding Program and Its Application in Hotel Energy Management
1636. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1637. Incremental Detection of Inconsistencies in Distributed Data
1638. A Cocktail Approach for Travel Package Recommendation
1639. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1640. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1641. Analysis of Field Data on Web Security Vulnerabilities
1642. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1643. A Reliability Improvement Method for SOA-Based Applications
1644. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1645. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1646. Web Service Recommendation via Exploiting Location and QoS Information
1647. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1648. Exploiting Rateless Codes in Cloud Storage Systems
1649. COMIC:Cost Optimization for Internet Content Multihoming
1650. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1651. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1652. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1653. Uniform Embedding for Efficient JPEG Steganography
1654. Secure Deduplication with Efficient and Reliable Convergent Key Management
1655. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1656. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1657. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1658. Location Aware Keyword Query Suggestion Based on Document Proximity
1659. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1660. A secure data self-destructing scheme in cloud computing
1661. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1662. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1663. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1664. Secure kNN Query Processing in Untrusted Cloud Environments
1665. Exploiting Rateless Codes in Cloud Storage Systems
1666. Fuzzy Authorization for Cloud Storage
1667. Planning vs. dynamic control Resource allocation in corporate clouds
1668. Automatic Scaling of Internet Applications for Cloud Computing Services
1669. Strategy-proof Pricing for Cloud Service Composition
1670. Privacy Preserving Delegated Access Control in Public Clouds
1671. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1672. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1673. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1674. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1675. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1676. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1677. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1678. A Scientometric Analysis of Cloud Computing Literature
1679. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1680. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1681. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1682. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1683. FeatureMatch: A General ANNF Estimation Technique and its Applications
1684. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1685. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1686. As-Projective-As-Possible Image Stitching with Moving DLT
1687. Sharing Visual Secrets in Single Image Random Dot Stereograms
1688. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1689. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1690. A New Iterative Triclass Thresholding Technique in Image Segmentation
1691. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1692. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1693. An Iranian License Plate Recognition System Based on Color Features
1694. Learning Layouts for Single-Page Graphic Designs
1695. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1696. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1697. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1698. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1699. Fingerprint Compression Based on Sparse Representation
1700. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1701. LBP-Based Edge-Texture Features for Object Recoginition
1702. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1703. Toward Experiential Mobile Media Processing
1704. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1705. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1706. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1707. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1708. Designing Truthful Spectrum Double Auctions with Local Markets
1709. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1710. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1711. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1712. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1713. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1714. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1715. A Study on Clinical Prediction Using Data Mining Techniques
1716. Online Payment System using Steganography and Visual Cryptography
1717. Efficient Instant-Fuzzy Search with Proximity Ranking
1718. Attribute Based Encryption with Privacy Preserving In Clouds
1719. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1720. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1721. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1722. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1723. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1724. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1725. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1726. The Target Tracking in Mobile Sensor Networks
1727. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1728. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1729. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1730. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1731. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1732. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1733. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1734. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1735. SUSIE: Search Using Services and Information Extraction
1736. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1737. Secure Mining of Association Rules in Horizontally Distributed Databases
1738. Sampling Online Social Networks
1739. Privacy Preserving Delegated Access Control in Public Clouds
1740. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1741. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1742. Ginix : Generalized Inverted Index for Keyword Search
1743. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1744. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1745. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1746. Dynamic Query Forms for Database Queries
1747. Cost-Based Optimization of Service Compositions
1748. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1749. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1750. Automatic Extraction of Top-k Lists from the Web
1751. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1752. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1753. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1754. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1755. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1756. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1757. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1758. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1759. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1760. Privacy Preserving Data Sharing With Anonymous ID Assignment
1761. Non-Cooperative Location Privacy
1762. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1763. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1764. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1765. Cloud based emails boundaries and vulnerabilities
1766. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1767. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1768. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1769. Optimal Content Downloading in Vehicular Networks
1770. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1771. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1772. View-invariant action recognition based on Artificial Neural Networks
1773. User-aware Image Tag Refinement via Ternary Semantic Analysis
1774. Separable Reversible Data Hiding in Encrypted Image
1775. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1776. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1777. Robust Face-Name Graph Matching for Movie Character Identification
1778. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1779. Improving Color Constancy by Photometric Edge Weighting
1780. Exploring the design space of social network-based Sybil defenses
1781. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1782. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1783. AnnoSearch: Image Auto-Annotation by Search
1784. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1785. Scalable Scheduling of Updates in Streaming Data Warehouses
1786. Scalable Learning of Collective Behavior
1787. Ranking Model Adaptation for Domain-Specific Search
1788. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1789. Outsourced Similarity Search on Metric Data Assets
1790. Organizing User Search Histories
1791. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1792. Mining Web Graphs for Recommendations
1793. Joint Top K Spatial Keyword Query Processing
1794. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1795. Identifying Content for Planned Events Across Social Media Sites
1796. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1797. Generative Models for Item Adoptions Using Social Correlation
1798. Efficient Data Mining for XML Queries Answering Support
1799. Efficient audit service outsourcing for data integrity in clouds
1800. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1801. Effective Pattern Discovery for Text Mining
1802. Combined Mining: Discovering Informative Knowledge in Complex Data
1803. Decentralized Probabilistic Text Clustering
1804. Computing Structural Statistics by Keywords in Databases
1805. Bridging Social and Data Networks
1806. Answering General Time-Sensitive Queries
1807. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1808. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1809. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1810. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1811. Resource-Aware Application State Monitoring
1812. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1813. Query Access Assurance in Outsourced Databases
1814. Linear and Differential Cryptanalysis
1815. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1816. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1817. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1818. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1819. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1820. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1821. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1822. ROAuth: Recommendation Based Open Authorization
1823. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1824. Recommendation Models for Open Authorization
1825. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1826. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1827. On Privacy of Encrypted Speech Communications
1828. OAuth Web Authorization Protocol
1829. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1830. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1831. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1832. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1833. Fast Matrix Embedding by Matrix Extending
1834. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1835. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1836. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1837. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1838. Measuring Code Quality to Improve Specification Mining
1839. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1840. Towards Secure and Dependable Storage Services in Cloud Computing
1841. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1842. Remote Display Solutions for Mobile Cloud Computing
1843. Privacy Preserving Delegated Access Control in Public Clouds
1844. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1845. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1846. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1847. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1848. Load-Balancing Multipath Switching System with Flow Slice
1849. Assessing the Veracity of Identity Assertions via OSNs
1850. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1851. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1852. A New Cell-Counting-Based Attack Against Tor
1853. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1854. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1855. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1856. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1857. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1858. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1859. Fast Release Capture Sampling in Large-Scale Sensor Networks
1860. Cooperative download in vehicular environments
1861. Cooperative Data Dissemination via Roadside WLANs
1862. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1863. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1864. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1865. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1866. Hiding Sensitive Association Rule for Privacy Preservation
1867. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1868. Development of Certificate Authority Services for Web Applications
1869. Detecting and Validating Sybil Groups in theWild
1870. Association Rule Extracting Knowledge Using Market Basket Analysis
1871. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1872. Valuable Detours: Least-Cost Anypath Routing
1873. Self-Reconfigurable Wireless Mesh Networks
1874. Reliability in Layered Networks with Random Link Failures
1875. NABS:Novel Approaches for Biometric Systems
1876. Live Streaming with Receiver-based Peer-division Multiplexing
1877. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1878. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1879. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1880. Virtualized Screen: A Third Element for CloudMobile Convergence
1881. Steganographic Embedding in JPEG Images with Visual Criterion
1882. On the Typical Statistic Features for Image Blind Steganalysis
1883. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1884. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1885. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1886. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1887. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1888. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1889. Vulnerability Analysis in SOA-Based Business Processes
1890. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1891. Service-Centric Framework for a Digital Government Application
1892. Server-Side Streaming Processing of WS-Security
1893. OWLPath: An OWL Ontology-Guided Query Editor
1894. Monitoring Service Systems from a Language-Action Perspective
1895. Extracting Product Features and Sentiments from Chinese Customer Reviews
1896. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1897. Automated Certification for Compliant Cloud-based Business Processes
1898. Addressing Dependability throughout the SOA Life Cycle
1899. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1900. The Geometric Efficient Matching Algorithm for Firewalls
1901. Secure Service-Oriented Architecture for Mobile Transactions
1902. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1903. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1904. Privacy-Preserving Updates to Anonymous and Confidential Databases
1905. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1906. IPAS: Implicit Password Authentication System
1907. Improving Security and Performance in the Tor Network through Tunable Path Selection
1908. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1909. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1910. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1911. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1912. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1913. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1914. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1915. Data Delivery Properties of Human Contact Networks
1916. Converge-Cast: On the Capacity and Delay Tradeoffs
1917. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1918. USHER: Improving Data Quality with Dynamic Forms
1919. The World in a Nutshell: Concise Range Queries
1920. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1921. Scalable Scheduling of Updates in Streaming Data Warehouses
1922. Scalable Learning of Collective Behavior
1923. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1924. Publishing Search Logs A Comparative Study of Privacy Guarantees
1925. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1926. Optimal Service Pricing for a Cloud Cache
1927. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1928. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1929. Mining Web Graphs for Recommendations
1930. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1931. Integration of Sound Signature Authentication System
1932. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1933. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1934. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1935. Exploring Application-Level Semantics for Data Compression
1936. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1937. Data Leakage Detection
1938. Cost-aware rank join with random and sorted access
1939. Collaborative Filtering with Personalized Skylines
1940. Bridging Socially-Enhanced Virtual Communities
1941. Automatic Discovery of Personal Name Aliases from the Web
1942. A Personalized Ontology Model for Web Information Gathering
1943. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1944. A Query Formulation Language for the Data Web
1945. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1946. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1947. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1948. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1949. Towards Secure and Dependable Storage Services in Cloud Computing
1950. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1951. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1952. Data Integrity Proofs in Cloud Storage
1953. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1954. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1955. Feature-level Sentiment Analysis for Chinese Product Reviews
1956. Equal-sized Cells Mean Equal-sized Packets in Tor?
1957. Customer Relationship Management Based on Data Mining Technique
1958. Authentication Schemes for Session Passwords using Color and Images
1959. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1960. Online Trends Management Service in It Industry
1961. Session Management System in It Industry
1962. Tools for Non IT Expert Developer
ERP PROJECTS
1963. New Company Policy Clearance System
1964. Recommend To Friend
1965. Consultanting About the Foreign Peoples
1966. Performance System Analysis In Industry
1967. Non It People Performance
MODERN AGRICULTURE
1968. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1969. Agriculture Marketing in Generation
1970. Agriculture Assist
1971. Sponsor For Agriculture
SPORTS
1972. Play Ground Booking
OUR MODERN SOCITY
1973. ADHAR VOTING SYSTEM
1974. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1975. RAILWAY SEAT RESERVATION SYSTEM
1976. Railway Management Service
1977. It Park Media
1978. Automation Transport Maintance
1979. Yell Help For Children
1980. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1981. Apartment Maintenance
1982. Power Consumption Monitoring House Hold Electronic Device
1983. Direct Q Less Reservation System in train
Advance Health Care System
1984. MAC Sensing Protocol
1985. World Wide Cloud Inter Hospital Acess Health Care System
1986. Live Doctor
Dotnet Apps
1987. TELEVISION CHANNEL PROGRAM MANAGEMENT
1988. WIN THE TRUST OF AN INDIAN CONSUMER
1989. ONLINE ACCOUNT MANAGEMENT
1990. SMART CAB BOOKING SYSTEM
1991. ONLINE FAST FOOD ORDER
1992. Travel Mate Add Module
1993. Work Order System Call Centre
1994. SPORTS MANAGEMENT SYSTEM
1995. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1996. Pick-It Courier Service
1997. Online Taxi Booking
1998. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1999. INCOMETAX MAINTAINANCE SYSTEM
2000. Hotel Reservation
2001. ERP System
2002. Bug Tracking System
2003. Vendor Information System For Shiping
2004. Top-K ranking System
2005. Secure Medical Image Archive System
2006. Business Activity Coordination Using Web Services
2007. Management Portal
2008. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
2009. Secure Data Filtering Recommendation System
2010. Online Resources Sharing via Social Networks
2011. Secure self-destructing in Cloud Computing
2012. Web Resourecs File Authorization Management
2013. Click based image re-ranking system
2014. Tree Structure Data Analiysis Mining
2015. Web Resource Allocation for CorPerate
2016. Web Vulnerabilities and Security
2017. Fuzzy Cloud Search Using XML
2018. Cloud Data Supporting Secure Query Search
2019. Tour Recommender Systems on Web
2020. Distributed Interactive Web Applications
2021. Secure Query Processing for Cloud
2022. Online Data Storage with less pricing
2023. Cost Based Web Content Managemnts
2024. Web Hospital Management
2025. Online Data storage with low price
2026. Secure Online Data Block Authorization
2027. Profitable Onlin web Server System
2028. Online Economies File Manager for Multi Keying
2029. Online Community Management
2030. Key based Online Data Managements
2031. Critical Workflow Management for Web Documents
2032. Secure Online Documents Managements for Group Sharing
2033. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
2034. Online Marketing Automation System
2035. Internal organization change management System
2036. Secure confirmation of sensitive transaction data in modern Internet banking services
2037. Privacy security with TPA in cloud computing
2038. Company Information Tracking System
2039. Online Virtualized screen Processing
2040. Web Service for Airline Management
2041. Web Social Club
2042. Quantum Key Cryptography
2043. Patient Data Management Based On Hospital Location
2044. Online Software Developer Community
2045. Online Developed Software sales
2046. Avoid repeated measurements On Genetics Dataset
2047. College Lab Maintenance System
2048. Industrial Manpower Resource Organizer
2049. Web Query Construction and Search on Complex Data
2050. Hospital Emergency Data Management
2051. Data confidentiality On Health-care Information System
2052. Secure Online Trading
2053. Fast Real-Time Event Alert Using social Network
2054. Secure E-Mail Organizer
2055. Web User Service Management System
2056. Easy SQL Query for Non-IT Manager
2057. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
2058. Customer Relationship Management (CRM) on Banking
2059. Online Company ERP System
2060. Constructing E-Tourism
2061. Web based Multi Service Ranking System
2062. Dynamic Customer Data Hiding in Banking
2063. Online Distributed Social Clubs
2064. Virtual Shopping with Negative Feedback Reputation Systems
2065. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
2066. Web Service Oriented Query Authentication Technique
2067. Web Based Customer Favorite vehicle Search Engine
2068. Web Based Book Publishing System
2069. Virtual Energy- Based Encryption and Keying
2070. Video Fraud Detecting On social Network
2071. Video Compression with Data hiding & Data Extraction
2072. Vendor Information System for Shipping
2073. VALUE ADDED TAX (VAT)
2074. Universal Smart Card
2075. Ultimate Location Information Systems
2076. Top K Ranking System
2077. Techno Task Manager
2078. Supply Chain Management
2079. Substitution-Permutation cryptanalysis System
2080. Streaming Data Warehouse Updations
2081. Step by Step Monitoring for Product Purchasing System
2082. Steganography for Data Reading and Writing AVI files
2083. SQL TUNER
2084. SMS Transaction Security
2085. Session Authentication Passwords using Color
2086. Service Availability Guarantees on Virtual Economy
2087. Server Fraud Detection on Cloud
2088. Sentence Based Search on Cloud
2089. Semantic Web Search Engines
2090. Secured Image communicator
2091. Secure smart application on web application
2092. Secure Service-Oriented Smartcard systems
2093. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
2094. Secure Location Identification System
2095. Secure and Cloud Based Patient Information Systems
2096. Reduce the Password Guessing Attacks using Click Point
2097. Recommendation System Based on Graph
2098. Quantum Key Cryptography
2099. Quality Controller
2100. Public Web Status Monitoring System
2101. Project Trade Pool
2102. Product Marketing Analysis On Public Opinion
2103. Predicting Users Behaviors Using Web Mining
2104. Personal Health Information on M-Healthcare Emergency
2105. Optimum Online Knowledge Base
2106. Online Training Program
2107. Online Time sensitive queries
2108. Online Tag Based Image Retrieval and Effective Management
2109. Online Social networks controls using cloud
2110. Online Rental System
2111. Online product Opinion and Ranking System
2112. Online Dynamic form creation for Non-IT Peoples
2113. Online Digital Contract Signing in Mistrusted Parities
2114. Online Aventure
2115. Online Shopping
2116. News Ticker Project
2117. Net Bank in Recharge
2118. Multi User Public Auditing System of Data Storage Security
2119. Multi Location Networked Mobile Auto Intimates
2120. Modern Distributed Business Applications for Supply Chain Management
2121. Market Intelligence Based Public Sentiment Analysis
2122. Leave Management System
2123. Joint processing of spatial keyword queries
2124. Intelligence Missing Items in Shopping Cart
2125. Information Leak Detection and Prevention
2126. Industrial Manpower Resource Organizer
2127. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
2128. Human Expertise Search Engine
2129. Home appliances online Purchase
2130. High Secure Corporate Web Search Engine
2131. High Degree Patient Privacy on Secure Data Outsourcing
2132. Group Movement Pattern Discovery
2133. Graph Based Share Market Data Updating
2134. Generic Business Portal
2135. Flight Booking Portal
2136. Firewall using Packet Filtering
2137. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
2138. Ethical and Social issues in File sharing system
2139. Enterprener Sales Report Management
2140. Encyclopedia for Computer Science
2141. Employee Based Performance Monitoring and Action Systems
2142. Emerging Patient Health Information Exchange System On Cloud
2143. Efficient Search on Outsourced data using Cloud
2144. Efficient and Secure Data Processing on Queries Similarity
2145. Distributed Database Optimization on HealthCare
2146. Digital Asset Management Systems (DAMS) Using Watermarking
2147. Detecting Fraud on Vehicle Insurance System
2148. Defeating Lazy Servers Database Vs Query Access Assurance
2149. Data Processing for Disease-Treatment Relations
2150. Data Mining Analysis on EB bill system
2151. Data confidential against untrusted servers using attribute-based encryption (ABE)
2152. Data Aggregation using SQL clustering
2153. Customer Sales Analysis System Based On Purchasing
2154. Cryptography on Personal confidential information
2155. Cost Based Secure Cloud Data Systems
2156. Market Based Analysis for consumer correct decision
2157. Construction Company Work Order System
2158. Complete Medical Transcription System(Mts)
2159. Company Security Reporting System(CSRS)
2160. College Result Analysis
2161. Cloud Economic Benefit On Scientific Computing
2162. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
2163. Centralized Event Planer across Social Media Sites
2164. Call Center Management
2165. A Reservation-Based Coordination Protocol for Web Services
2166. Building construction and cost estimation
2167. Budget Planner
2168. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
2169. Automatically identifying query groups on Web Search Engine
2170. Auditing Data integrity and data storage using cloud
2171. Application layer blocker for preventing on cyber security
2172. Advanced One-Click User Web Search Engine
2173. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
2174. VALUE ADDED TAX (VAT)
2175. User Oriented Network Attacks
2176. Secure Back Up
2177. Screen Capture And Mouse I/O
2178. Sales Bill Printing System using Excel
2179. Password Security
2180. Online User Mobile Rating
2181. Online Sensex Graph System
2182. Online Book Publishing
2183. NEWS TICKER PROJECT
2184. Multi Storage file
2185. Message Chating
2186. Medical Equipment in WAP
2187. Login Authentication Scheme
2188. Information Alert System
2189. Image Encryption And Decryption
2190. Generic Business Portal
2191. Flight Booking Portal
2192. File Transfer using Cryptography Techniques
2193. File Splitting
2194. Excel Format in Report
2195. EB Management System
2196. Dynamic Web Form Creation
2197. Android Image Search


Struts Application Projects
Struts Apps
2198. Public Sentiment Analysis with Online Shopping Using Struts
2199. Modern distributed business for supply-chain management
2200. High Confidential Personal Disease Reporting System
2201. Distributor Sensitive Data Management Using Struts
2202. Development of Certificate Authority Services for Web Applications
2203. Access Control on User-To-User Interactions in Social Networks


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2204. Sponsor For Agriculture
2205. Agriculture Assist
2206. Agriculture Marketing in Generation
2207. International Plant Import and Export
MODERN EDUCATION SYSTEM
2208. Old In Gold
2209. I School
2210. College Placement And Events
2211. Rural Area Educational Trouble Shooter
2212. Web Direct Recruitment Analysis
2213. Online Aquarum
2214. School Automation System
2215. Secure Online Course Automation
2216. Session Management System in It Industry
2217. Tools for Non IT Expert Developer
2218. Students Skills With Modern Industries
MODERN TECHNOLOGY
2219. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2220. Customer Favarate Greeting Card Design
2221. GPS Transport Packers and Movers
2222. House Hold Appliancies Warranty Management
2223. Direct Q Less Reservation System in train
2224. Power Consumption Monitoring House Hold Electronic Device
2225. Apartment Maintenance
2226. Budget Home Design
2227. Online Buy And Sale Software
2228. Online Softskills Tracks
2229. Gps Consumers Complients
2230. Economic Usage of Solar Energy
Advance Health Care System
2231. Organizing medical camp for public health development
2232. LIVE WEB DOCTOR CONSULTATION
2233. World Wide Cloud Inter Hospital Acess Health Care System
2234. MAC Sensing Protocol
2235. Medical Record Authentication
2236. Raw Requried Online Medicine
2237. Consumer Legal Advicer
2238. Homeopathy Health Record
SPORTS
2239. Play Ground Booking
2240. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2241. Cloud Storage Public Digital Certificate
ERP PROJECTS
2242. Corporate Trouble Shooter
2243. Entrepreneur Fault Analysis
2244. Organise Corporate Training For Client Projects
2245. Employment Knowledge Database
2246. GPS Employee Tracking System
2247. Non It People Performance
2248. Performance System Analysis In Industry
2249. Consultanting About the Foreign Peoples
2250. Recommend To Friend
2251. New Company Policy Clearance System
2252. ERP System (Enterprint Resource Plan
2253. Software Requirements Analysis for Client Side
2254. Select Your Age(Business Motivation all age group)
2255. Engnering Lab Maintenance
2256. Corporate Event Organisation
LATEST BANKING
2257. EyeBank Management System
2258. Advanced Banking System
OUR MODERN SOCIETY
2259. Trained Volunteers Create A Successful Social Campaign
2260. Finger thump Based Shopping Cart
2261. Railway Management Service
2262. Create a Successful Anti- Nuclear Campaign
2263. Crowding Funding Mobilization
2264. People Power of India
2265. Pets Care
2266. Feature in Best Potitical Leader in India
2267. Yell Help For Children
2268. Automation Transport Maintance
2269. It Park Media
2270. Online Painting Auction
2271. Election Commission Management
2272. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2273. ANDROID APPS FOR INSURANCE SYSTEM
2274. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2275. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2276. ANDROID APPS FOR DOCTOR APPOINTMENT
2277. LIVE WEB DOCTOR CONSULTATION
2278. ANDROID APPS ON DOCTOR WITH NURSE
2279. HOSPITAL ANDROID APPS
2280. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2281. Fertilizer Management System -Java, JSP, MySQL
2282. Land Bank for Nursery -Java, JSP, MySQL
2283. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2284. FORMER APPS - ANDROID
2285. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2286. Online Banking with Fraud Detecting- Java JSP, MySQL
2287. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2288. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2289. Big Scholarly Data: A Survey
2290. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Whatsapp : 09566137117
Support : 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved
o