Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
HOT IT SOFT SKILLS PYTHON PROJECT R - DATA SCIENCE - ML BIGDATA- MONGO DB 2017-2018
BIGDATA mongoDB BIG DATA - HADOOP PROJECTS WEKA-Machine Learning MACHINE LEARNING-ML(Data Scientist)
PhD Projects JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17
CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP ANDROID APPS IEEE PHP Projects 2017-18
IEEE PHP Projects PHP Application Projects Dot Net IEEE 2017-18 RAZOR MVC 4 ASP.NET 2017-18
ANGULAR JS , Dot Net IEEE 2016-17 RAZOR MVC 4 ASP.NET ASP.NET MVC Framework
Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects
IEEE 2011-2012 Dotnet Projects Dotnet Application Projects JAVA IEEE 2017-18 JAVA IEEE 2016-17
Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects
IEEE 2011-2012 Java Project Java Application Projects Dotnet Mini Projects Struts Application Projects
Java Mini Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS
AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS Internet of things (IoT) RESTful Web services
 
HOT IT SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
1. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
2. Dengu Data Analysis Using R-program
3. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
4. Big Scholarly Data: A Survey
5. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
6. Big Data, Big Knowledge Big Data for Personalized Healthcare
7. Deduplication on Encrypted Big Data in Cloud
8. Secure Sensitive Data Sharing on a Big Data Platform
9. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
10. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
11. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
12. Self-Healing in Mobile Networks with Big Data
13. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
14. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
15. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
16. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
17. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
18. Developing Apps for visually imapired people: Lessons learned from social network
19. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
20. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
21. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
22. Design of secure location and message sharing system for android platform
23. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
24. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
25. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
26. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
27. Privacy Protection based Access Control Scheme in Cloud-based Services
28. Privacy-Preserving Selective Aggregation of Online User Behavior Data
29. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
30. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


PYTHON PROJECT
PYTHON TRAINING WITH PROJECT
31. FOOD WASTE ORGANIZER
32. PYTHON PROJECT FLOW
33. PYTHON PROGRAM EXECUTION
34. PYTHON INSTALLATION


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
35. Dengu Data Analysis Using R-program
36. Shopping Data set Analysis Using R Machine Learning
37. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
38. R PROGRAM TRAINING
39. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
40. COMAPRISON OF VARIOUS DOCKING SCORES
41. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
42. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
43. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
44. MICRO ARRAY GENE EXPRESSION ANALYSIS
45. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
46. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
47. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
48. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
49. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
50. Efficient Recommendation of De-identification Policies using MapReduce
51. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
52. Big Scholarly Data: A Survey
53. SocialQ&A: An Online Social Network Based Question and Answer System
54. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
55. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
56. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
57. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
58. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
59. User-Centric Similarity Search
60. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
61. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
62. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
63. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
64. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
65. Processing Incomplete k Nearest Neighbor Search
66. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
67. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
68. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
69. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
70. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
71. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
72. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
73. Deduplication on Encrypted Big Data in Cloud
74. Dynamic Resource Allocation for MapReduce with Partitioning Skew
75. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
76. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
77. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
78. Self-Healing in Mobile Networks with Big Data
79. Secure Sensitive Data Sharing on a Big Data Platform
80. Big Data, Big Knowledge: Big Data for Personalized Healthcare
81. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
82. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
83. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
84. Differentially Private Frequent Itemset Mining via Transaction Splitting
85. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
86. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
87. Fast Best-Effort Pattern Matching in Large Attributed Graphs


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
88. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
89. MRSIM: Mitigating Reducer Skew In MapReduce
90. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
91. HADOOP WITH HEALTHCARE DATA ANALYSYS
92. HADOOP WEBLOG DATA ANALYSES
93. BANK DATA ANALYTIC WITH HADOOP
94. HADOOP TRAINING


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
95. Diabetics Dataset
96. Excercise Dataset
97. MEDICAL DATA ANALYSES
98. WEKA PRIVACY DATA SET ANALYSES


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
99. Dengu Data Analysis Using R-program
100. Shopping Data set Analyse Using R Machine Learning
101. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
102. Polynomial Time Algorithm-PTA
103. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
104. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
105. K-Means For Clustering


PhD Projects
Developing PhD proposal
106. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
107. Diabetics Dataset
108. MEDICAL DATA ANALYSES
109. R IEEE PROJECTS
110. PhD Project Guidance
111. PhD Projects


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
112. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
113. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
114. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
115. Privacy-Preserving Location-Proximity for Mobile Apps
116. Cooperative Query Answer Authentication
117. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
118. ZapDroid: Managing Infrequently Used Applications on Smartphones
119. Searching Trajectories by Regions of Interest
120. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
121. A Classroom Scheduling Service for Smart Classes
122. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
123. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
124. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
125. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
126. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
127. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
128. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
129. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
130. Authentication of Smartphone Users Using Behavioral Biometrics
131. An Exploration of Geographic Authentication Schemes
132. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
133. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
134. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
135. Distributed secret sharing approach with cheater prevention
136. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
137. Efficient privacy preserving location based query over outsourced encrypted data
138. Utilizing the Cloud to Store Hijacked Camera Images
139. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
140. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
141. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
142. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
143. Enabling privacy preserving location proof for mobile users.
144. Optimizing User Experience in Choosing Android Applications
145. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
146. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
147. FoodForCare: An Android Application for Self-Care with Healthy Food
148. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
149. Silence is Golden: Enhancing Privacy of Location-Based Services
150. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
151. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
152. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
153. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
154. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
155. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
156. Adapting to User Interest Drift for POI Recommendation
157. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
158. Developing Apps for visually imapired people: Lessons learned from social network
159. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
160. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
161. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
162. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
163. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
164. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
165. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
166. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
167. Mobile cloud support for semantic enriched speech recognition in social care
168. Distributing secret sharing approach with cheater prevention based on QR code
169. Design of Secure Location and Message Sharing System for Android Platform
170. The impact of cloud technology on the automation of businesses
171. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
172. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
173. Rescue Management System
174. Android Army - Military Apps
175. Android Beauty Parlor
176. Android E Municipality
177. ANDROID NURSE AID
178. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
179. GPS Employee Tracking System
OUR MODERN SOCITY
180. ANDROID APPS FOR INSURANCE SYSTEM
181. BUDGET HOME DESIGN -ANDROID APPS
182. Former To Former Apps
183. Pets Care
ONLINE CONSUMERS PROCESSING
184. House Hold Appliancies Warranty Management
185. GPS Transport Packers and Movers
Android Apps
186. MY LIBRARY
187. FACULTY RATING SYSTEM
188. App for self organizer
189. ONLINE DOCTOR APPOINTMENT
190. Conference Event Mobile Assistant
191. Mobile Prescription
192. Metastore Application
193. Android SmartCampus
194. Android Shopping Mall
195. TOLL GATE -Barcode Billing System --ANDROID
196. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
197. Taste Hunt For Restaurants
198. POLICE APPS
199. Android Blood Bank
200. Mobile Expense Claim System Android
201. Android Intelligent Time Tracking System TICK
202. Android Course and Attendance Management System
203. Android Event Reminder
204. Android Attendance Assessment
205. Android Advance Shopping
206. Android CAR POOLING
207. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
208. Android HOSPITAL
209. ATHLETE MEET GUIDE
210. Android Apps PARKING MANAGER
211. Love and Care
212. Food Waste Management System
213. Travel Guide
214. Android Provisional Store
215. Best Baby Care with Vaccines Remainder
216. Android Assist for Lecturer and Student
217. Android Personal Assistance (PA)
218. Android Application for College Management System
219. Tollgate Payment system in android
220. Intelligence Quotient (IQ) Test
221. GPS LOCATION ALARM SYSTEM
222. Location Based Intelligent Mobile Organizer
223. BANK ACCOUNT TRACKER FOR ANDROID
224. UNIT CONVERTER
225. Tips and Tax Calculator in Android
226. TEXT EDITOR FOR ANDROID
227. Student Attendance Tracking System
228. Smart Money With Daily Expenses
229. Simple And Secure Android TO DO List Application
230. Restaurant Table Order Management System
231. Online Shopping
232. Online Examination System For Android
233. ANDROID SHOPPING LOCATION IDENTIFIER
234. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
235. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
236. MICRO CREDIT BANKING ON SMARTPHONE
237. LOCATION BASED ALARM
238. Insurance in android
239. GOOGLE PLACE FINDER
240. Friend Mapper on Mobiles - Friend Locator
241. EXPENSE MANAGER
242. Employee Diractory
243. Online job search
244. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
245. ANDROID STUDENT RESULT ANALYZING SYSTEM
246. CloudMoV : Cloud-based Mobile Social TV
247. Bus Reservation
248. Budget Planner
249. Android SMS Systems
250. ANDROID LEAVE MANAGEMENT SYSTEM
251. ANDROID EVENT SCHEDULER/REMINDER
252. Android Grocery Shopping List
253. Android Attack Application
254. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
255. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
256. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
257. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
258. Optimizing Display Advertising Markets
259. Using Knowledge Libraries to Transfer Expert Knowledge
260. Semantic Retrieval of Trademarks Based on Conceptual Similarity
261. Understanding and Predicting Question Subjectivity in Social Question and Answering
262. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
263. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
264. Fast Top-K Path-based Relevance Query on Massive Graphs
265. Web Image Search Re-ranking with Click-based Similarity and Typicality
266. Automatically Mining Facets for Queries from Their Search Results
267. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
268. Statistical Entity Extraction from Web
269. Question Answering System for an Effective Collaborative Learning
270. Lost in Translation: Improving Decoy Documents via Automated Translation
271. Learn to Personalized Image Search from the Photo Sharing Websites
272. In Tags We Trust Trust modeling in social tagging of multimedia content
273. Efficient Anonymous Message Submission
274. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
275. Employment Knowledge Database
276. Organise Corporate Training For Client Project s
277. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
278. ONLINE VEHICLE SHOWROOM SYSTEMS
279. Online Voting
280. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
281. School Management System
282. Secure Online Course Automation
283. School Automation System
284. Online Aquarum
285. Web Direct Recruitment Analysis
PHP Apps
286. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
287. TRADE / INDUSTRY WEB PORTAL
288. Feeding the poor from the supermarket
289. Application for recording your goals and habits
290. VISUAL WAY TO RAISE AWARENESS
291. Municipal Corporation
292. Online Polling For Publishers And Brands
293. Avoid Food Wastage
294. Web Doctor
295. ONLINE FOOD ORDERING SYSTEM
296. E-Tendering
297. Improving Rural Communities
298. Green Planet Awarness
299. Development of an Online Course Portal for a campus
300. Auxon Test
301. WEB BASED LEARNING SYSTEM
302. Tagging in online social networks
303. Secured file Downloading system
304. Cryptonite : A Secure and Performant Data Repository on Public Clouds
305. searching a image from websites
306. Online University
307. Online product Opinion and Ranking System
308. MNC LEAVE MANAGEMENT SYSTEM
309. Home appliances online purchase
310. Freelancer Job
311. E-Tutor Online Jobs
312. Statistical Entity Extraction from Web
313. Effective Collaborative Learning
314. Development of an e-Post Office System
315. Question Answering System for an Effective Collaborative Learning


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
316. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
317. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
318. Privacy Protection based Access Control Scheme in Cloud-based Services
319. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
320. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
321. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
322. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
323. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
324. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
325. Explaining Missing Answers to Top-k SQL Queries
326. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
327. Continuous Top-k Monitoring on Document Streams
328. Generating Query Facets using Knowledge Bases
329. Query Reorganization Algorithms for Efficient Boolean Information Filtering


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
330. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
331. Privacy Protection based Access Control Scheme in Cloud-based Services
332. Dynamic Facet Ordering for Faceted Product Search Engines
333. Continuous Top-k Monitoring on Document Streams


ANGULAR JS ,
ANGULAR JS
334. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
335. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
336. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
337. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
338. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
339. Generating Query Facets using Knowledge Bases
340. Private Over-threshold Aggregation Protocols over Distributed Datasets
341. Private Over-threshold Aggregation Protocols over Distributed Datasets


Dot Net IEEE 2016-17
IEEE Transactions on Computers
342. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
343. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
344. TagBook: A Semantic Video Representation without Supervision for Event Detection
345. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
346. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
347. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
348. The Impact of Review Environment on Review Credibility
349. Private Over-threshold Aggregation Protocols over Distributed Datasets
350. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
351. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
352. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
353. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
354. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
355. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
356. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
357. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
358. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
359. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
360. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
361. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
362. What Is Happening in The Video Annotate Video by Sentence
363. Two level QR code for private message sharing and document authentication.
364. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
365. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
366. Mining Health Examination Records A Graph-based Approach
367. A Credibility Analysis System for Assessing Information on Twitter
368. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
369. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
370. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
371. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
372. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
373. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
374. Predicting Personalized Image Emotion Perceptions in Social Networks
375. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
376. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
377. Explaining Missing Answers to Top-k SQL Queries
378. Bilevel Feature Extraction Based Text Mining
379. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
380. Privacy-Preserving Outsourced Media Search
381. Modeling and Verification of Online Shopping Business Processes
382. User Preference Learning for Online Social Recommendation
383. Steganalysis Features for Content-Adaptive JPEG Steganography
384. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
385. PiCode: a New Picture-Embedding 2D Barcode
386. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
387. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
388. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
389. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
390. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
391. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
392. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
393. Cloud workflow scheduling with deadlines and time slot availability
394. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
395. Path-Based Epidemic Spreading in Networks
396. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
397. On the Resiliency of Static Forwarding Tables
398. Network Capability in Localizing Node Failures via End-to-End Path Measurements
399. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
400. DX: Latency-Based Congestion Control for Datacenters


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
401. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
402. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
403. A Forecasting Methodology for Workload Forecasting in Cloud Systems
404. Optimal Shipping Strategy and Return Service Charge Under No-Reason
405. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
406. A Recommendation System to Facilitate Business Process Modeling
407. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
408. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
409. User Differentiated Verifiable File Search on the Cloud
410. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
411. Statistical Features Based Real-time Detection of Drifted Twitter Spam
412. Incremental Consolidation of Data-Intensive Multi-flows
413. Service Pattern: An Integrated Business Process Model for Modern Service Industry
414. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
415. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
416. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
417. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
418. Democratic Diffusion Aggregation for Image Retrieval


ASP.NET MVC Framework
ASP.NET MVC Framework Project
419. Towards Effective Bug Triage with Software Data Reduction Techniques
420. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
421. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
422. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
423. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
424. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
425. Proof of retrievability with public verifiability resilient against related-key attacks
426. Secure Anonymous Key Distribution Scheme for Smart Grid
427. Converses For Secret Key Agreement and Secure Computing
428. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
429. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
430. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
431. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
432. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
433. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
434. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
435. Hacking is not random: a case-control study of webser ver-compromise risk
436. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
437. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
438. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
439. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
440. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
441. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
442. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
443. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
444. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
445. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
446. Diversifying Web Service Recommendation Results via Exploring Service Usage History
447. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
448. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
449. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
450. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
451. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
452. Cross-Domain Feature Learning in Multimedia
453. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
454. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
455. Saliency-based color accessibility
456. Contextual Online Learning for Multimedia Content Aggregation
457. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
458. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
459. An Attribute-assisted Reranking Model for Web Image Search
460. RRW - A Robust and Reversible Watermarking
461. Steganography Using Reversible Texture Synthesis
462. Single Image Super-Resolution Based on Gradient Profile Sharpness
463. Detection and Rectification of Distorted Fingerprints
464. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
465. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
466. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
467. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
468. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
469. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
470. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
471. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
472. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
473. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
474. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
475. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
476. Authenticated Key Exchange Protocols for Parallel Network File Systems
477. Data Collection in Multi-Application Sharing Wireless Sensor Networks
478. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
479. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
480. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
481. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
482. Optimum Power Allocation in Sensor Networks for Active Radar Applications
483. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
484. Context-based Diversification for Keyword Queries over XML Data
485. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
486. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
487. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
488. Tweet Segmentation and Its Application to Named Entity Recognition
489. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
490. Automatic Group Happiness Intensity Analysis
491. RRW - A Robust and Reversible Watermarking Technique for Relational Data
492. Query Aware Determinization of Uncertain Objects
493. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
494. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
495. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
496. Cotton Leaf Disease Identification using Pattern Recognition Techniques
497. Efficient Community Formation for Web Services
498. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
499. Secure Mining of Association Rules in Hor izontally Distributed Databases
500. Dynamic Query Forms for Database Queries
501. Secure kNN Query Processing in Untrusted Cloud Environments
502. An Empirical Performance Evaluation of Relational Keyword Search Systems
503. Keyword Query Routing
504. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
505. Demand Bidding Program and Its Application in Hotel Energy Management
506. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
507. Incremental Detection of Inconsistencies in Distributed Data
508. A Cocktail Approach for Travel Package Recommendation
509. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
510. A Random Decision Tree Framework for Privacy-Preserving Data Mining
511. Analysis of Field Data on Web Security Vulnerabilities
512. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
513. A Reliability Improvement Method for SOA-Based Applications
514. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
515. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
516. Web Service Recommendation via Exploiting Location and QoS Information
517. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
518. Exploiting Rateless Codes in Cloud Storage Systems
519. COMIC:Cost Optimization for Internet Content Multihoming
520. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
521. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
522. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
523. Uniform Embedding for Efficient JPEG Steganography
524. Secure Deduplication with Efficient and Reliable Convergent Key Management
525. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
526. Link Quality Aware Code Dissemination in Wireless Sensor Networks
527. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
528. Location Aware Keyword Query Suggestion Based on Document Proximity
529. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
530. A secure data self-destructing scheme in cloud computing
531. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
532. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
533. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
534. Secure kNN Query Processing in Untrusted Cloud Environments
535. Exploiting Rateless Codes in Cloud Storage Systems
536. Fuzzy Authorization for Cloud Storage
537. Planning vs. dynamic control Resource allocation in corporate clouds
538. Automatic Scaling of Internet Applications for Cloud Computing Services
539. Strategy-proof Pricing for Cloud Service Composition
540. Privacy Preserving Delegated Access Control in Public Clouds
541. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
542. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
543. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
544. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
545. A Mechanism Design Approach to Resource Procurement in Cloud Computing
546. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
547. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
548. A Scientometric Analysis of Cloud Computing Literature
549. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
550. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
551. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
552. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
553. FeatureMatch: A General ANNF Estimation Technique and its Applications
554. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
555. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
556. As-Projective-As-Possible Image Stitching with Moving DLT
557. Sharing Visual Secrets in Single Image Random Dot Stereograms
558. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
559. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
560. A New Iterative Triclass Thresholding Technique in Image Segmentation
561. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
562. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
563. An Iranian License Plate Recognition System Based on Color Features
564. Learning Layouts for Single-Page Graphic Designs
565. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
566. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
567. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
568. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
569. Fingerprint Compression Based on Sparse Representation
570. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
571. LBP-Based Edge-Texture Features for Object Recoginition
572. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
573. Toward Experiential Mobile Media Processing
574. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
575. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
576. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
577. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
578. Designing Truthful Spectrum Double Auctions with Local Markets
579. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
580. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
581. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
582. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
583. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
584. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
585. A Study on Clinical Prediction Using Data Mining Techniques
586. Online Payment System using Steganography and Visual Cryptography
587. Efficient Instant-Fuzzy Search with Proximity Ranking
588. Attribute Based Encryption with Privacy Preserving In Clouds
589. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
590. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
591. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
592. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
593. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
594. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
595. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
596. The Target Tracking in Mobile Sensor Networks
597. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
598. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
599. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
600. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
601. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
602. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
603. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
604. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
605. SUSIE: Search Using Services and Information Extraction
606. SeDas: A Self-Destructing Data System Based on Active Storage Framework
607. Secure Mining of Association Rules in Horizontally Distributed Databases
608. Sampling Online Social Networks
609. Privacy Preserving Delegated Access Control in Public Clouds
610. Mining Order-Preserving Submatrices from Data with Repeated Measurements
611. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
612. Ginix : Generalized Inverted Index for Keyword Search
613. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
614. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
615. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
616. Dynamic Query Forms for Database Queries
617. Cost-Based Optimization of Service Compositions
618. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
619. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
620. Automatic Extraction of Top-k Lists from the Web
621. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
622. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
623. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
624. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
625. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
626. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
627. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
628. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
629. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
630. Privacy Preserving Data Sharing With Anonymous ID Assignment
631. Non-Cooperative Location Privacy
632. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
633. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
634. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
635. Cloud based emails boundaries and vulnerabilities
636. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
637. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
638. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
639. Optimal Content Downloading in Vehicular Networks
640. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
641. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
642. View-invariant action recognition based on Artificial Neural Networks
643. User-aware Image Tag Refinement via Ternary Semantic Analysis
644. Separable Reversible Data Hiding in Encrypted Image
645. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
646. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
647. Robust Face-Name Graph Matching for Movie Character Identification
648. IntentSearch:Capturing User Intention for One-Click Internet Image Search
649. Improving Color Constancy by Photometric Edge Weighting
650. Exploring the design space of social network-based Sybil defenses
651. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
652. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
653. AnnoSearch: Image Auto-Annotation by Search
654. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
655. Scalable Scheduling of Updates in Streaming Data Warehouses
656. Scalable Learning of Collective Behavior
657. Ranking Model Adaptation for Domain-Specific Search
658. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
659. Outsourced Similarity Search on Metric Data Assets
660. Organizing User Search Histories
661. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
662. Mining Web Graphs for Recommendations
663. Joint Top K Spatial Keyword Query Processing
664. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
665. Identifying Content for Planned Events Across Social Media Sites
666. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
667. Generative Models for Item Adoptions Using Social Correlation
668. Efficient Data Mining for XML Queries Answering Support
669. Efficient audit service outsourcing for data integrity in clouds
670. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
671. Effective Pattern Discovery for Text Mining
672. Combined Mining: Discovering Informative Knowledge in Complex Data
673. Decentralized Probabilistic Text Clustering
674. Computing Structural Statistics by Keywords in Databases
675. Bridging Social and Data Networks
676. Answering General Time-Sensitive Queries
677. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
678. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
679. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
680. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
681. Resource-Aware Application State Monitoring
682. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
683. Query Access Assurance in Outsourced Databases
684. Linear and Differential Cryptanalysis
685. Expert Discovery and Interactions in Mixed Service-Oriented Systems
686. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
687. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
688. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
689. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
690. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
691. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
692. ROAuth: Recommendation Based Open Authorization
693. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
694. Recommendation Models for Open Authorization
695. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
696. Packet-Hiding Methods for Preventing Selective Jamming Attacks
697. On Privacy of Encrypted Speech Communications
698. OAuth Web Authorization Protocol
699. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
700. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
701. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
702. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
703. Fast Matrix Embedding by Matrix Extending
704. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
705. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
706. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
707. Access control for online social networks third party applications
SOFTWARE ENGINEERING
708. Measuring Code Quality to Improve Specification Mining
709. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
710. Towards Secure and Dependable Storage Services in Cloud Computing
711. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
712. Remote Display Solutions for Mobile Cloud Computing
713. Privacy Preserving Delegated Access Control in Public Clouds
714. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
715. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
716. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
717. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
718. Load-Balancing Multipath Switching System with Flow Slice
719. Assessing the Veracity of Identity Assertions via OSNs
720. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
721. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
722. A New Cell-Counting-Based Attack Against Tor
723. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
724. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
725. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
726. Network Assisted Mobile Computing with Optimal Uplink Query Processing
727. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
728. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
729. Fast Release Capture Sampling in Large-Scale Sensor Networks
730. Cooperative download in vehicular environments
731. Cooperative Data Dissemination via Roadside WLANs
732. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
733. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
734. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
735. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
736. Hiding Sensitive Association Rule for Privacy Preservation
737. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
738. Development of Certificate Authority Services for Web Applications
739. Detecting and Validating Sybil Groups in theWild
740. Association Rule Extracting Knowledge Using Market Basket Analysis
741. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
742. Valuable Detours: Least-Cost Anypath Routing
743. Self-Reconfigurable Wireless Mesh Networks
744. Reliability in Layered Networks with Random Link Failures
745. NABS:Novel Approaches for Biometric Systems
746. Live Streaming with Receiver-based Peer-division Multiplexing
747. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
748. Continuous Neighbor Discovery in Asynchronous Sensor Networks
749. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
750. Virtualized Screen: A Third Element for CloudMobile Convergence
751. Steganographic Embedding in JPEG Images with Visual Criterion
752. On the Typical Statistic Features for Image Blind Steganalysis
753. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
754. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
755. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
756. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
757. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
758. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
759. Vulnerability Analysis in SOA-Based Business Processes
760. Service-Oriented Architecture for High-Dimensional Private Data Mashup
761. Service-Centric Framework for a Digital Government Application
762. Server-Side Streaming Processing of WS-Security
763. OWLPath: An OWL Ontology-Guided Query Editor
764. Monitoring Service Systems from a Language-Action Perspective
765. Extracting Product Features and Sentiments from Chinese Customer Reviews
766. Expert Discovery and Interactions in Mixed Service-Oriented Systems
767. Automated Certification for Compliant Cloud-based Business Processes
768. Addressing Dependability throughout the SOA Life Cycle
769. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
770. The Geometric Efficient Matching Algorithm for Firewalls
771. Secure Service-Oriented Architecture for Mobile Transactions
772. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
773. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
774. Privacy-Preserving Updates to Anonymous and Confidential Databases
775. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
776. IPAS: Implicit Password Authentication System
777. Improving Security and Performance in the Tor Network through Tunable Path Selection
778. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
779. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
780. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
781. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
782. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
783. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
784. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
785. Data Delivery Properties of Human Contact Networks
786. Converge-Cast: On the Capacity and Delay Tradeoffs
787. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
788. USHER: Improving Data Quality with Dynamic Forms
789. The World in a Nutshell: Concise Range Queries
790. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
791. Scalable Scheduling of Updates in Streaming Data Warehouses
792. Scalable Learning of Collective Behavior
793. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
794. Publishing Search Logs A Comparative Study of Privacy Guarantees
795. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
796. Optimal Service Pricing for a Cloud Cache
797. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
798. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
799. Mining Web Graphs for Recommendations
800. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
801. Integration of Sound Signature Authentication System
802. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
803. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
804. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
805. Exploring Application-Level Semantics for Data Compression
806. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
807. Data Leakage Detection
808. Cost-aware rank join with random and sorted access
809. Collaborative Filtering with Personalized Skylines
810. Bridging Socially-Enhanced Virtual Communities
811. Automatic Discovery of Personal Name Aliases from the Web
812. A Personalized Ontology Model for Web Information Gathering
813. Adaptive Provisioning of Human Expertise in Service-oriented Systems
814. A Query Formulation Language for the Data Web
815. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
816. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
817. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
818. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
819. Towards Secure and Dependable Storage Services in Cloud Computing
820. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
821. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
822. Data Integrity Proofs in Cloud Storage
823. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
824. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
825. Feature-level Sentiment Analysis for Chinese Product Reviews
826. Equal-sized Cells Mean Equal-sized Packets in Tor?
827. Customer Relationship Management Based on Data Mining Technique
828. Authentication Schemes for Session Passwords using Color and Images
829. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
830. Online Trends Management Service in It Industry
831. Session Management System in It Industry
832. Tools for Non IT Expert Developer
ERP PROJECTS
833. New Company Policy Clearance System
834. Recommend To Friend
835. Consultanting About the Foreign Peoples
836. Performance System Analysis In Industry
837. Non It People Performance
MODERN AGRICULTURE
838. Cotton Leaf Disease Identification using Pattern Recognition Techniques
839. Agriculture Marketing in Generation
840. Agriculture Assist
841. Sponsor For Agriculture
SPORTS
842. Play Ground Booking
OUR MODERN SOCITY
843. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
844. RAILWAY SEAT RESERVATION SYSTEM
845. Railway Management Service
846. It Park Media
847. Automation Transport Maintance
848. Yell Help For Children
849. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
850. Apartment Maintenance
851. Power Consumption Monitoring House Hold Electronic Device
852. Direct Q Less Reservation System in train
Advance Health Care System
853. MAC Sensing Protocol
854. World Wide Cloud Inter Hospital Acess Health Care System
855. Live Doctor
Dotnet Apps
856. TELEVISION CHANNEL PROGRAM MANAGEMENT
857. WIN THE TRUST OF AN INDIAN CONSUMER
858. ONLINE ACCOUNT MANAGEMENT
859. SMART CAB BOOKING SYSTEM
860. ONLINE FAST FOOD ORDER
861. Travel Mate Add Module
862. Work Order System Call Centre
863. SPORTS MANAGEMENT SYSTEM
864. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
865. Pick-It Courier Service
866. Online Taxi Booking
867. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
868. INCOMETAX MAINTAINANCE SYSTEM
869. Hotel Reservation
870. ERP System
871. Bug Tracking System
872. Vendor Information System For Shiping
873. Top-K ranking System
874. Secure Medical Image Archive System
875. Business Activity Coordination Using Web Services
876. Management Portal
877. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
878. Secure Data Filtering Recommendation System
879. Online Resources Sharing via Social Networks
880. Secure self-destructing in Cloud Computing
881. Web Resourecs File Authorization Management
882. Click based image re-ranking system
883. Tree Structure Data Analiysis Mining
884. Web Resource Allocation for CorPerate
885. Web Vulnerabilities and Security
886. Fuzzy Cloud Search Using XML
887. Cloud Data Supporting Secure Query Search
888. Tour Recommender Systems on Web
889. Distributed Interactive Web Applications
890. Secure Query Processing for Cloud
891. Online Data Storage with less pricing
892. Cost Based Web Content Managemnts
893. Web Hospital Management
894. Online Data storage with low price
895. Secure Online Data Block Authorization
896. Profitable Onlin web Server System
897. Online Economies File Manager for Multi Keying
898. Online Community Management
899. Key based Online Data Managements
900. Critical Workflow Management for Web Documents
901. Secure Online Documents Managements for Group Sharing
902. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
903. Online Marketing Automation System
904. Internal organization change management System
905. Secure confirmation of sensitive transaction data in modern Internet banking services
906. Privacy security with TPA in cloud computing
907. Company Information Tracking System
908. Online Virtualized screen Processing
909. Web Service for Airline Management
910. Web Social Club
911. Quantum Key Cryptography
912. Patient Data Management Based On Hospital Location
913. Online Software Developer Community
914. Online Developed Software sales
915. Avoid repeated measurements On Genetics Dataset
916. College Lab Maintenance System
917. Industrial Manpower Resource Organizer
918. Web Query Construction and Search on Complex Data
919. Hospital Emergency Data Management
920. Data confidentiality On Health-care Information System
921. Secure Online Trading
922. Fast Real-Time Event Alert Using social Network
923. Secure E-Mail Organizer
924. Web User Service Management System
925. Easy SQL Query for Non-IT Manager
926. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
927. Customer Relationship Management (CRM) on Banking
928. Online Company ERP System
929. Constructing E-Tourism
930. Web based Multi Service Ranking System
931. Dynamic Customer Data Hiding in Banking
932. Online Distributed Social Clubs
933. Virtual Shopping with Negative Feedback Reputation Systems
934. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
935. Web Service Oriented Query Authentication Technique
936. Web Based Customer Favorite vehicle Search Engine
937. Web Based Book Publishing System
938. Virtual Energy- Based Encryption and Keying
939. Video Fraud Detecting On social Network
940. Video Compression with Data hiding & Data Extraction
941. Vendor Information System for Shipping
942. VALUE ADDED TAX (VAT)
943. Universal Smart Card
944. Ultimate Location Information Systems
945. Top K Ranking System
946. Techno Task Manager
947. Supply Chain Management
948. Substitution-Permutation cryptanalysis System
949. Streaming Data Warehouse Updations
950. Step by Step Monitoring for Product Purchasing System
951. Steganography for Data Reading and Writing AVI files
952. SQL TUNER
953. SMS Transaction Security
954. Session Authentication Passwords using Color
955. Service Availability Guarantees on Virtual Economy
956. Server Fraud Detection on Cloud
957. Sentence Based Search on Cloud
958. Semantic Web Search Engines
959. Secured Image communicator
960. Secure smart application on web application
961. Secure Service-Oriented Smartcard systems
962. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
963. Secure Location Identification System
964. Secure and Cloud Based Patient Information Systems
965. Reduce the Password Guessing Attacks using Click Point
966. Recommendation System Based on Graph
967. Quantum Key Cryptography
968. Quality Controller
969. Public Web Status Monitoring System
970. Project Trade Pool
971. Product Marketing Analysis On Public Opinion
972. Predicting Users Behaviors Using Web Mining
973. Personal Health Information on M-Healthcare Emergency
974. Optimum Online Knowledge Base
975. Online Training Program
976. Online Time sensitive queries
977. Online Tag Based Image Retrieval and Effective Management
978. Online Social networks controls using cloud
979. Online Rental System
980. Online product Opinion and Ranking System
981. Online Dynamic form creation for Non-IT Peoples
982. Online Digital Contract Signing in Mistrusted Parities
983. Online Aventure
984. Online Shopping
985. News Ticker Project
986. Net Bank in Recharge
987. Multi User Public Auditing System of Data Storage Security
988. Multi Location Networked Mobile Auto Intimates
989. Modern Distributed Business Applications for Supply Chain Management
990. Market Intelligence Based Public Sentiment Analysis
991. Leave Management System
992. Joint processing of spatial keyword queries
993. Intelligence Missing Items in Shopping Cart
994. Information Leak Detection and Prevention
995. Industrial Manpower Resource Organizer
996. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
997. Human Expertise Search Engine
998. Home appliances online Purchase
999. High Secure Corporate Web Search Engine
1000. High Degree Patient Privacy on Secure Data Outsourcing
1001. Group Movement Pattern Discovery
1002. Graph Based Share Market Data Updating
1003. Generic Business Portal
1004. Flight Booking Portal
1005. Firewall using Packet Filtering
1006. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1007. Ethical and Social issues in File sharing system
1008. Enterprener Sales Report Management
1009. Encyclopedia for Computer Science
1010. Employee Based Performance Monitoring and Action Systems
1011. Emerging Patient Health Information Exchange System On Cloud
1012. Efficient Search on Outsourced data using Cloud
1013. Efficient and Secure Data Processing on Queries Similarity
1014. Distributed Database Optimization on HealthCare
1015. Digital Asset Management Systems (DAMS) Using Watermarking
1016. Detecting Fraud on Vehicle Insurance System
1017. Defeating Lazy Servers Database Vs Query Access Assurance
1018. Data Processing for Disease-Treatment Relations
1019. Data Mining Analysis on EB bill system
1020. Data confidential against untrusted servers using attribute-based encryption (ABE)
1021. Data Aggregation using SQL clustering
1022. Customer Sales Analysis System Based On Purchasing
1023. Cryptography on Personal confidential information
1024. Cost Based Secure Cloud Data Systems
1025. Market Based Analysis for consumer correct decision
1026. Construction Company Work Order System
1027. Complete Medical Transcription System(Mts)
1028. Company Security Reporting System(CSRS)
1029. College Result Analysis
1030. Cloud Economic Benefit On Scientific Computing
1031. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1032. Centralized Event Planer across Social Media Sites
1033. Call Center Management
1034. A Reservation-Based Coordination Protocol for Web Services
1035. Building construction and cost estimation
1036. Budget Planner
1037. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1038. Automatically identifying query groups on Web Search Engine
1039. Auditing Data integrity and data storage using cloud
1040. Application layer blocker for preventing on cyber security
1041. Advanced One-Click User Web Search Engine
1042. Advance Patient Management System


JAVA IEEE 2017-18
IEEE Transactions on Big Data
1043. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
1044. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
1045. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
Services Computing
1046. Resource renting for periodical cloud workflow applications
IEEE Transactions on Security Computing
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1047. A robust reputation management mechanism in the federated cloud
1048. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1049. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
1050. Public Interest Analysis Based on Implicit Feedback of IPTV Users
1051. Search Rank Fraud and Malware Detection in Google Play
1052. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
1053. Influence Maximization in Trajectory Databases
1054. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
1055. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
1056. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
1057. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
1058. Computing Semantic Similarity of Concepts in Knowledge Graphs
1059. QDA: A Query-Driven Approach to Entity Resolution
1060. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
1061. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
1062. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
1063. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
1064. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
1065. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
1066. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
1067. Two-Factor Data Security Protection Mechanism for Cloud Storage System
1068. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
1069. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
1070. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
1071. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
1072. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
1073. Where You Are Is Who You Are User Identification by Matching Statistics
1074. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
1075. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
1076. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
1077. Online Subgraph Skyline Analysis Over Knowledge Graphs
1078. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
1079. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
1080. ID2S Password-Authenticated Key Exchange Protocols
1081. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
1082. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
1083. Classification model to predict the learners' academic performance using big data
1084. Electronic Commerce Meets the Semantic Web
1085. Mining High Utility Patterns in One Phase without Generating Candidates
1086. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
1087. Automatic Generation of Social Event Storyboard from Image Click-through Data
1088. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
1089. Understanding Deep Representations Learned in Modeling Users Likes
1090. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
1091. Topic-Oriented Exploratory Search Based on an Indexing Network
1092. Relevance Feedback Algorithms Inspired By Quantum Detection
1093. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
1094. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1095. Efficiently Estimating Statistics of Points of Interests on Maps
1096. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
1097. Aspect-level Influence Discovery from Graphs
1098. Sentiment Embeddings with Applications to Sentiment Analysis
1099. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
1100. Resolving Multi-party Privacy Conflicts in Social Media
1101. Encrypted Data Management with Deduplication in Cloud Computing
1102. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1103. Crawling Hidden Objects with kNN Queries
1104. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
1105. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
1106. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
1107. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
1108. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
1109. Nearest Keyword Set Search in Multi-dimensional Datasets
1110. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
1111. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
1112. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
1113. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
1114. Immutable Authentication and Integrity Schemes for Outsourced Databases
1115. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
1116. Server-Aided Public Key Encryption with Keyword Search
1117. Online Learning in Large-Scale Contextual Recommender Systems
1118. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
1119. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
1120. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
1121. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
1122. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
1123. Multi-Modal Event Topic Model for Social Event Analysis
1124. Social friend recommendation on multiple network correlation
1125. Tag Based Image Search by Social Re-ranking
1126. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
1127. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
1128. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
1129. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
1130. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
1131. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
1132. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
1133. Rank-Based Similarity Search: Reducing the Dimensional Dependence
1134. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
1135. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
1136. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
1137. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
1138. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1139. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
1140. On the Security of data access control for multiauthority cloud storage system
1141. Trust-based Service Management for Social Internet of Things Systems
1142. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1143. Formalization and Verification of Group Behavior Interactions
1144. Group Key Agreement with Local Connectivity
1145. Data Lineage in Malicious Environments
1146. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1147. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
1148. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1149. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
1150. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
1151. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1152. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
1153. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
1154. Quantitative Reasoning About Cloud Security Using Service Level Agreements
1155. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
1156. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
1157. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
1158. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
1159. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
1160. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
1161. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1162. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
1163. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1164. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1165. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
1166. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1167. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
1168. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
1169. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
1170. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
1171. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1172. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1173. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
1174. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
1175. Secure Auditing and Deduplicating Data in Cloud
1176. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1177. Towards reproducibility in online social network Research
1178. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
1179. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
1180. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
1181. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
1182. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
1183. Making Digital Artifacts on the Web Verifiable and Reliable
1184. Anonymizing Collections of Tree-Structured Data
1185. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1186. FOCS: Fast Overlapped Community Search
1187. Sparsity Learning Formulations for Mining Time-Varying Data
1188. The Impact of View Histories on Edit Recommendations
1189. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
1190. Discovery of Ranking Fraud for Mobile Apps
1191. Towards Effective Bug Triage with Software Data Reduction Techniques
1192. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
1193. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1194. Auditing for Distributed Storage Systems
1195. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1196. Uploader Intent for Online Video: Typology, Inference and Applications
1197. YouTube Video Promotion by Cross-network
1198. Semantic-Improved Color Imaging Applications: It Is All About Context
1199. Geolocalized Modeling for Dish Recognition
1200. Learning to Rank Image Tags with Limited Training Examples
1201. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
1202. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1203. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
1204. Tracking Temporal Community Strength in Dynamic Networks
1205. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
1206. Towards Information Diffusion in Mobile Social Networks
1207. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1208. An Efficient Privacy-Preserving Ranked Keyword Search Method
1209. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
1210. Dispersing Instant Social Video Service Across Multiple Clouds
1211. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1212. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
1213. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
1214. A Computational Dynamic Trust Model for User Authorization
1215. Secure Distributed Deduplication Systems with Improved Reliability
1216. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1217. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1218. Leveraging the Tail Time for Saving Energy in Cellular Networks
1219. Keylogging-resistant Visual Authentication Protocols
1220. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
1221. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
1222. Preserving Location Privacy in Geo-Social Applications
1223. Efficient Authentication for Mobile and Pervasive Computing
1224. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
1225. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1226. Typicality-Based Collaborative Filtering Recommendation
1227. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
1228. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
1229. Keyword Search Over Probabilistic RDF Graphs
1230. Efficient Prediction of Difficult Keyword Queries over Databases
1231. Interpreting the Public Sentiment Variations on Twitter
1232. An Efficient Recommendation Method for Improving Business Process Modeling
1233. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
1234. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
1235. On the use of Side Information for Mining Text Data
1236. Privacy Preserving and Content Protecting Location based Queries
1237. Fast Nearest Neighbor Search with Keywords
1238. Towards Differential Query Services in Cost-Efficient Clouds
1239. Facilitating Document Annotation using Content and Querying Value
1240. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
1241. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
1242. Secure Outsourced Attribute-Based Signatures
1243. Supporting Privacy Protection in Personalized Web Search
1244. Dealing With Concept Drifts in Process Mining
1245. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
1246. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
1247. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
1248. Active Learning of Constraints for Semi-Supervised Clustering
1249. Best Keyword Cover Search
1250. Personalized Recommendation Combining User Interest and Social Circle
1251. Online Feature Selection and Its Applications
1252. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
1253. Incremental Affinity Propagation Clustering Based on Message Passing
1254. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
1255. Secure kNN Query Processing in Untrusted Cloud Environments
1256. Malware Propagation in Large-Scale Networks
1257. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
1258. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
1259. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
1260. Efficient Ranking on Entity Graphs with Personalized Relationships
1261. Task Trail: An Effective Segmentation of User Search Behavior
1262. Privacy-Preserving Enhanced Collaborative Tagging
1263. XSPath Navigation on XML Schemas Made Easy
1264. Security Evaluation of Pattern Classifiers under Attack
1265. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
1266. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1267. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
1268. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1269. Nothing is for Free: Security in Searching Shared and Encrypted Data
1270. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1271. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1272. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1273. Behavioral Malware Detection in Delay Tolerant Networks
1274. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
1275. Private Searching on Streaming Data Based on Keyword Frequency
1276. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1277. On the Security of Trustee-Based Social Authentications
1278. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1279. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
1280. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
1281. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1282. A Two-stage Deanonymization Attack Against Anonymized Social Networks
1283. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
1284. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
1285. Scalable architecture for multi-user encrypted SQL operations on cloud database services
1286. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1287. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1288. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1289. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1290. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1291. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1292. Secure kNN Query Processing in Untrusted Cloud Environments
1293. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
1294. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
1295. A Hybrid Cloud Approach for Secure Authorized Deduplication
1296. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
1297. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
1298. A Novel Model for Competition and Cooperation Among Cloud Providers
1299. CLOUDQUAL: A Quality Model for Cloud Services
1300. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
1301. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
1302. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
1303. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
1304. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
1305. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
1306. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
1307. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
1308. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
1309. Enhanced Security for Association Rule Mining to secure Transactional Databases
1310. Operational Pattern Revealing Technique in Text Mining
1311. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
1312. Personalized web search using Browsing history and domain Knowledge
1313. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
1314. Data Security the Challenge of Cloud Computing
1315. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
1316. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1317. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
1318. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
1319. User Action Interpretation for Online Content Optimization
1320. Spatial Query Integrity with Voronoi Neighbors
1321. Spatial Approximate String Search
1322. Sensitive Label Privacy Protection on Social Network Data
1323. Secure Mining of Association Rules in Horizontally Distributed Databases
1324. Secure Logging As a Service Delegating Log Management to the Cloud
1325. Robust Module-based Data Management
1326. Ranking on Data Manifold with Sink Points
1327. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
1328. Privacy-Enhanced Web Service Composition
1329. Privacy against Aggregate Knowledge Attacks
1330. Preventing Private Information Inference Attacks on Social Networks
1331. PMSE: A Personalized Mobile Search Engine
1332. Personalized QoS-Aware Web Service Recommendation and Visualization
1333. Optimal Client-Server Assignment for Internet Distributed Systems
1334. Online Search and Buying Behaviour in Consumer Markets
1335. M-Privacy for Collaborative Data Publishing
1336. Mining User Queries with Markov Chains: Application to Online Image Retrieval
1337. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
1338. Incentive Compatible Privacy-Preserving Data Analysis
1339. Improving Security and Efficiency in Attribute-Based Data Sharing
1340. FoCUS: Learning to Crawl Web Forums
1341. Fast Nearest Neighbor Search with Keywords
1342. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
1343. Facilitating Effective User Navigation through Website Structure Improvement
1344. Facilitating Document Annotation using Content and Querying Value
1345. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
1346. Efficient Evaluation of SUM Queries over Probabilistic Data*
1347. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
1348. Dynamic Query Forms for Database Queries
1349. Dynamic Personalized Recommendation on Sparse Data
1350. Distributed Strategies for Mining Outliers in Large Data Sets
1351. Crowdsourcing Predictors of Behavioral Outcomes
1352. Co-Occurrence-Based Diffusion for Expert Search on the Web
1353. Comparable Entity Mining from Comparative Questions
1354. CloudMoV: Cloud-based Mobile Social TV
1355. Anomaly Detection via Online Oversampling Principal Component Analysis
1356. Anomaly Detection Approach Using Hidden Markov Model
1357. Annotating Search Results from Web Databases
1358. A System to Filter Unwanted Messages from OSN User Walls
1359. A Survey of XML Tree Patterns
1360. A Probabilistic Approach to String Transformation
1361. A New Algorithm for Inferring User Search Goals with Feedback Sessions
1362. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
1363. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
1364. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
1365. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
1366. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
1367. Towards Differential Query Services in Cost-Efficient Clouds
1368. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
1369. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1370. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
1371. QoS Ranking Prediction for Cloud Services
1372. Priority-Based Consolidation of Parallel Workloads in the Cloud
1373. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1374. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
1375. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
1376. Load Rebalancing for Distributed File Systems in Clouds
1377. Label-Embedding for Attribute-Based Classification
1378. IP-Geolocation Mapping for Moderately Connected Internet Regions
1379. Identity-Based Secure Distributed Data Storage Schemes
1380. Hint-based Execution of Workloads in Clouds with Nefeli
1381. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
1382. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
1383. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
1384. Efficient Two-Server Password-Only Authenticated Key Exchange
1385. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
1386. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
1387. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
1388. Winds of Change: From Vendor Lock-In to the Meta Cloud
1389. Supporting the Migration of Applications to the Cloud through a Decision Support System
1390. Storing Shared Data on the Cloud via Security-Mediator
1391. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
1392. Privacy-Preserving Public Auditing for Secure Cloud Storage
1393. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
1394. Outsourcing Privacy-Preserving Social Networks to a Cloud
1395. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
1396. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
1397. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
1398. Efficient Security Solution for Privacy-Preserving Cloud Services
1399. Collaboration in Multicloud Computing Environments: Framework and Security Issues
1400. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
1401. Cloud-based DDoS Attacks and Defenses
1402. Cloud computing for mobile users can offloading compution save energy
1403. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
1404. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
1405. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
1406. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
1407. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
1408. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
1409. Two tales of privacy in online social networks
1410. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
1411. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
1412. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
1413. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
1414. Security and Privacy-Enhancing Multicloud Architectures
1415. Security Using Colors and Armstrong Numbers
1416. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
1417. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
1418. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
1419. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
1420. Privacy Preserving Data Analytics for Smart Homes
1421. On Inference-Proof View Processing of XML Documents
1422. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
1423. Extracting Spread-Spectrum Hidden Data from Digital Media
1424. Efficiently Outsourcing Multiparty Computation under Multiple Keys
1425. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
1426. Craigslist Scams and Community Composition: Investigating Online Fraud
1427. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
1428. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
1429. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
1430. Super-Resolution-based Inpainting
1431. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
1432. Image Authentication Using Stochastic Diffusion
1433. Hierarchical Super-Resolution-Based Inpainting
1434. Circular Reranking for Visual Search
1435. Bootstrapping Visual Categorization With Relevant Negatives
1436. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
1437. An extended visual cryptography scheme without pixel expansion for halftone images
1438. An Adaptive Cloud Downloading Service
NETWORKING
1439. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
1440. Topological Conditions for In-Network Stabilization of Dynamical Systems
1441. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
1442. Price Differentiation for Communication Networks
1443. Participatory Privacy: Enabling Privacy in Participatory Sensing
1444. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
1445. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1446. On the Role of Mobility for Multi-message Gossip
1447. Fully Anonymous Profile Matching in Mobile Social Networks
1448. Fault Node Recovery Algorithm for a Wireless Sensor Network
1449. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
1450. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
1451. Access Policy Consolidation for Event Processing Systems
1452. A Fast Re-Route Method
SOFTWARE ENGINEERING
1453. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
1454. Vampire attacks: Draining life from wireless ad-hoc sensor networks
1455. Towards a Statistical Framework for Source Anonymity in Sensor Networks
1456. Search Me If You Can: Privacy-preserving Location Query Service
1457. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
1458. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
1459. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
1460. Distributed Cooperative Caching in Social Wireless Networks
1461. Community-Aware Opportunistic Routing in Mobile Social Networks
1462. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
1463. The Devils Behind Web Application Vulnerabilities
1464. Security Architecture for Cloud Networking
1465. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
1466. Secure Overlay Cloud Storage with Access Control and Assured Deletion
1467. Risk-Aware Mitigation for MANET Routing Attacks
1468. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
1469. Privacy-preserving Enforcement of Spatially Aware RBAC
1470. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
1471. pCloud: A Distributed System for Practical PIR
1472. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1473. Online Modeling of Proactive Moderation System for Auction Fraud Detection
1474. Fast and accurate annotation of short texts with Wikipedia pages
1475. FADE: Secure Overlay Cloud Storage with File Assured Deletion
1476. Ensuring Distributed Accountability for Data Sharing in the Cloud
1477. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
1478. Direct and Indirect Discrimination Prevention Methods
1479. Detecting Spam Zombies by Monitoring Outgoing Messages
1480. Detecting Anomalous Insiders in Collaborative Information Systems
1481. Data-Provenance Verification For Secure Hosts
1482. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
1483. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
1484. Payments for Outsourced Computations
1485. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
1486. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1487. Toward Private Joins on Outsourced Data
1488. Statistical Entity Extraction from Web
1489. Slicing: A New Approach to Privacy Preserving Data Publishing
1490. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
1491. Resilient Identity Crime Detection
1492. Ranking Model Adaptation for Domain-Specific Search
1493. Organizing User Search Histories
1494. On the Spectral Characterization and Scalable Mining of Network Communities
1495. Multiparty Access Control for Online Social Networks: Model and Mechanisms
1496. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
1497. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1498. How do Facebookers use Friendlists
1499. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
1500. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
1501. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
1502. Enabling Multilevel Trust in Privacy Preserving Data Mining
1503. Enabling cross-site interactions in social networks
1504. Efficient Similarity Search over Encrypted Data
1505. Efficient Extended Boolean Retrieval
1506. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
1507. Efficient Anonymous Message Submission
1508. Effective Pattern Discovery for Text Mining
1509. DDD: A New Ensemble Approach for Dealing with Concept Drift
1510. Credibility Ranking of Tweets during High Impact Events
1511. Creating Evolving User Behavior Profiles Automatically
1512. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
1513. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
1514. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
1515. Anomaly Detection for Discrete Sequences: A Survey
1516. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
1517. Advance Mining of Temporal High Utility Itemset
1518. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
1519. Reliable Re-encryption in Unreliable Clouds
1520. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
1521. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
1522. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
1523. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
1524. Gossip-based Resource Management for Cloud Environments
1525. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
1526. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
1527. Cloud Data Protection for the Masses
1528. Cloud Computing Security: From Single to Multi-Clouds
1529. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
1530. In Tags We Trust Trust modeling in social tagging of multimedia content
1531. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
1532. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
1533. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
1534. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
1535. Cut Detection in Wireless Sensor Networks
1536. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
1537. TrickleDNS: Bootstrapping DNS Security using Social Trust
1538. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
1539. Policy-by-Example for Online Social Networks
1540. Packet Loss Control Using Tokens at the Network Edge
1541. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1542. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
1543. Independent Directed Acyclic Graphs for Resilient Multipath Routing
1544. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
1545. Game-Theoretic Pricing for Video Streaming in Mobile Networks
1546. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
1547. Auditing for Network Coding Storage
1548. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
1549. Privacy Preserving Cloud Data Access With Multi-Authorities
1550. Movie Rating and Review Summarization in Mobile Environment
1551. IDSaaS: Intrusion Detection System as a Service in Public Clouds
1552. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
1553. BibPro: A Citation Parser Based on Sequence Alignment Techniques
1554. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
1555. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
1556. RITAS: Services for Randomized Intrusion Tolerance
1557. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
1558. Nymble: Blocking Misbehaving Users in Anonymizing Networks
1559. Modeling and Detection of Camouflaging Worm
1560. Coding for Cryptographic Security Enhancement using Stopping Sets
1561. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
1562. Wireless Sensor Network Security model using Zero Knowledge Protocol
1563. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
1564. Throughput Optimization in Mobile Backbone Networks
1565. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
1566. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
1567. Fast Data Collection in Tree-Based Wireless Sensor Networks
1568. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
1569. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
1570. SPAF: Stateless FSA-based Packet Filters
1571. Selfish Overlay Network Creation and Maintenance
1572. ProgME: Towards Programmable Network MEasurement
1573. Locating Equivalent Servants over P2P Networks
1574. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
1575. Buffer Sizing for 802.11 Based Networks
1576. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
1577. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
1578. Improving Utilization of Infrastructure Clouds
1579. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
1580. CloudTPS: Scalable Transactions for Web Applications in the Cloud
1581. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1582. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
1583. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
1584. Ranking Spatial Data by Quality Preferences
1585. Making Aggregation Work in Uncertain and Probabilistic Databases
1586. Load Shedding in Mobile Systems with MobiQual
1587. Group Enclosing Queries
1588. Extended XML Tree Pattern Matching: Theories and Algorithms
1589. Effective Navigation of Query Results Based on Concept Hierarchies
1590. Discovering Conditional Functional Dependencies
1591. Decision Trees for Uncertain Data
1592. Data Leakage Detection
1593. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1594. Young Talent Tracker
1595. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1596. International Plant Import and Export
OUR MODERN SOCITY
1597. Trained Volunteers Create A Successful Social Campaign
1598. Finger thump Based Shopping Cart
1599. Finger Print E-Voting Systems
1600. Create a Successful Anti- Nuclear Campaign
1601. Crowding Funding Mobilization
1602. People Power of India
1603. Modern Finger Print Voting System
1604. Election Commission Management
1605. Online Painting Auction
1606. Reality Show Ticket Booking System
1607. Online Broadway Motel Food Ordering System
1608. Fashion Studio Model Management
1609. Women's Selfhelp Group
Advance Health Care System
1610. Organizing medical camp for public health development
1611. Homeopathy Health Record
1612. Consumer Legal Advicer
1613. Raw Requried Online Medicine
1614. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1615. I School
1616. Job fair section process
1617. Advertising in E-Book
1618. Students Skills With Modern Industries
1619. College Placement And College Event
1620. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1621. Cloud Storage Public Digital Certificate
ERP PROJECTS
1622. Customer Relationship Management
1623. Corporate Trouble Shooter
1624. Corporate Event Organisation
1625. Engnering Lab Maintenance
1626. Select Your Age(Business Motivation all age group)
1627. Software Requirements Analysis for Client Side
1628. ERP System (Enterprint Resource Plan
LATEST BANKING
1629. User Opinion For Indian Banking Service And Cashless Economy
1630. Advanced Banking System
1631. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1632. Economic Usage of Solar Energy
1633. Gps Consumers Complients
1634. Online Softskills Tracks
1635. Online Buy And Sale Software
1636. Budget Home Design
1637. Online Product Exchange
1638. Jewellery Management
1639. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1640. Moderate Robatics System with Public Opinion
Java Apps
1641. Online overview of skills really used in jobs
1642. Land Bank for Nursery
1643. Developing Rural Economy
1644. ECOPS - Electronics Police Record Management System
1645. Website Evaluation Using Opinion Mining
1646. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1647. INSURANCE MANAGEMENT SYSTEM
1648. e-Fraud Prevention based on the Self- Authentication of e-Documents
1649. Hope Center
1650. Exam crazy
1651. BUGS REPORTING SYSTEM
1652. LOCATION BASED CONSUMER COMPLAINT
1653. Speed Racing
1654. ROADSTER
1655. META CAFE
1656. ONLINE VIDEO LOCKER
1657. Management System in Metro Train
1658. Plant Shopping on Web
1659. Reporting Online Media News Systems
1660. Informative Content Extraction
1661. E-commerce Complaint Management System
1662. Modern Agriculture Development System
1663. Loan Online Application
1664. Rural Community Developement
1665. LOVE AND CARE
1666. GREEN PLANT
1667. Advance Couier Service
1668. Community Awarness
1669. E_Music
1670. Staff Management System
1671. E-TENDERING
1672. Hotel Management
1673. Crime File Management System
1674. Cloud Cyber Attack
1675. Cloud Cost Management for Customer Sensitive Data
1676. Advance Web based Multimedia Answer Generation
1677. Commaunity Awareness
1678. E-Commerce Complaints
1679. Modern Agriculture Development System
1680. Plant Shopping on Web
1681. ONLINE VIDEO LOCKER
1682. ONLINE VIDEO LOCKER
1683. Reporting Online Media News Systems
1684. Online Plant Shopping
1685. Community Awareness
1686. Loan Online Application
1687. Modern Agriculture Development System
1688. Online Digital Library
1689. Geo Base Services
1690. Civil Supplies and Consumer Protection Department
1691. Citizen Opinions vs Government Policies
1692. Protecting Used Data Privacy for Attackers
1693. Web Hospital Management
1694. Easy SQL Query for Non-IT Manager
1695. Online Shopping with Fraud detection
1696. Efficient Spatial Query Processing
1697. Cryptographic Key Exchange Authentication
1698. Online Global Information Service Center
1699. Contracts Business Events Management
1700. Online Secure image Social Networks
1701. Outsourcing of Online Image Reconstruction
1702. Trust based Profile Matching Secure Social Network
1703. Secure and Distance based Online Social Network (OSN)
1704. Efficient Online Image Retrieval System
1705. Data Sharing In Cloud Storage by Using Key-Aggregate
1706. Multicast Key Management for Cloud
1707. Face-to-face contact on Mobile Social Networks
1708. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1709. Dynamically Growing Online Survey for Behavioral Outcomes
1710. Advance Web based Multimedia Answer Generation
1711. College Result Analysis with Horizontally Distributed Databases
1712. Feedback Decision Support for mHealth monitoring
1713. Exchange Secrete Key for Data Producers and Consumers
1714. Efficient Information Retrieval Using Ranked Query (EIRQ)
1715. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1716. Web Hosting On Cloud
1717. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1718. Web Server Security with Web Client Management System
1719. Web Parser on Sequence Alignment Techniques
1720. Web Page re-Ranking System for Library
1721. Web Eye
1722. Voting System for Web Library
1723. VIRTUAL CLASSROOM SYSTEM
1724. Unique Web Resources Utilization Monitoring System
1725. Transport Management System
1726. Pre-paid Recharging System on Banking
1727. Tollgate Management
1728. Time To Time Stock Market Updater and Monitoring System
1729. Sql Tuner
1730. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1731. SMS Based Mobile Banking with Security
1732. Sms Topup
1733. Vendor Information System For Shipping
1734. Sequential Anomaly Detection from User Behaviour
1735. Secure SMS Transaction System on banking
1736. Secure Online Documents Management System in Cloud
1737. Secure File Uploading Server with Advance Protecting System
1738. Secure File Monitoring System on Cloud
1739. Relational Logic Search Engine On Healthcare
1740. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1741. Quick Customer decision support on Web Sales Portal
1742. Query Response System for File Management
1743. Quality Visualization on Web TV
1744. Project Work Tracking System
1745. Product Market Manipulations on Asian stock market
1746. Predicting Top Company Share Based on High Utility Data
1747. Automation of Analysis and Development Management
1748. Pharmacy Information System
1749. Personalize Your News on Web
1750. Online University
1751. Online tagging for multimedia content
1752. Online Search Ranking On Multiple Domain
1753. Online Rental House Web Portal
1754. Online Recruitment System
1755. Online Real Estate Property Management
1756. Online Multi Type Documents Search Engine
1757. ONLINE MOBILE BILLING SYSTEM
1758. Online Jewelry Management
1759. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1760. Online Examination System
1761. Online Ensemble Learning Approach
1762. Online Banking With Fraud Detecting
1763. Online Auction Bit
1764. ONLINE ADVERTISING SYSTEM
1765. Nutraceuticals Management System
1766. Nearest Shopping Location Identification Systems
1767. Multilevel Images Authentication Systems
1768. Multi New Product Survey Management
1769. Movie Recommender Systems via User- Item Subgroups
1770. Movie Rating and Recommendation on Mobile
1771. Modern Municipal Corporation
1772. Mobile TV Quality Management
1773. Mobile Banking WAP
1774. Manifold Entrust Scheme
1775. Management System in Train
1776. Secure Mailing System
1777. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1778. LEAVE MANAGEMENT SYSTEM FOR MNC
1779. Knowledge Based Decision Support System(KMS)
1780. Key Management for Content Integration
1781. Inter Bank Fund Transfer in Distributed Network
1782. Information and Knowledge Extracting from a large amount of data
1783. Industry Standard Authorization For Sensitive Resources
1784. Implementation and Validating Environmental and Health
1785. iKnoweb Extracting and Integrating Entity Information System
1786. HUMAN ASSURANCE ADMINISTRATION
1787. High_level network Security Using Packet Filtering
1788. High and Low Level SQL Query Executor
1789. GLOBAL COUNSELLING SYSTEM
1790. A Game Theory for Online Security
1791. Distributed Transaction Proxy
1792. Freelancer Job
1793. File Security With Multi Database System
1794. FILE SEARCH ENGINE
1795. Fertilizer Management System
1796. Fast Web Information Gathering with Alias Detection
1797. E-Tutor Online Jobs
1798. Enterprise Stock and Accounting System
1799. Ensuring Data Storage Security in Cloud Computing
1800. Encrypted IT Auditing on Cloud Computing
1801. Encrypted Data Storage Vs Data Against illegal Access
1802. Enabling Site Interaction In Social Community
1803. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1804. E-Music world
1805. Employee Resource Management
1806. Employee Management System
1807. E-Learning
1808. E Fraud Prevention based on the Self Authentication of e Documents
1809. Distribution System for Discount Sales
1810. Distributed Data Integration on Electricity Board
1811. Disease Information Hiding on Publishing Healthcare Data
1812. Digital Documents Attestation Systems
1813. Defending Against Web Application Vulnerabilities
1814. Defects Analysis Systems
1815. Data theft detection mobile cloud computing
1816. Data Base Fraud Detection Systems
1817. Customer Information Hiding for Data Mismanagement in Banking
1818. Company Security Reporting System(CSRS)
1819. E -Crime File Management System
1820. Credit Card Management System
1821. Corporate Requirement System
1822. Consumer Sales Online Fake Product Detection and Deletion
1823. Company Information Tracking System
1824. Cloud Policy-Based File Assure Deletion
1825. Cloud Data Theft Attacks
1826. Cloud Cyber Attacks against Social Networks
1827. Cloud Cost Management for Customer Sensitive Data
1828. Client Favorite Photo Search Engine on Web
1829. Citizen Card System
1830. Card Management System
1831. Design &Development of Car Parking and Automation Billing Systems
1832. Customer Care Service
1833. BPO Call Center
1834. Automation of IT Process Management
1835. Modeling and Automated Containment of Worms
1836. Attribute Key Based Data Security System
1837. As Needed Basis Accountability for Cloud Data Sharing
1838. Annotation of short texts With Wikipedia pages
1839. AIRLINE RESERVATION SYSTEM
1840. Advance User Management on Social Website
1841. A Semantic Web Based Scientific News Aggregator


Dotnet Mini Projects
Mini Projects
1842. VALUE ADDED TAX (VAT)
1843. User Oriented Network Attacks
1844. Secure Back Up
1845. Screen Capture And Mouse I/O
1846. Sales Bill Printing System using Excel
1847. Password Security
1848. Online User Mobile Rating
1849. Online Sensex Graph System
1850. Online Book Publishing
1851. NEWS TICKER PROJECT
1852. Multi Storage file
1853. Message Chating
1854. Medical Equipment in WAP
1855. Login Authentication Scheme
1856. Information Alert System
1857. Image Encryption And Decryption
1858. Generic Business Portal
1859. Flight Booking Portal
1860. File Transfer using Cryptography Techniques
1861. File Splitting
1862. Excel Format in Report
1863. EB Management System
1864. Dynamic Web Form Creation
1865. Android Image Search


Struts Application Projects
Struts Apps
1866. Public Sentiment Analysis with Online Shopping Using Struts
1867. Modern distributed business for supply-chain management
1868. High Confidential Personal Disease Reporting System
1869. Distributor Sensitive Data Management Using Struts
1870. Development of Certificate Authority Services for Web Applications
1871. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1872. Website Tracking System
1873. Website Ranking System
1874. Treasure Warehouse
1875. Student Information System
1876. Storage security
1877. PRISON MANAGEMENT SYSTEM
1878. E-Licence Investigation System
1879. Online Secure File Transfer System
1880. Online Medicine Purchase
1881. ONLINE EDUCATION
1882. Online Agriculture System
1883. Mobile Survey
1884. ISSUE TRACKING SYSYTEM
1885. HOSPITAL MANAGEMENT SYSYTEMS
1886. HealthCare Management System
1887. Global Employee Acclaimer
1888. E-VOTING FOR ASSOCIATION
1889. Encrypted Register Form
1890. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1891. E INSURANCE
1892. Courier Tracking Systems
1893. corporate Transportation
1894. Collectorate Communication Systems
1895. Budget Approval System
1896. BLOOD BANK MANAGEMENT SYSTEMS
1897. ATTENDANCE MANAGEMENT SYSTEM
1898. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1899. Sponsor For Agriculture
1900. Agriculture Assist
1901. Agriculture Marketing in Generation
1902. International Plant Import and Export
MODERN EDUCATION SYSTEM
1903. Old In Gold
1904. I School
1905. College Placement And Events
1906. Rural Area Educational Trouble Shooter
1907. Web Direct Recruitment Analysis
1908. Online Aquarum
1909. School Automation System
1910. Secure Online Course Automation
1911. Session Management System in It Industry
1912. Tools for Non IT Expert Developer
1913. Students Skills With Modern Industries
MODERN TECHNOLOGY
1914. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1915. Customer Favarate Greeting Card Design
1916. GPS Transport Packers and Movers
1917. House Hold Appliancies Warranty Management
1918. Direct Q Less Reservation System in train
1919. Power Consumption Monitoring House Hold Electronic Device
1920. Apartment Maintenance
1921. Budget Home Design
1922. Online Buy And Sale Software
1923. Online Softskills Tracks
1924. Gps Consumers Complients
1925. Economic Usage of Solar Energy
Advance Health Care System
1926. Organizing medical camp for public health development
1927. LIVE WEB DOCTOR CONSULTATION
1928. World Wide Cloud Inter Hospital Acess Health Care System
1929. MAC Sensing Protocol
1930. Medical Record Authentication
1931. Raw Requried Online Medicine
1932. Consumer Legal Advicer
1933. Homeopathy Health Record
SPORTS
1934. Play Ground Booking
1935. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1936. Cloud Storage Public Digital Certificate
ERP PROJECTS
1937. Corporate Trouble Shooter
1938. Entrepreneur Fault Analysis
1939. Organise Corporate Training For Client Projects
1940. Employment Knowledge Database
1941. GPS Employee Tracking System
1942. Non It People Performance
1943. Performance System Analysis In Industry
1944. Consultanting About the Foreign Peoples
1945. Recommend To Friend
1946. New Company Policy Clearance System
1947. ERP System (Enterprint Resource Plan
1948. Software Requirements Analysis for Client Side
1949. Select Your Age(Business Motivation all age group)
1950. Engnering Lab Maintenance
1951. Corporate Event Organisation
LATEST BANKING
1952. EyeBank Management System
1953. Advanced Banking System
OUR MODERN SOCIETY
1954. Trained Volunteers Create A Successful Social Campaign
1955. Finger thump Based Shopping Cart
1956. Railway Management Service
1957. Create a Successful Anti- Nuclear Campaign
1958. Crowding Funding Mobilization
1959. People Power of India
1960. Pets Care
1961. Feature in Best Potitical Leader in India
1962. Yell Help For Children
1963. Automation Transport Maintance
1964. It Park Media
1965. Online Painting Auction
1966. Election Commission Management
1967. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
1968. ANDROID APPS FOR INSURANCE SYSTEM
1969. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
1970. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
1971. ANDROID APPS FOR DOCTOR APPOINTMENT
1972. LIVE WEB DOCTOR CONSULTATION
1973. ANDROID APPS ON DOCTOR WITH NURSE
1974. HOSPITAL ANDROID APPS
1975. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
1976. Fertilizer Management System -Java, JSP, MySQL
1977. Land Bank for Nursery -Java, JSP, MySQL
1978. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
1979. FORMER APPS - ANDROID
1980. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
1981. Online Banking with Fraud Detecting- Java JSP, MySQL
1982. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
1983. MICRO CREDIT BANKING ON SMARTPHONE


Internet of things (IoT)
IoT Projects
1984. IOT Projects
1985. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
1986. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1987. FogRoute: DTN-based Data Dissemination Model in Fog Computing


RESTful Web services
REST API
1988. Big Scholarly Data: A Survey
1989. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved