Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) PYTHON APPLICATION PROJECTS JAVA IEEE LATEST
LATEST PROJECTS UPDATES Internet of things (IoT) -BLOCKCHAIN BLOCK CHAIN TECH - BITCOIN Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PhD Guidance JAVA SPRING AND HIBERNATE JAVA IEEE 2016-17 IEEE 2014-2015 Java Projects
Latest IEEE 2015-2016 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project
Java Application Projects Java Mini Projects NEW TECHNOLOGY-HELP VIDEO R - DATA SCIENCE - ML
WEKA-Machine Learning BIG DATA - HADOOP PROJECTS BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB
ANDROID APPS IEEE ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP
ANDROID APPS COLLEGE MINI PROJECTS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects ASP.NET MVC Framework Dot Net IEEE 2017-18 ANGULAR JS ,
RAZOR MVC 4 ASP.NET 2017-18 RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects
IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects
Dotnet Application Projects Dotnet Mini Projects Struts Application Projects SOFT IDEA FOR DIGITAL SOCIETY
INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS
RESTful Web services
 
PYTHON PROJECT - IEEE
MORE PYTHON IEEE
1. Design of QR Code based Mall Shopping Guide System
2. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
3. Sentiment Lexicon
4. SUBWAY PASSENGER FLOW FORECASTING WITH MULTI-STATION AND EXTERNAL FACTORS
5. Personalized Recommendation of Social Images by Constructing a User Interest
6. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
7. Opinion Mining using Ontological Spam Detection
8. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
9. Phishing Web Sites Features Classification
10. using data mining to predict hospital admissions from the emergency department
11. Correlated Matrix Factorization for Recommendation with Implicit Feedback
12. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
13. Blue Eyes Technology-identifies human emotions (sad, happy, Angry or surprised
14. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
15. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
16. Iris Recognition
17. Currency Recognition System
PYTHON TRAINING WITH PROJECT
18. Privacy Characterization and Quantification in Data Publishing
19. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
20. Opinion Mining using Ontological Spam Detection
21. Predicting the top-N popular videos via cross-domain hybrid model
22. Fraquent itemsets mining with differential privacy over large scale data
23. Phishing Web Sites Features Classification
24. Dynamic Facet Ordering for Faceted Product Search Engines
25. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
26. Machine Learning and Deep Learning Methods for Cybersecurity
27. Linear Regression Algorithm Predict the volution of Community in Future
28. A User-Centric Machine Learning Framework for Cyber Security Operations Center
29. Linear Regression Algorithm
30. A Machine Learning Approach to Routing
31. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
32. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
33. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
34. CYBER SECURITY
35. Automatic Sentiment Detection in Naturalistic Audio
36. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
37. Student Performance Analysis - PYTHON
38. E-assessment using image processing in ∞Exams
39. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
40. NLP - NATURAL LANGUAGE PROCESSING
41. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
42. Image Based Appraisal of Real Estate Properties-IEEE 2017
43. FOOD WASTE ORGANIZER
44. PYTHON PROJECT FLOW
45. PYTHON PROGRAM EXECUTION
46. PYTHON INSTALLATION
PYTHON APPLICATION
47. Fake News Analysis using Machine Learning - ML
48. Brain Tumor Detection Image Segmentation Using OpenCV
49. Road Accident Analysis Using Machine Learning
50. Inferring Salient Objects from Human Fixations
51. ROTOSCOPING APPEARANCE MODELS
52. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
53. Consumer Attitudes towards Insurance Products
54. Organic Food
55. BOOK RECOMMENDATION SYSTEM PYTHON
56. Web Scraping Using PYTHON
57. MULTIMEDIA CONTENT PROTECTION
58. Student Performance Analysis - PYTHON
59. HOTEL MANAGEMENT
60. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Reinforcement Learning
Unsupervised Learning
61. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
62. Event Management With Analysis - Python
Supervised Learning
63. Design of QR Code based Mall Shopping Guide System
64. Blue Eyes Technology -identifies human emotions (sad, happy, Angry or surprised
65. Fake News Analysis using Machine Learning - ML
66. Road Accident Analysis Using Machine Learning
67. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
68. ROTOSCOPING APPEARANCE MODELS
69. Inferring Salient Objects from Human Fixations
70. Privacy Data Mess-apps
71. Speech Recognition in Social Care - NLP
72. Text-to-Speech (TTS)- NLP
73. Voice Scheduler - NLP
74. VOICE SEARCH ENGINE - NLP
75. LINEAR REGRESSION - PYTHON
76. LATENT DIRICHLET ALLOCATION
77. DIGITAL IMAGE PROCESSING - PYTHON
78. DECISION TREE LEARNING - ALGORITHM
79. NAIVE BAYES CLASSIFIER
80. K - MEANS CLUSTERING
81. Dengu Data Analysis Using R-program
82. Shopping Data set Analyse Using R Machine Learning
83. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
84. Polynomial Time Algorithm-PTA
85. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
86. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
87. K-Means For Clustering


PYTHON APPLICATION PROJECTS
PYTHON-AI APPLICATION
88. Heart Disease Prediction System
89. Web Scraping Using
90. BOOK RECOMMENDATION SYSTEM PYTHON
91. Road Accident Analysis Using Machine Learning
92. Organic Food
93. Consumer Attitudes towards Insurance Products
94. Brain Tumor Detection Image Segmentation Using OpenCV
95. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
96. ROTOSCOPING APPEARANCE MODELS
97. Inferring Salient Objects from Human Fixations
98. Fake News Analysis using Machine Learning


JAVA IEEE LATEST
IEEE Transactions on Big Data
99. Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective
100. Patient Oriented Framework Using Bigdata
101. Improving Instance Selection Methods for Big Data Classification
102. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
103. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
104. AIR5: Five Pillars of Artificial Intelligence Research
105. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
106. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
107. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
108. Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
109. A Fog-centric Secure Cloud Storage Scheme
110. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
111. Performance Enhancement of Information Retrieval via Artificial Intelligence
112. Crime Pattern Analysis, Visualization And Prediction Using Data Mining
113. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
114. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
115. A Web Service Discovery Approach Based on Common Topic Groups Extraction
116. Dynamic Facet Ordering for Faceted Product Search Engines
117. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
118. Flexible Wildcard Searchable Encryption System
119. QoS Recommendation in Cloud Services
120. Securing Aggregate Queries for DNA Databases
121. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
122. A robust reputation management mechanism in the federated cloud
123. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
124. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
125. A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding
126. Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis
127. FraudFind Financial Fraud Detection by Analyzing Human Behavior
128. Cancer Disease Prediction Survey Analysis
129. RoadSense: Smartphone Application to Estimate Road Conditions using Accelerometer and Gyroscope
130. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
131. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
132. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
133. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
134. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
135. Energy-efficient Query Processing in Web Search Engines
136. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
137. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
138. BiRank: Towards Ranking on Bipartite Graphs
139. QoS Recommendation in Cloud Services
140. Public Interest Analysis Based on Implicit Feedback of IPTV Users
141. Search Rank Fraud and Malware Detection in Google Play
142. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
143. Influence Maximization in Trajectory Databases
144. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
145. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
146. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
147. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
148. Computing Semantic Similarity of Concepts in Knowledge Graphs
149. QDA: A Query-Driven Approach to Entity Resolution
150. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
151. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
152. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
153. CONTENT BASED IMAGE RETRIEVAL
154. Identifying At Risk Students for Early Interventions A Time Series Clustering
155. Two Layer Clustering model for Mobile Customer Analysis
156. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
157. Consumer oriented web services ranking and classification
158. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
159. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
160. Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems
161. Measures of Scatter and Fisher Discriminant Analysis for Uncertain Data
162. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
163. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
164. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
165. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
166. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
167. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
168. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
169. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


LATEST PROJECTS UPDATES
BIG DATA JAVA - NOSQL- MONGODB
170. Blockchain for AI
PYTHON - AI
171. Design of QR Code based Mall Shopping Guide System
172. Blue Eyes Technology which identifies human emotions (sad, happy, Angry or surprised)
173. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
174. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
175. Inferring Salient Objects from Human Fixations
176. ROTOSCOPING APPEARANCE MODELS
177. Event Management With Analysis - Python
178. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
179. Iris Recognition
180. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
181. Object Detection
182. Rainfall Rate Prediction
183. Drug Usage in Social Media
184. SUBWAY PASSENGER FLOW FORECASTING


Internet of things (IoT) -BLOCKCHAIN
IOT Under Developing - Topic
185. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
186. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
187. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
188. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
189. Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality
190. Review of Standard Ontologies for the Web of Things
IoT Projects
191. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
192. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
193. Who Moved My Data? Privacy Protection in Smartphones
194. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
195. IOT Projects
196. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
197. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
198. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
199. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
200. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
201. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
202. Blockchain for AI
203. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PYTHON PROJECT WITH PLACEMENT TRAINING
204. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
205. Fake News Analysis using Machine Learning - ML
206. Brain Tumor Detection Image Segmentation Using OpenCV
207. Blockchain for AI: Review and Open Research Challenges
208. Road Accident Analysis Using Machine Learning
209. E-assessment using image processing in ∞Exams
210. NLP - NATURAL LANGUAGE PROCESSING
211. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
212. Dengu Data Analysis Using R-program
213. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
214. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
215. Big Scholarly Data: A Survey
216. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
217. Big Data, Big Knowledge Big Data for Personalized Healthcare
218. Deduplication on Encrypted Big Data in Cloud
219. Secure Sensitive Data Sharing on a Big Data Platform
220. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
221. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
222. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
223. Self-Healing in Mobile Networks with Big Data
224. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
225. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
226. Child Monitoring - ANDROID APPS
227. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
228. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
229. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
230. Developing Apps for visually imapired people: Lessons learned from social network
231. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
232. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
233. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
234. Design of secure location and message sharing system for android platform
235. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
236. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
237. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
238. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
239. Privacy Protection based Access Control Scheme in Cloud-based Services
240. Privacy-Preserving Selective Aggregation of Online User Behavior Data
241. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
242. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


PhD Guidance
Cyber Security and Privacy
243. Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment
244. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
245. Blockchain for AI
Developing PhD proposal
246. Inferring Salient Objects from Human Fixations
247. ROTOSCOPING APPEARANCE MODELS
248. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
249. Review of Standard Ontologies for the Web of Things
250. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
251. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
252. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
253. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
254. Approximate Data Aggregation in Sensor Equipped IoT Networks
255. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
256. Diabetics Dataset
257. MEDICAL DATA ANALYSES
258. R IEEE PROJECTS
259. PhD Project Guidance
260. PhD Projects


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
261. FISHING DISASTER MANAGEMENT SYSTEM
262. SPRING AND HIBERNATE


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
263. Two-Factor Data Security Protection Mechanism for Cloud Storage System
264. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
265. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
266. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
267. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
268. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
269. Where You Are Is Who You Are User Identification by Matching Statistics
270. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
271. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
272. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
273. Online Subgraph Skyline Analysis Over Knowledge Graphs
274. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
275. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
276. ID2S Password-Authenticated Key Exchange Protocols
277. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
278. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
279. Classification model to predict the learners' academic performance using big data
280. Electronic Commerce Meets the Semantic Web
281. Mining High Utility Patterns in One Phase without Generating Candidates
282. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
283. Automatic Generation of Social Event Storyboard from Image Click-through Data
284. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
285. Understanding Deep Representations Learned in Modeling Users Likes
286. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
287. Topic-Oriented Exploratory Search Based on an Indexing Network
288. Relevance Feedback Algorithms Inspired By Quantum Detection
289. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
290. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
291. Efficiently Estimating Statistics of Points of Interests on Maps
292. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
293. Aspect-level Influence Discovery from Graphs
294. Sentiment Embeddings with Applications to Sentiment Analysis
295. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
296. Resolving Multi-party Privacy Conflicts in Social Media
297. Encrypted Data Management with Deduplication in Cloud Computing
298. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
299. Crawling Hidden Objects with kNN Queries
300. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
301. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
302. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
303. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
304. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
305. Nearest Keyword Set Search in Multi-dimensional Datasets
306. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
307. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
308. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
309. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
310. Immutable Authentication and Integrity Schemes for Outsourced Databases
311. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
312. Server-Aided Public Key Encryption with Keyword Search
313. Online Learning in Large-Scale Contextual Recommender Systems
314. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
315. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
316. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
317. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
318. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
319. Multi-Modal Event Topic Model for Social Event Analysis
320. Social friend recommendation on multiple network correlation
321. Tag Based Image Search by Social Re-ranking
322. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
323. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
324. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
325. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
326. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
327. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
328. Packet-Scale Congestion Control Paradigm


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
329. Leveraging the Tail Time for Saving Energy in Cellular Networks
330. Keylogging-resistant Visual Authentication Protocols
331. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
332. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
333. Preserving Location Privacy in Geo-Social Applications
334. Efficient Authentication for Mobile and Pervasive Computing
335. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
336. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
337. Typicality-Based Collaborative Filtering Recommendation
338. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
339. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
340. Keyword Search Over Probabilistic RDF Graphs
341. Efficient Prediction of Difficult Keyword Queries over Databases
342. Interpreting the Public Sentiment Variations on Twitter
343. An Efficient Recommendation Method for Improving Business Process Modeling
344. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
345. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
346. On the use of Side Information for Mining Text Data
347. Privacy Preserving and Content Protecting Location based Queries
348. Fast Nearest Neighbor Search with Keywords
349. Towards Differential Query Services in Cost-Efficient Clouds
350. Facilitating Document Annotation using Content and Querying Value
351. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
352. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
353. Secure Outsourced Attribute-Based Signatures
354. Supporting Privacy Protection in Personalized Web Search
355. Dealing With Concept Drifts in Process Mining
356. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
357. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
358. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
359. Active Learning of Constraints for Semi-Supervised Clustering
360. Best Keyword Cover Search
361. Personalized Recommendation Combining User Interest and Social Circle
362. Online Feature Selection and Its Applications
363. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
364. Incremental Affinity Propagation Clustering Based on Message Passing
365. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
366. Secure kNN Query Processing in Untrusted Cloud Environments
367. Malware Propagation in Large-Scale Networks
368. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
369. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
370. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
371. Efficient Ranking on Entity Graphs with Personalized Relationships
372. Task Trail: An Effective Segmentation of User Search Behavior
373. Privacy-Preserving Enhanced Collaborative Tagging
374. XSPath Navigation on XML Schemas Made Easy
375. Security Evaluation of Pattern Classifiers under Attack
376. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
377. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
378. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
379. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
380. Nothing is for Free: Security in Searching Shared and Encrypted Data
381. SocialTube: P2P-assisted Video Sharing in Online Social Networks
382. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
383. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
384. Behavioral Malware Detection in Delay Tolerant Networks
385. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
386. Private Searching on Streaming Data Based on Keyword Frequency
387. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
388. On the Security of Trustee-Based Social Authentications
389. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
390. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
391. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
392. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
393. A Two-stage Deanonymization Attack Against Anonymized Social Networks
394. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
395. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
396. Scalable architecture for multi-user encrypted SQL operations on cloud database services
397. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
398. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
399. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
400. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
401. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
402. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
403. Secure kNN Query Processing in Untrusted Cloud Environments
404. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
405. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
406. A Hybrid Cloud Approach for Secure Authorized Deduplication
407. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
408. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
409. A Novel Model for Competition and Cooperation Among Cloud Providers
410. CLOUDQUAL: A Quality Model for Cloud Services
411. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
412. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
413. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
414. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
415. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
416. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
417. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
418. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
419. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
420. Enhanced Security for Association Rule Mining to secure Transactional Databases
421. Operational Pattern Revealing Technique in Text Mining
422. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
423. Personalized web search using Browsing history and domain Knowledge
424. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
425. Data Security the Challenge of Cloud Computing
426. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
427. A Cloud Enviroment for Backup and Data Storage


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
428. Rank-Based Similarity Search: Reducing the Dimensional Dependence
429. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
430. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
431. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
432. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
433. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
434. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
435. On the Security of data access control for multiauthority cloud storage system
436. Trust-based Service Management for Social Internet of Things Systems
437. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
438. Formalization and Verification of Group Behavior Interactions
439. Group Key Agreement with Local Connectivity
440. Data Lineage in Malicious Environments
441. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
442. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
443. Enabling Cloud Storage Auditing with Key-Exposure Resistance
444. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
445. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
446. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
447. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
448. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
449. Quantitative Reasoning About Cloud Security Using Service Level Agreements
450. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
451. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
452. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
453. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
454. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
455. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
456. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
457. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
458. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
459. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
460. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
461. Enabling Cloud Storage Auditing with Key-Exposure Resistance
462. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
463. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
464. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
465. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
466. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
467. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
468. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
469. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
470. Secure Auditing and Deduplicating Data in Cloud
471. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
472. Towards reproducibility in online social network Research
473. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
474. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
475. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
476. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
477. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
478. Making Digital Artifacts on the Web Verifiable and Reliable
479. Anonymizing Collections of Tree-Structured Data
480. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
481. FOCS: Fast Overlapped Community Search
482. Sparsity Learning Formulations for Mining Time-Varying Data
483. The Impact of View Histories on Edit Recommendations
484. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
485. Discovery of Ranking Fraud for Mobile Apps
486. Towards Effective Bug Triage with Software Data Reduction Techniques
487. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
488. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
489. Auditing for Distributed Storage Systems
490. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
491. Uploader Intent for Online Video: Typology, Inference and Applications
492. YouTube Video Promotion by Cross-network
493. Semantic-Improved Color Imaging Applications: It Is All About Context
494. Geolocalized Modeling for Dish Recognition
495. Learning to Rank Image Tags with Limited Training Examples
496. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
497. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
498. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
499. Tracking Temporal Community Strength in Dynamic Networks
500. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
501. Towards Information Diffusion in Mobile Social Networks
502. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
503. An Efficient Privacy-Preserving Ranked Keyword Search Method
504. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
505. Dispersing Instant Social Video Service Across Multiple Clouds
506. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
507. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
508. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
509. A Computational Dynamic Trust Model for User Authorization
510. Secure Distributed Deduplication Systems with Improved Reliability
511. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
512. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
513. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
514. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
515. User Action Interpretation for Online Content Optimization
516. Spatial Query Integrity with Voronoi Neighbors
517. Spatial Approximate String Search
518. Sensitive Label Privacy Protection on Social Network Data
519. Secure Mining of Association Rules in Horizontally Distributed Databases
520. Secure Logging As a Service Delegating Log Management to the Cloud
521. Robust Module-based Data Management
522. Ranking on Data Manifold with Sink Points
523. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
524. Privacy-Enhanced Web Service Composition
525. Privacy against Aggregate Knowledge Attacks
526. Preventing Private Information Inference Attacks on Social Networks
527. PMSE: A Personalized Mobile Search Engine
528. Personalized QoS-Aware Web Service Recommendation and Visualization
529. Optimal Client-Server Assignment for Internet Distributed Systems
530. Online Search and Buying Behaviour in Consumer Markets
531. M-Privacy for Collaborative Data Publishing
532. Mining User Queries with Markov Chains: Application to Online Image Retrieval
533. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
534. Incentive Compatible Privacy-Preserving Data Analysis
535. Improving Security and Efficiency in Attribute-Based Data Sharing
536. FoCUS: Learning to Crawl Web Forums
537. Fast Nearest Neighbor Search with Keywords
538. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
539. Facilitating Effective User Navigation through Website Structure Improvement
540. Facilitating Document Annotation using Content and Querying Value
541. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
542. Efficient Evaluation of SUM Queries over Probabilistic Data*
543. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
544. Dynamic Query Forms for Database Queries
545. Dynamic Personalized Recommendation on Sparse Data
546. Distributed Strategies for Mining Outliers in Large Data Sets
547. Crowdsourcing Predictors of Behavioral Outcomes
548. Co-Occurrence-Based Diffusion for Expert Search on the Web
549. Comparable Entity Mining from Comparative Questions
550. CloudMoV: Cloud-based Mobile Social TV
551. Anomaly Detection via Online Oversampling Principal Component Analysis
552. Anomaly Detection Approach Using Hidden Markov Model
553. Annotating Search Results from Web Databases
554. A System to Filter Unwanted Messages from OSN User Walls
555. A Survey of XML Tree Patterns
556. A Probabilistic Approach to String Transformation
557. A New Algorithm for Inferring User Search Goals with Feedback Sessions
558. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
559. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
560. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
561. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
562. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
563. Towards Differential Query Services in Cost-Efficient Clouds
564. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
565. SocialTube: P2P-assisted Video Sharing in Online Social Networks
566. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
567. QoS Ranking Prediction for Cloud Services
568. Priority-Based Consolidation of Parallel Workloads in the Cloud
569. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
570. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
571. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
572. Load Rebalancing for Distributed File Systems in Clouds
573. Label-Embedding for Attribute-Based Classification
574. IP-Geolocation Mapping for Moderately Connected Internet Regions
575. Identity-Based Secure Distributed Data Storage Schemes
576. Hint-based Execution of Workloads in Clouds with Nefeli
577. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
578. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
579. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
580. Efficient Two-Server Password-Only Authenticated Key Exchange
581. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
582. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
583. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
584. Winds of Change: From Vendor Lock-In to the Meta Cloud
585. Supporting the Migration of Applications to the Cloud through a Decision Support System
586. Storing Shared Data on the Cloud via Security-Mediator
587. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
588. Privacy-Preserving Public Auditing for Secure Cloud Storage
589. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
590. Outsourcing Privacy-Preserving Social Networks to a Cloud
591. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
592. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
593. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
594. Efficient Security Solution for Privacy-Preserving Cloud Services
595. Collaboration in Multicloud Computing Environments: Framework and Security Issues
596. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
597. Cloud-based DDoS Attacks and Defenses
598. Cloud computing for mobile users can offloading compution save energy
599. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
600. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
601. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
602. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
603. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
604. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
605. Two tales of privacy in online social networks
606. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
607. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
608. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
609. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
610. Security and Privacy-Enhancing Multicloud Architectures
611. Security Using Colors and Armstrong Numbers
612. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
613. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
614. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
615. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
616. Privacy Preserving Data Analytics for Smart Homes
617. On Inference-Proof View Processing of XML Documents
618. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
619. Extracting Spread-Spectrum Hidden Data from Digital Media
620. Efficiently Outsourcing Multiparty Computation under Multiple Keys
621. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
622. Craigslist Scams and Community Composition: Investigating Online Fraud
623. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
624. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
625. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
626. Super-Resolution-based Inpainting
627. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
628. Image Authentication Using Stochastic Diffusion
629. Hierarchical Super-Resolution-Based Inpainting
630. Circular Reranking for Visual Search
631. Bootstrapping Visual Categorization With Relevant Negatives
632. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
633. An extended visual cryptography scheme without pixel expansion for halftone images
634. An Adaptive Cloud Downloading Service
NETWORKING
635. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
636. Topological Conditions for In-Network Stabilization of Dynamical Systems
637. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
638. Price Differentiation for Communication Networks
639. Participatory Privacy: Enabling Privacy in Participatory Sensing
640. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
641. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
642. On the Role of Mobility for Multi-message Gossip
643. Fully Anonymous Profile Matching in Mobile Social Networks
644. Fault Node Recovery Algorithm for a Wireless Sensor Network
645. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
646. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
647. Access Policy Consolidation for Event Processing Systems
648. A Fast Re-Route Method
SOFTWARE ENGINEERING
649. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
650. Vampire attacks: Draining life from wireless ad-hoc sensor networks
651. Towards a Statistical Framework for Source Anonymity in Sensor Networks
652. Search Me If You Can: Privacy-preserving Location Query Service
653. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
654. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
655. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
656. Distributed Cooperative Caching in Social Wireless Networks
657. Community-Aware Opportunistic Routing in Mobile Social Networks
658. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
659. The Devils Behind Web Application Vulnerabilities
660. Security Architecture for Cloud Networking
661. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
662. Secure Overlay Cloud Storage with Access Control and Assured Deletion
663. Risk-Aware Mitigation for MANET Routing Attacks
664. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
665. Privacy-preserving Enforcement of Spatially Aware RBAC
666. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
667. pCloud: A Distributed System for Practical PIR
668. Packet-Hiding Methods for Preventing Selective Jamming Attacks
669. Online Modeling of Proactive Moderation System for Auction Fraud Detection
670. Fast and accurate annotation of short texts with Wikipedia pages
671. FADE: Secure Overlay Cloud Storage with File Assured Deletion
672. Ensuring Distributed Accountability for Data Sharing in the Cloud
673. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
674. Direct and Indirect Discrimination Prevention Methods
675. Detecting Spam Zombies by Monitoring Outgoing Messages
676. Detecting Anomalous Insiders in Collaborative Information Systems
677. Data-Provenance Verification For Secure Hosts
678. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
679. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
680. Payments for Outsourced Computations
681. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
682. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
683. Toward Private Joins on Outsourced Data
684. Statistical Entity Extraction from Web
685. Slicing: A New Approach to Privacy Preserving Data Publishing
686. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
687. Resilient Identity Crime Detection
688. Ranking Model Adaptation for Domain-Specific Search
689. Organizing User Search Histories
690. On the Spectral Characterization and Scalable Mining of Network Communities
691. Multiparty Access Control for Online Social Networks: Model and Mechanisms
692. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
693. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
694. How do Facebookers use Friendlists
695. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
696. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
697. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
698. Enabling Multilevel Trust in Privacy Preserving Data Mining
699. Enabling cross-site interactions in social networks
700. Efficient Similarity Search over Encrypted Data
701. Efficient Extended Boolean Retrieval
702. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
703. Efficient Anonymous Message Submission
704. Effective Pattern Discovery for Text Mining
705. DDD: A New Ensemble Approach for Dealing with Concept Drift
706. Credibility Ranking of Tweets during High Impact Events
707. Creating Evolving User Behavior Profiles Automatically
708. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
709. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
710. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
711. Anomaly Detection for Discrete Sequences: A Survey
712. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
713. Advance Mining of Temporal High Utility Itemset
714. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
715. Reliable Re-encryption in Unreliable Clouds
716. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
717. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
718. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
719. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
720. Gossip-based Resource Management for Cloud Environments
721. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
722. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
723. Cloud Data Protection for the Masses
724. Cloud Computing Security: From Single to Multi-Clouds
725. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
726. In Tags We Trust Trust modeling in social tagging of multimedia content
727. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
728. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
729. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
730. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
731. Cut Detection in Wireless Sensor Networks
732. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
733. TrickleDNS: Bootstrapping DNS Security using Social Trust
734. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
735. Policy-by-Example for Online Social Networks
736. Packet Loss Control Using Tokens at the Network Edge
737. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
738. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
739. Independent Directed Acyclic Graphs for Resilient Multipath Routing
740. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
741. Game-Theoretic Pricing for Video Streaming in Mobile Networks
742. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
743. Auditing for Network Coding Storage
744. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
745. Privacy Preserving Cloud Data Access With Multi-Authorities
746. Movie Rating and Review Summarization in Mobile Environment
747. IDSaaS: Intrusion Detection System as a Service in Public Clouds
748. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
749. BibPro: A Citation Parser Based on Sequence Alignment Techniques
750. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
751. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
752. RITAS: Services for Randomized Intrusion Tolerance
753. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
754. Nymble: Blocking Misbehaving Users in Anonymizing Networks
755. Modeling and Detection of Camouflaging Worm
756. Coding for Cryptographic Security Enhancement using Stopping Sets
757. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
758. Wireless Sensor Network Security model using Zero Knowledge Protocol
759. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
760. Throughput Optimization in Mobile Backbone Networks
761. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
762. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
763. Fast Data Collection in Tree-Based Wireless Sensor Networks
764. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
765. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
766. SPAF: Stateless FSA-based Packet Filters
767. Selfish Overlay Network Creation and Maintenance
768. ProgME: Towards Programmable Network MEasurement
769. Locating Equivalent Servants over P2P Networks
770. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
771. Buffer Sizing for 802.11 Based Networks
772. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
773. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
774. Improving Utilization of Infrastructure Clouds
775. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
776. CloudTPS: Scalable Transactions for Web Applications in the Cloud
777. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
778. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
779. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
780. Ranking Spatial Data by Quality Preferences
781. Making Aggregation Work in Uncertain and Probabilistic Databases
782. Load Shedding in Mobile Systems with MobiQual
783. Group Enclosing Queries
784. Extended XML Tree Pattern Matching: Theories and Algorithms
785. Effective Navigation of Query Results Based on Concept Hierarchies
786. Discovering Conditional Functional Dependencies
787. Decision Trees for Uncertain Data
788. Data Leakage Detection
789. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
790. Young Talent Tracker
791. Cricket Stadium Seat Booking
MODERN AGRICULTRE
792. i VILLAGE
793. International Plant Import and Export
OUR MODERN SOCITY
794. Helping Hands
795. SMART TAXI BOOKING
796. Metro Rail Corporation
797. Trained Volunteers Create A Successful Social Campaign
798. Finger thump Based Shopping Cart
799. Finger Print E-Voting Systems
800. Create a Successful Anti- Nuclear Campaign
801. Crowding Funding Mobilization
802. People Power of India
803. Modern Finger Print Voting System
804. Election Commission Management
805. Online Painting Auction
806. Reality Show Ticket Booking System
807. Online Broadway Motel Food Ordering System
808. Fashion Studio Model Management
809. Women's Selfhelp Group
Advance Health Care System
810. Gracelife - Charity one click away
811. Medical Reporting System
812. Organizing medical camp for public health development
813. Homeopathy Health Record
814. Consumer Legal Advicer
815. Raw Requried Online Medicine
816. Medical Record Authentication
MORDERN EDUCATION SYSTEM
817. I School
818. Job fair section process
819. Advertising in E-Book
820. Students Skills With Modern Industries
821. College Placement And College Event
822. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
823. Cloud Storage Public Digital Certificate
ERP PROJECTS
824. Customer Relationship Management
825. Corporate Trouble Shooter
826. Corporate Event Organisation
827. Engnering Lab Maintenance
828. Select Your Age(Business Motivation all age group)
829. Software Requirements Analysis for Client Side
830. ERP System (Enterprint Resource Plan
LATEST BANKING
831. User Opinion For Indian Banking Service And Cashless Economy
832. Advanced Banking System
833. EyeBank Management System
ONLINE CONSUMERS PROCESSING
834. Economic Usage of Solar Energy
835. Gps Consumers Complients
836. Online Softskills Tracks
837. Online Buy And Sale Software
838. Budget Home Design
839. Online Product Exchange
840. Jewellery Management
841. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
842. E TENDERING -JAVA
843. Moderate Robatics System with Public Opinion
Java Apps
844. Online overview of skills really used in jobs
845. Land Bank for Nursery
846. Developing Rural Economy
847. ECOPS - Electronics Police Record Management System
848. Website Evaluation Using Opinion Mining
849. Monitoring Suspicious Discussions on Online Forums Using Data Mining
850. INSURANCE MANAGEMENT SYSTEM
851. e-Fraud Prevention based on the Self- Authentication of e-Documents
852. Hope Center
853. Exam crazy
854. BUGS REPORTING SYSTEM
855. LOCATION BASED CONSUMER COMPLAINT
856. Speed Racing
857. ROADSTER
858. META CAFE
859. ONLINE VIDEO LOCKER
860. Management System in Metro Train
861. Plant Shopping on Web
862. Reporting Online Media News Systems
863. Informative Content Extraction
864. E-commerce Complaint Management System
865. Modern Agriculture Development System
866. Loan Online Application
867. Rural Community Developement
868. LOVE AND CARE
869. GREEN PLANT
870. Advance Couier Service
871. Community Awarness
872. E_Music
873. Staff Management System
874. E-TENDERING
875. Hotel Management
876. Crime File Management System
877. Cloud Cyber Attack
878. Cloud Cost Management for Customer Sensitive Data
879. Advance Web based Multimedia Answer Generation
880. Commaunity Awareness
881. E-Commerce Complaints
882. Modern Agriculture Development System
883. Plant Shopping on Web
884. ONLINE VIDEO LOCKER
885. ONLINE VIDEO LOCKER
886. Reporting Online Media News Systems
887. Online Plant Shopping
888. Community Awareness
889. Loan Online Application
890. Modern Agriculture Development System
891. Online Digital Library
892. Geo Base Services
893. Civil Supplies and Consumer Protection Department
894. Citizen Opinions vs Government Policies
895. Protecting Used Data Privacy for Attackers
896. Web Hospital Management
897. Easy SQL Query for Non-IT Manager
898. Online Shopping with Fraud detection
899. Efficient Spatial Query Processing
900. Cryptographic Key Exchange Authentication
901. Online Global Information Service Center
902. Contracts Business Events Management
903. Online Secure image Social Networks
904. Outsourcing of Online Image Reconstruction
905. Trust based Profile Matching Secure Social Network
906. Secure and Distance based Online Social Network (OSN)
907. Efficient Online Image Retrieval System
908. Data Sharing In Cloud Storage by Using Key-Aggregate
909. Multicast Key Management for Cloud
910. Face-to-face contact on Mobile Social Networks
911. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
912. Dynamically Growing Online Survey for Behavioral Outcomes
913. Advance Web based Multimedia Answer Generation
914. College Result Analysis with Horizontally Distributed Databases
915. Feedback Decision Support for mHealth monitoring
916. Exchange Secrete Key for Data Producers and Consumers
917. Efficient Information Retrieval Using Ranked Query (EIRQ)
918. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
919. Web Hosting On Cloud
920. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
921. Web Server Security with Web Client Management System
922. Web Parser on Sequence Alignment Techniques
923. Web Page re-Ranking System for Library
924. Web Eye
925. Voting System for Web Library
926. VIRTUAL CLASSROOM SYSTEM
927. Unique Web Resources Utilization Monitoring System
928. Transport Management System
929. Pre-paid Recharging System on Banking
930. Tollgate Management
931. Time To Time Stock Market Updater and Monitoring System
932. Sql Tuner
933. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
934. SMS Based Mobile Banking with Security
935. Sms Topup
936. Vendor Information System For Shipping
937. Sequential Anomaly Detection from User Behaviour
938. Secure SMS Transaction System on banking
939. Secure Online Documents Management System in Cloud
940. Secure File Uploading Server with Advance Protecting System
941. Secure File Monitoring System on Cloud
942. Relational Logic Search Engine On Healthcare
943. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
944. Quick Customer decision support on Web Sales Portal
945. Query Response System for File Management
946. Quality Visualization on Web TV
947. Project Work Tracking System
948. Product Market Manipulations on Asian stock market
949. Predicting Top Company Share Based on High Utility Data
950. Automation of Analysis and Development Management
951. Pharmacy Information System
952. Personalize Your News on Web
953. Online University
954. Online tagging for multimedia content
955. Online Search Ranking On Multiple Domain
956. Online Rental House Web Portal
957. Online Recruitment System
958. Online Real Estate Property Management
959. Online Multi Type Documents Search Engine
960. ONLINE MOBILE BILLING SYSTEM
961. Online Jewelry Management
962. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
963. Online Examination System
964. Online Ensemble Learning Approach
965. Online Banking With Fraud Detecting
966. Online Auction Bit
967. ONLINE ADVERTISING SYSTEM
968. Nutraceuticals Management System
969. Nearest Shopping Location Identification Systems
970. Multilevel Images Authentication Systems
971. Multi New Product Survey Management
972. Movie Recommender Systems via User- Item Subgroups
973. Movie Rating and Recommendation on Mobile
974. Modern Municipal Corporation
975. Mobile TV Quality Management
976. Mobile Banking WAP
977. Manifold Entrust Scheme
978. Management System in Train
979. Secure Mailing System
980. Location-Based Spatial Query Processing in Wireless Broadcast Environments
981. LEAVE MANAGEMENT SYSTEM FOR MNC
982. Knowledge Based Decision Support System(KMS)
983. Key Management for Content Integration
984. Inter Bank Fund Transfer in Distributed Network
985. Information and Knowledge Extracting from a large amount of data
986. Industry Standard Authorization For Sensitive Resources
987. Implementation and Validating Environmental and Health
988. iKnoweb Extracting and Integrating Entity Information System
989. HUMAN ASSURANCE ADMINISTRATION
990. High_level network Security Using Packet Filtering
991. High and Low Level SQL Query Executor
992. GLOBAL COUNSELLING SYSTEM
993. A Game Theory for Online Security
994. Distributed Transaction Proxy
995. Freelancer Job
996. File Security With Multi Database System
997. FILE SEARCH ENGINE
998. Fertilizer Management System
999. Fast Web Information Gathering with Alias Detection
1000. E-Tutor Online Jobs
1001. Enterprise Stock and Accounting System
1002. Ensuring Data Storage Security in Cloud Computing
1003. Encrypted IT Auditing on Cloud Computing
1004. Encrypted Data Storage Vs Data Against illegal Access
1005. Enabling Site Interaction In Social Community
1006. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1007. E-Music world
1008. Employee Resource Management
1009. Employee Management System
1010. E-Learning
1011. E Fraud Prevention based on the Self Authentication of e Documents
1012. Distribution System for Discount Sales
1013. Distributed Data Integration on Electricity Board
1014. Disease Information Hiding on Publishing Healthcare Data
1015. Digital Documents Attestation Systems
1016. Defending Against Web Application Vulnerabilities
1017. Defects Analysis Systems
1018. Data theft detection mobile cloud computing
1019. Data Base Fraud Detection Systems
1020. Customer Information Hiding for Data Mismanagement in Banking
1021. Company Security Reporting System(CSRS)
1022. E -Crime File Management System
1023. Credit Card Management System
1024. Corporate Requirement System
1025. Consumer Sales Online Fake Product Detection and Deletion
1026. Company Information Tracking System
1027. Cloud Policy-Based File Assure Deletion
1028. Cloud Data Theft Attacks
1029. Cloud Cyber Attacks against Social Networks
1030. Cloud Cost Management for Customer Sensitive Data
1031. Client Favorite Photo Search Engine on Web
1032. Citizen Card System
1033. Card Management System
1034. Design &Development of Car Parking and Automation Billing Systems
1035. Customer Care Service
1036. BPO Call Center
1037. Automation of IT Process Management
1038. Modeling and Automated Containment of Worms
1039. Attribute Key Based Data Security System
1040. As Needed Basis Accountability for Cloud Data Sharing
1041. Annotation of short texts With Wikipedia pages
1042. AIRLINE RESERVATION SYSTEM
1043. Advance User Management on Social Website
1044. A Semantic Web Based Scientific News Aggregator


Java Mini Projects
Mini Projects
1045. Website Tracking System
1046. Website Ranking System
1047. Treasure Warehouse
1048. Student Information System
1049. Storage security
1050. PRISON MANAGEMENT SYSTEM
1051. E-Licence Investigation System
1052. Online Secure File Transfer System
1053. Online Medicine Purchase
1054. ONLINE EDUCATION
1055. Online Agriculture System
1056. Mobile Survey
1057. ISSUE TRACKING SYSYTEM
1058. HOSPITAL MANAGEMENT SYSYTEMS
1059. HealthCare Management System
1060. Global Employee Acclaimer
1061. E-VOTING FOR ASSOCIATION
1062. Encrypted Register Form
1063. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1064. E INSURANCE
1065. Courier Tracking Systems
1066. corporate Transportation
1067. Collectorate Communication Systems
1068. Budget Approval System
1069. BLOOD BANK MANAGEMENT SYSTEMS
1070. ATTENDANCE MANAGEMENT SYSTEM
1071. Activity management


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
1072. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
1073. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
1074. NAIVE BAYES CLASSIFIER
1075. K - MEANS CLUSTERING
1076. LINEAR REGRESSION - PYTHON
1077. LATENT DIRICHLET ALLOCATION
1078. DIGITAL IMAGE PROCESSING - PYTHON
1079. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
1080. MACHINE LEARNING-ML ALGORITHM
1081. WHAT IS MACHINE LEARNING - AI
1082. NATURAL LANGAUAGE PROCESSING - NLP
1083. VISION - Visual Data


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
1084. R - ADVANCE IMAGE PROCESSING
1085. Dengu Data Analysis Using R-program
1086. Shopping Data set Analysis Using R Machine Learning
1087. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
1088. R PROGRAM TRAINING
1089. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
1090. COMAPRISON OF VARIOUS DOCKING SCORES
1091. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
1092. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
1093. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
1094. MICRO ARRAY GENE EXPRESSION ANALYSIS
1095. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
1096. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
1097. Diabetics Dataset
1098. Excercise Dataset
1099. MEDICAL DATA ANALYSES
1100. WEKA PRIVACY DATA SET ANALYSES


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
1101. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
1102. MRSIM: Mitigating Reducer Skew In MapReduce
1103. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
1104. HADOOP WITH HEALTHCARE DATA ANALYSYS
1105. HADOOP WEBLOG DATA ANALYSES
1106. BANK DATA ANALYTIC WITH HADOOP
1107. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1108. Bucket Based Data Deduplication Technique for Big Data Storage System
1109. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
1110. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
1111. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
1112. Efficient Recommendation of De-identification Policies using MapReduce
1113. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
1114. Big Scholarly Data: A Survey
1115. SocialQ&A: An Online Social Network Based Question and Answer System
1116. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1117. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1118. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
1119. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1120. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
1121. User-Centric Similarity Search
1122. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
1123. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
1124. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
1125. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
1126. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
1127. Processing Incomplete k Nearest Neighbor Search
1128. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
1129. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
1130. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
1131. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
1132. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
1133. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
1134. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
1135. Deduplication on Encrypted Big Data in Cloud
1136. Dynamic Resource Allocation for MapReduce with Partitioning Skew
1137. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
1138. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
1139. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
1140. Self-Healing in Mobile Networks with Big Data
1141. Secure Sensitive Data Sharing on a Big Data Platform
1142. Big Data, Big Knowledge: Big Data for Personalized Healthcare
1143. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
1144. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
1145. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1146. Differentially Private Frequent Itemset Mining via Transaction Splitting
1147. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
1148. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
1149. Fast Best-Effort Pattern Matching in Large Attributed Graphs


ANDROID APPS IEEE
IEEE TRANSACTIONS ON BIG DATA
1150. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
1151. BusTracking
1152. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
1153. Who Moved My Data? Privacy Protection in Smartphones
1154. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
1155. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
1156. Android User Privacy Preserving through Crowdsourcing
1157. DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection
1158. Verbal Authentication for Personal Digital Assistants
1159. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
1160. Privacy-Preserving Aggregate Queries for Optimal Location Selection
1161. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
1162. 5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds
1163. Mobile Attendance using Near Field Communication And One-Time Password
1164. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
1165. Efficient Clue-based Route Search on Road Networks
1166. Privacy-Preserving Location-Proximity for Mobile Apps
1167. Cooperative Query Answer Authentication
1168. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
1169. Blood Bank APPS
1170. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
1171. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
1172. ZapDroid: Managing Infrequently Used Applications on Smartphones
1173. Searching Trajectories by Regions of Interest
1174. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
1175. A Classroom Scheduling Service for Smart Classes
1176. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
1177. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
1178. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
1179. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
1180. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1181. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
1182. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1183. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
1184. Authentication of Smartphone Users Using Behavioral Biometrics
1185. An Exploration of Geographic Authentication Schemes
1186. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
1187. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
1188. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
1189. Distributed secret sharing approach with cheater prevention
1190. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
1191. Efficient privacy preserving location based query over outsourced encrypted data
1192. Utilizing the Cloud to Store Hijacked Camera Images
1193. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
1194. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
1195. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
1196. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
1197. Enabling privacy preserving location proof for mobile users.
1198. Optimizing User Experience in Choosing Android Applications
1199. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
1200. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
1201. FoodForCare: An Android Application for Self-Care with Healthy Food
1202. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
1203. Silence is Golden: Enhancing Privacy of Location-Based Services
1204. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
1205. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
1206. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
1207. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
1208. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
1209. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
1210. Adapting to User Interest Drift for POI Recommendation
1211. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
1212. Developing Apps for visually imapired people: Lessons learned from social network
1213. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
1214. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
1215. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
1216. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
1217. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
1218. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
1219. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
1220. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1221. Mobile cloud support for semantic enriched speech recognition in social care
1222. Distributing secret sharing approach with cheater prevention based on QR code
1223. Design of Secure Location and Message Sharing System for Android Platform
1224. The impact of cloud technology on the automation of businesses
1225. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
1226. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
1227. Rescue Management System
1228. Android Army - Military Apps
1229. Android Beauty Parlor
1230. Android E Municipality
1231. ANDROID NURSE AID
1232. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
1233. Human Resource (HR)- APPS
1234. GPS Employee Tracking System
OUR MODERN SOCITY
1235. GENERIC MEDICINE
1236. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
1237. RECYCLE APP WASTE COLLECTION REUSE
1238. Bikes Rental - APPS
1239. Location Based Alarm - GPS
1240. ANDROID APPS FOR INSURANCE SYSTEM
1241. BUDGET HOME DESIGN -ANDROID APPS
1242. Former To Former Apps
1243. Pets Care
ONLINE CONSUMERS PROCESSING
1244. House Hold Appliancies Warranty Management
1245. GPS Transport Packers and Movers
Android Apps
1246. MY LIBRARY
1247. FACULTY RATING SYSTEM
1248. App for self organizer
1249. ONLINE DOCTOR APPOINTMENT
1250. Conference Event Mobile Assistant
1251. Mobile Prescription
1252. Metastore Application
1253. Android SmartCampus
1254. Android Shopping Mall
1255. TOLL GATE -Barcode Billing System --ANDROID
1256. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1257. Taste Hunt For Restaurants
1258. POLICE APPS
1259. Android Blood Bank
1260. Mobile Expense Claim System – Android
1261. Android Intelligent Time Tracking System TICK
1262. Android Course and Attendance Management System
1263. Android Event Reminder
1264. Android Attendance Assessment
1265. Android Advance Shopping
1266. Android CAR POOLING
1267. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1268. Android HOSPITAL
1269. ATHLETE MEET GUIDE
1270. Android Apps PARKING MANAGER
1271. Love and Care
1272. Food Waste Management System
1273. Travel Guide
1274. Android Provisional Store
1275. Best Baby Care with Vaccines Remainder
1276. Android Assist for Lecturer and Student
1277. Android Personal Assistance (PA)
1278. Android Application for College Management System
1279. Tollgate Payment system in android
1280. Intelligence Quotient (IQ) Test
1281. GPS LOCATION ALARM SYSTEM
1282. Location Based Intelligent Mobile Organizer
1283. BANK ACCOUNT TRACKER FOR ANDROID
1284. UNIT CONVERTER
1285. Tips and Tax Calculator in Android
1286. TEXT EDITOR FOR ANDROID
1287. Student Attendance Tracking System
1288. Smart Money With Daily Expenses
1289. Simple And Secure Android TO DO List Application
1290. Restaurant Table Order Management System
1291. Online Shopping
1292. Online Examination System For Android
1293. ANDROID SHOPPING LOCATION IDENTIFIER
1294. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1295. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1296. MICRO CREDIT BANKING ON SMARTPHONE
1297. LOCATION BASED ALARM
1298. Insurance in android
1299. GOOGLE PLACE FINDER
1300. Friend Mapper on Mobiles - Friend Locator
1301. EXPENSE MANAGER
1302. Employee Diractory
1303. Online job search
1304. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1305. ANDROID STUDENT RESULT ANALYZING SYSTEM
1306. CloudMoV : Cloud-based Mobile Social TV
1307. Bus Reservation
1308. Budget Planner
1309. Android SMS Systems
1310. ANDROID LEAVE MANAGEMENT SYSTEM
1311. ANDROID EVENT SCHEDULER/REMINDER
1312. Android Grocery Shopping List
1313. Android Attack Application
1314. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1315. A Mobile Phone Based Medicine In-take Reminder and Monitor


COLLEGE MINI PROJECTS
DOT NET MINI PROJECTS
PHP - MINI PROJECTS
JAVA -MINI PROJECT
PYTHON
1316. HOTEL MANAGEMENT
1317. GYM MANAGEMENT APPLICATION
1318. ONLINE BOOK STORE


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1319. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1320. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
1321. Optimizing Display Advertising Markets
1322. Using Knowledge Libraries to Transfer Expert Knowledge
1323. Semantic Retrieval of Trademarks Based on Conceptual Similarity
1324. Understanding and Predicting Question Subjectivity in Social Question and Answering
1325. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
1326. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
1327. Fast Top-K Path-based Relevance Query on Massive Graphs
1328. Web Image Search Re-ranking with Click-based Similarity and Typicality
1329. Automatically Mining Facets for Queries from Their Search Results
1330. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
1331. Statistical Entity Extraction from Web
1332. Question Answering System for an Effective Collaborative Learning
1333. Lost in Translation: Improving Decoy Documents via Automated Translation
1334. Learn to Personalized Image Search from the Photo Sharing Websites
1335. In Tags We Trust Trust modeling in social tagging of multimedia content
1336. Efficient Anonymous Message Submission
1337. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
1338. Employment Knowledge Database
1339. Organise Corporate Training For Client Project s
1340. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1341. ONLINE VEHICLE SHOWROOM SYSTEMS
1342. Online Voting
1343. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1344. School Management System
1345. Secure Online Course Automation
1346. School Automation System
1347. Online Aquarum
1348. Web Direct Recruitment Analysis
PHP Apps
1349. Project Approval System
1350. Movie Ticket Booking
1351. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1352. TRADE / INDUSTRY WEB PORTAL
1353. Feeding the poor from the supermarket
1354. Application for recording your goals and habits
1355. VISUAL WAY TO RAISE AWARENESS
1356. Municipal Corporation
1357. Online Polling For Publishers And Brands
1358. Avoid Food Wastage
1359. Web Doctor
1360. ONLINE FOOD ORDERING SYSTEM
1361. E-Tendering
1362. Improving Rural Communities
1363. Green Planet Awarness
1364. Development of an Online Course Portal for a campus
1365. Auxon Test
1366. WEB BASED LEARNING SYSTEM
1367. Tagging in online social networks
1368. Secured file Downloading system
1369. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1370. searching a image from websites
1371. Online University
1372. Online product Opinion and Ranking System
1373. MNC LEAVE MANAGEMENT SYSTEM
1374. Home appliances online purchase
1375. Freelancer Job
1376. E-Tutor Online Jobs
1377. Statistical Entity Extraction from Web
1378. Effective Collaborative Learning
1379. Development of an e-Post Office System
1380. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
1381. Towards Effective Bug Triage with Software Data Reduction Techniques
1382. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
1383. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
1384. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
1385. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
1386. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
1387. Proof of retrievability with public verifiability resilient against related-key attacks
1388. Secure Anonymous Key Distribution Scheme for Smart Grid
1389. Converses For Secret Key Agreement and Secure Computing
1390. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
1391. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
1392. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1393. Privacy Protection based Access Control Scheme in Cloud-based Services
1394. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
1395. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
1396. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1397. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1398. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1399. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1400. Explaining Missing Answers to Top-k SQL Queries
1401. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1402. Continuous Top-k Monitoring on Document Streams
1403. Generating Query Facets using Knowledge Bases
1404. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1405. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1406. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1407. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1408. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1409. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1410. Generating Query Facets using Knowledge Bases
1411. Private Over-threshold Aggregation Protocols over Distributed Datasets
1412. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1413. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1414. Privacy Protection based Access Control Scheme in Cloud-based Services
1415. Dynamic Facet Ordering for Faceted Product Search Engines
1416. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1417. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1418. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1419. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1420. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1421. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1422. A Recommendation System to Facilitate Business Process Modeling
1423. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1424. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1425. User Differentiated Verifiable File Search on the Cloud
1426. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1427. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1428. Incremental Consolidation of Data-Intensive Multi-flows
1429. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1430. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1431. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1432. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1433. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1434. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1435. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1436. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1437. TagBook: A Semantic Video Representation without Supervision for Event Detection
1438. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1439. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1440. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1441. The Impact of Review Environment on Review Credibility
1442. Private Over-threshold Aggregation Protocols over Distributed Datasets
1443. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1444. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1445. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1446. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1447. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1448. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1449. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1450. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1451. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1452. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1453. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1454. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1455. What Is Happening in The Video Annotate Video by Sentence
1456. Two level QR code for private message sharing and document authentication.
1457. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1458. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1459. Mining Health Examination Records A Graph-based Approach
1460. A Credibility Analysis System for Assessing Information on Twitter
1461. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1462. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1463. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1464. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1465. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1466. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1467. Predicting Personalized Image Emotion Perceptions in Social Networks
1468. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1469. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1470. Explaining Missing Answers to Top-k SQL Queries
1471. Bilevel Feature Extraction Based Text Mining
1472. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1473. Privacy-Preserving Outsourced Media Search
1474. Modeling and Verification of Online Shopping Business Processes
1475. User Preference Learning for Online Social Recommendation
1476. Steganalysis Features for Content-Adaptive JPEG Steganography
1477. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1478. PiCode: a New Picture-Embedding 2D Barcode
1479. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1480. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1481. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1482. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1483. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1484. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1485. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1486. Cloud workflow scheduling with deadlines and time slot availability
1487. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1488. Path-Based Epidemic Spreading in Networks
1489. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1490. On the Resiliency of Static Forwarding Tables
1491. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1492. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1493. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1494. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1495. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1496. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1497. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1498. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1499. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1500. Hacking is not random: a case-control study of webser ver-compromise risk
1501. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1502. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1503. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1504. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1505. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1506. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1507. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1508. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1509. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1510. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1511. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1512. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1513. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1514. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1515. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1516. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1517. Cross-Domain Feature Learning in Multimedia
1518. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1519. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1520. Saliency-based color accessibility
1521. Contextual Online Learning for Multimedia Content Aggregation
1522. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1523. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1524. An Attribute-assisted Reranking Model for Web Image Search
1525. RRW - A Robust and Reversible Watermarking
1526. Steganography Using Reversible Texture Synthesis
1527. Single Image Super-Resolution Based on Gradient Profile Sharpness
1528. Detection and Rectification of Distorted Fingerprints
1529. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1530. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1531. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1532. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1533. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1534. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1535. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1536. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1537. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1538. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1539. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1540. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1541. Authenticated Key Exchange Protocols for Parallel Network File Systems
1542. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1543. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1544. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1545. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1546. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1547. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1548. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1549. Context-based Diversification for Keyword Queries over XML Data
1550. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1551. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1552. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1553. Tweet Segmentation and Its Application to Named Entity Recognition
1554. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1555. Automatic Group Happiness Intensity Analysis
1556. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1557. Query Aware Determinization of Uncertain Objects
1558. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1559. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1560. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1561. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1562. Efficient Community Formation for Web Services
1563. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1564. Secure Mining of Association Rules in Hor izontally Distributed Databases
1565. Dynamic Query Forms for Database Queries
1566. Secure kNN Query Processing in Untrusted Cloud Environments
1567. An Empirical Performance Evaluation of Relational Keyword Search Systems
1568. Keyword Query Routing
1569. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1570. Demand Bidding Program and Its Application in Hotel Energy Management
1571. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1572. Incremental Detection of Inconsistencies in Distributed Data
1573. A Cocktail Approach for Travel Package Recommendation
1574. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1575. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1576. Analysis of Field Data on Web Security Vulnerabilities
1577. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1578. A Reliability Improvement Method for SOA-Based Applications
1579. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1580. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1581. Web Service Recommendation via Exploiting Location and QoS Information
1582. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1583. Exploiting Rateless Codes in Cloud Storage Systems
1584. COMIC:Cost Optimization for Internet Content Multihoming
1585. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1586. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1587. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1588. Uniform Embedding for Efficient JPEG Steganography
1589. Secure Deduplication with Efficient and Reliable Convergent Key Management
1590. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1591. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1592. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1593. Location Aware Keyword Query Suggestion Based on Document Proximity
1594. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1595. A secure data self-destructing scheme in cloud computing
1596. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1597. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1598. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1599. Secure kNN Query Processing in Untrusted Cloud Environments
1600. Exploiting Rateless Codes in Cloud Storage Systems
1601. Fuzzy Authorization for Cloud Storage
1602. Planning vs. dynamic control Resource allocation in corporate clouds
1603. Automatic Scaling of Internet Applications for Cloud Computing Services
1604. Strategy-proof Pricing for Cloud Service Composition
1605. Privacy Preserving Delegated Access Control in Public Clouds
1606. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1607. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1608. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1609. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1610. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1611. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1612. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1613. A Scientometric Analysis of Cloud Computing Literature
1614. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1615. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1616. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1617. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1618. FeatureMatch: A General ANNF Estimation Technique and its Applications
1619. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1620. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1621. As-Projective-As-Possible Image Stitching with Moving DLT
1622. Sharing Visual Secrets in Single Image Random Dot Stereograms
1623. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1624. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1625. A New Iterative Triclass Thresholding Technique in Image Segmentation
1626. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1627. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1628. An Iranian License Plate Recognition System Based on Color Features
1629. Learning Layouts for Single-Page Graphic Designs
1630. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1631. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1632. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1633. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1634. Fingerprint Compression Based on Sparse Representation
1635. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1636. LBP-Based Edge-Texture Features for Object Recoginition
1637. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1638. Toward Experiential Mobile Media Processing
1639. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1640. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1641. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1642. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1643. Designing Truthful Spectrum Double Auctions with Local Markets
1644. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1645. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1646. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1647. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1648. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1649. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1650. A Study on Clinical Prediction Using Data Mining Techniques
1651. Online Payment System using Steganography and Visual Cryptography
1652. Efficient Instant-Fuzzy Search with Proximity Ranking
1653. Attribute Based Encryption with Privacy Preserving In Clouds
1654. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1655. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1656. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1657. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1658. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1659. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1660. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1661. The Target Tracking in Mobile Sensor Networks
1662. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1663. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1664. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1665. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1666. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1667. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1668. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1669. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1670. SUSIE: Search Using Services and Information Extraction
1671. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1672. Secure Mining of Association Rules in Horizontally Distributed Databases
1673. Sampling Online Social Networks
1674. Privacy Preserving Delegated Access Control in Public Clouds
1675. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1676. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1677. Ginix : Generalized Inverted Index for Keyword Search
1678. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1679. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1680. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1681. Dynamic Query Forms for Database Queries
1682. Cost-Based Optimization of Service Compositions
1683. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1684. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1685. Automatic Extraction of Top-k Lists from the Web
1686. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1687. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1688. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1689. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1690. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1691. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1692. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1693. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1694. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1695. Privacy Preserving Data Sharing With Anonymous ID Assignment
1696. Non-Cooperative Location Privacy
1697. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1698. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1699. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1700. Cloud based emails boundaries and vulnerabilities
1701. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1702. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1703. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1704. Optimal Content Downloading in Vehicular Networks
1705. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1706. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1707. View-invariant action recognition based on Artificial Neural Networks
1708. User-aware Image Tag Refinement via Ternary Semantic Analysis
1709. Separable Reversible Data Hiding in Encrypted Image
1710. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1711. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1712. Robust Face-Name Graph Matching for Movie Character Identification
1713. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1714. Improving Color Constancy by Photometric Edge Weighting
1715. Exploring the design space of social network-based Sybil defenses
1716. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1717. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1718. AnnoSearch: Image Auto-Annotation by Search
1719. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1720. Scalable Scheduling of Updates in Streaming Data Warehouses
1721. Scalable Learning of Collective Behavior
1722. Ranking Model Adaptation for Domain-Specific Search
1723. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1724. Outsourced Similarity Search on Metric Data Assets
1725. Organizing User Search Histories
1726. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1727. Mining Web Graphs for Recommendations
1728. Joint Top K Spatial Keyword Query Processing
1729. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1730. Identifying Content for Planned Events Across Social Media Sites
1731. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1732. Generative Models for Item Adoptions Using Social Correlation
1733. Efficient Data Mining for XML Queries Answering Support
1734. Efficient audit service outsourcing for data integrity in clouds
1735. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1736. Effective Pattern Discovery for Text Mining
1737. Combined Mining: Discovering Informative Knowledge in Complex Data
1738. Decentralized Probabilistic Text Clustering
1739. Computing Structural Statistics by Keywords in Databases
1740. Bridging Social and Data Networks
1741. Answering General Time-Sensitive Queries
1742. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1743. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1744. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1745. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1746. Resource-Aware Application State Monitoring
1747. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1748. Query Access Assurance in Outsourced Databases
1749. Linear and Differential Cryptanalysis
1750. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1751. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1752. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1753. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1754. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1755. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1756. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1757. ROAuth: Recommendation Based Open Authorization
1758. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1759. Recommendation Models for Open Authorization
1760. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1761. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1762. On Privacy of Encrypted Speech Communications
1763. OAuth Web Authorization Protocol
1764. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1765. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1766. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1767. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1768. Fast Matrix Embedding by Matrix Extending
1769. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1770. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1771. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1772. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1773. Measuring Code Quality to Improve Specification Mining
1774. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1775. Towards Secure and Dependable Storage Services in Cloud Computing
1776. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1777. Remote Display Solutions for Mobile Cloud Computing
1778. Privacy Preserving Delegated Access Control in Public Clouds
1779. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1780. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1781. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1782. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1783. Load-Balancing Multipath Switching System with Flow Slice
1784. Assessing the Veracity of Identity Assertions via OSNs
1785. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1786. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1787. A New Cell-Counting-Based Attack Against Tor
1788. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1789. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1790. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1791. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1792. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1793. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1794. Fast Release Capture Sampling in Large-Scale Sensor Networks
1795. Cooperative download in vehicular environments
1796. Cooperative Data Dissemination via Roadside WLANs
1797. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1798. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1799. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1800. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1801. Hiding Sensitive Association Rule for Privacy Preservation
1802. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1803. Development of Certificate Authority Services for Web Applications
1804. Detecting and Validating Sybil Groups in theWild
1805. Association Rule Extracting Knowledge Using Market Basket Analysis
1806. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1807. Valuable Detours: Least-Cost Anypath Routing
1808. Self-Reconfigurable Wireless Mesh Networks
1809. Reliability in Layered Networks with Random Link Failures
1810. NABS:Novel Approaches for Biometric Systems
1811. Live Streaming with Receiver-based Peer-division Multiplexing
1812. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1813. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1814. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1815. Virtualized Screen: A Third Element for CloudMobile Convergence
1816. Steganographic Embedding in JPEG Images with Visual Criterion
1817. On the Typical Statistic Features for Image Blind Steganalysis
1818. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1819. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1820. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1821. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1822. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1823. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1824. Vulnerability Analysis in SOA-Based Business Processes
1825. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1826. Service-Centric Framework for a Digital Government Application
1827. Server-Side Streaming Processing of WS-Security
1828. OWLPath: An OWL Ontology-Guided Query Editor
1829. Monitoring Service Systems from a Language-Action Perspective
1830. Extracting Product Features and Sentiments from Chinese Customer Reviews
1831. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1832. Automated Certification for Compliant Cloud-based Business Processes
1833. Addressing Dependability throughout the SOA Life Cycle
1834. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1835. The Geometric Efficient Matching Algorithm for Firewalls
1836. Secure Service-Oriented Architecture for Mobile Transactions
1837. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1838. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1839. Privacy-Preserving Updates to Anonymous and Confidential Databases
1840. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1841. IPAS: Implicit Password Authentication System
1842. Improving Security and Performance in the Tor Network through Tunable Path Selection
1843. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1844. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1845. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1846. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1847. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1848. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1849. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1850. Data Delivery Properties of Human Contact Networks
1851. Converge-Cast: On the Capacity and Delay Tradeoffs
1852. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1853. USHER: Improving Data Quality with Dynamic Forms
1854. The World in a Nutshell: Concise Range Queries
1855. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1856. Scalable Scheduling of Updates in Streaming Data Warehouses
1857. Scalable Learning of Collective Behavior
1858. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1859. Publishing Search Logs A Comparative Study of Privacy Guarantees
1860. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1861. Optimal Service Pricing for a Cloud Cache
1862. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1863. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1864. Mining Web Graphs for Recommendations
1865. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1866. Integration of Sound Signature Authentication System
1867. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1868. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1869. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1870. Exploring Application-Level Semantics for Data Compression
1871. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1872. Data Leakage Detection
1873. Cost-aware rank join with random and sorted access
1874. Collaborative Filtering with Personalized Skylines
1875. Bridging Socially-Enhanced Virtual Communities
1876. Automatic Discovery of Personal Name Aliases from the Web
1877. A Personalized Ontology Model for Web Information Gathering
1878. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1879. A Query Formulation Language for the Data Web
1880. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1881. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1882. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1883. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1884. Towards Secure and Dependable Storage Services in Cloud Computing
1885. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1886. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1887. Data Integrity Proofs in Cloud Storage
1888. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1889. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1890. Feature-level Sentiment Analysis for Chinese Product Reviews
1891. Equal-sized Cells Mean Equal-sized Packets in Tor?
1892. Customer Relationship Management Based on Data Mining Technique
1893. Authentication Schemes for Session Passwords using Color and Images
1894. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1895. Online Trends Management Service in It Industry
1896. Session Management System in It Industry
1897. Tools for Non IT Expert Developer
ERP PROJECTS
1898. New Company Policy Clearance System
1899. Recommend To Friend
1900. Consultanting About the Foreign Peoples
1901. Performance System Analysis In Industry
1902. Non It People Performance
MODERN AGRICULTURE
1903. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1904. Agriculture Marketing in Generation
1905. Agriculture Assist
1906. Sponsor For Agriculture
SPORTS
1907. Play Ground Booking
OUR MODERN SOCITY
1908. ADHAR VOTING SYSTEM
1909. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1910. RAILWAY SEAT RESERVATION SYSTEM
1911. Railway Management Service
1912. It Park Media
1913. Automation Transport Maintance
1914. Yell Help For Children
1915. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1916. Apartment Maintenance
1917. Power Consumption Monitoring House Hold Electronic Device
1918. Direct Q Less Reservation System in train
Advance Health Care System
1919. MAC Sensing Protocol
1920. World Wide Cloud Inter Hospital Acess Health Care System
1921. Live Doctor
Dotnet Apps
1922. TELEVISION CHANNEL PROGRAM MANAGEMENT
1923. WIN THE TRUST OF AN INDIAN CONSUMER
1924. ONLINE ACCOUNT MANAGEMENT
1925. SMART CAB BOOKING SYSTEM
1926. ONLINE FAST FOOD ORDER
1927. Travel Mate Add Module
1928. Work Order System Call Centre
1929. SPORTS MANAGEMENT SYSTEM
1930. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1931. Pick-It Courier Service
1932. Online Taxi Booking
1933. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1934. INCOMETAX MAINTAINANCE SYSTEM
1935. Hotel Reservation
1936. ERP System
1937. Bug Tracking System
1938. Vendor Information System For Shiping
1939. Top-K ranking System
1940. Secure Medical Image Archive System
1941. Business Activity Coordination Using Web Services
1942. Management Portal
1943. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1944. Secure Data Filtering Recommendation System
1945. Online Resources Sharing via Social Networks
1946. Secure self-destructing in Cloud Computing
1947. Web Resourecs File Authorization Management
1948. Click based image re-ranking system
1949. Tree Structure Data Analiysis Mining
1950. Web Resource Allocation for CorPerate
1951. Web Vulnerabilities and Security
1952. Fuzzy Cloud Search Using XML
1953. Cloud Data Supporting Secure Query Search
1954. Tour Recommender Systems on Web
1955. Distributed Interactive Web Applications
1956. Secure Query Processing for Cloud
1957. Online Data Storage with less pricing
1958. Cost Based Web Content Managemnts
1959. Web Hospital Management
1960. Online Data storage with low price
1961. Secure Online Data Block Authorization
1962. Profitable Onlin web Server System
1963. Online Economies File Manager for Multi Keying
1964. Online Community Management
1965. Key based Online Data Managements
1966. Critical Workflow Management for Web Documents
1967. Secure Online Documents Managements for Group Sharing
1968. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1969. Online Marketing Automation System
1970. Internal organization change management System
1971. Secure confirmation of sensitive transaction data in modern Internet banking services
1972. Privacy security with TPA in cloud computing
1973. Company Information Tracking System
1974. Online Virtualized screen Processing
1975. Web Service for Airline Management
1976. Web Social Club
1977. Quantum Key Cryptography
1978. Patient Data Management Based On Hospital Location
1979. Online Software Developer Community
1980. Online Developed Software sales
1981. Avoid repeated measurements On Genetics Dataset
1982. College Lab Maintenance System
1983. Industrial Manpower Resource Organizer
1984. Web Query Construction and Search on Complex Data
1985. Hospital Emergency Data Management
1986. Data confidentiality On Health-care Information System
1987. Secure Online Trading
1988. Fast Real-Time Event Alert Using social Network
1989. Secure E-Mail Organizer
1990. Web User Service Management System
1991. Easy SQL Query for Non-IT Manager
1992. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1993. Customer Relationship Management (CRM) on Banking
1994. Online Company ERP System
1995. Constructing E-Tourism
1996. Web based Multi Service Ranking System
1997. Dynamic Customer Data Hiding in Banking
1998. Online Distributed Social Clubs
1999. Virtual Shopping with Negative Feedback Reputation Systems
2000. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
2001. Web Service Oriented Query Authentication Technique
2002. Web Based Customer Favorite vehicle Search Engine
2003. Web Based Book Publishing System
2004. Virtual Energy- Based Encryption and Keying
2005. Video Fraud Detecting On social Network
2006. Video Compression with Data hiding & Data Extraction
2007. Vendor Information System for Shipping
2008. VALUE ADDED TAX (VAT)
2009. Universal Smart Card
2010. Ultimate Location Information Systems
2011. Top K Ranking System
2012. Techno Task Manager
2013. Supply Chain Management
2014. Substitution-Permutation cryptanalysis System
2015. Streaming Data Warehouse Updations
2016. Step by Step Monitoring for Product Purchasing System
2017. Steganography for Data Reading and Writing AVI files
2018. SQL TUNER
2019. SMS Transaction Security
2020. Session Authentication Passwords using Color
2021. Service Availability Guarantees on Virtual Economy
2022. Server Fraud Detection on Cloud
2023. Sentence Based Search on Cloud
2024. Semantic Web Search Engines
2025. Secured Image communicator
2026. Secure smart application on web application
2027. Secure Service-Oriented Smartcard systems
2028. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
2029. Secure Location Identification System
2030. Secure and Cloud Based Patient Information Systems
2031. Reduce the Password Guessing Attacks using Click Point
2032. Recommendation System Based on Graph
2033. Quantum Key Cryptography
2034. Quality Controller
2035. Public Web Status Monitoring System
2036. Project Trade Pool
2037. Product Marketing Analysis On Public Opinion
2038. Predicting Users Behaviors Using Web Mining
2039. Personal Health Information on M-Healthcare Emergency
2040. Optimum Online Knowledge Base
2041. Online Training Program
2042. Online Time sensitive queries
2043. Online Tag Based Image Retrieval and Effective Management
2044. Online Social networks controls using cloud
2045. Online Rental System
2046. Online product Opinion and Ranking System
2047. Online Dynamic form creation for Non-IT Peoples
2048. Online Digital Contract Signing in Mistrusted Parities
2049. Online Aventure
2050. Online Shopping
2051. News Ticker Project
2052. Net Bank in Recharge
2053. Multi User Public Auditing System of Data Storage Security
2054. Multi Location Networked Mobile Auto Intimates
2055. Modern Distributed Business Applications for Supply Chain Management
2056. Market Intelligence Based Public Sentiment Analysis
2057. Leave Management System
2058. Joint processing of spatial keyword queries
2059. Intelligence Missing Items in Shopping Cart
2060. Information Leak Detection and Prevention
2061. Industrial Manpower Resource Organizer
2062. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
2063. Human Expertise Search Engine
2064. Home appliances online Purchase
2065. High Secure Corporate Web Search Engine
2066. High Degree Patient Privacy on Secure Data Outsourcing
2067. Group Movement Pattern Discovery
2068. Graph Based Share Market Data Updating
2069. Generic Business Portal
2070. Flight Booking Portal
2071. Firewall using Packet Filtering
2072. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
2073. Ethical and Social issues in File sharing system
2074. Enterprener Sales Report Management
2075. Encyclopedia for Computer Science
2076. Employee Based Performance Monitoring and Action Systems
2077. Emerging Patient Health Information Exchange System On Cloud
2078. Efficient Search on Outsourced data using Cloud
2079. Efficient and Secure Data Processing on Queries Similarity
2080. Distributed Database Optimization on HealthCare
2081. Digital Asset Management Systems (DAMS) Using Watermarking
2082. Detecting Fraud on Vehicle Insurance System
2083. Defeating Lazy Servers Database Vs Query Access Assurance
2084. Data Processing for Disease-Treatment Relations
2085. Data Mining Analysis on EB bill system
2086. Data confidential against untrusted servers using attribute-based encryption (ABE)
2087. Data Aggregation using SQL clustering
2088. Customer Sales Analysis System Based On Purchasing
2089. Cryptography on Personal confidential information
2090. Cost Based Secure Cloud Data Systems
2091. Market Based Analysis for consumer correct decision
2092. Construction Company Work Order System
2093. Complete Medical Transcription System(Mts)
2094. Company Security Reporting System(CSRS)
2095. College Result Analysis
2096. Cloud Economic Benefit On Scientific Computing
2097. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
2098. Centralized Event Planer across Social Media Sites
2099. Call Center Management
2100. A Reservation-Based Coordination Protocol for Web Services
2101. Building construction and cost estimation
2102. Budget Planner
2103. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
2104. Automatically identifying query groups on Web Search Engine
2105. Auditing Data integrity and data storage using cloud
2106. Application layer blocker for preventing on cyber security
2107. Advanced One-Click User Web Search Engine
2108. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
2109. VALUE ADDED TAX (VAT)
2110. User Oriented Network Attacks
2111. Secure Back Up
2112. Screen Capture And Mouse I/O
2113. Sales Bill Printing System using Excel
2114. Password Security
2115. Online User Mobile Rating
2116. Online Sensex Graph System
2117. Online Book Publishing
2118. NEWS TICKER PROJECT
2119. Multi Storage file
2120. Message Chating
2121. Medical Equipment in WAP
2122. Login Authentication Scheme
2123. Information Alert System
2124. Image Encryption And Decryption
2125. Generic Business Portal
2126. Flight Booking Portal
2127. File Transfer using Cryptography Techniques
2128. File Splitting
2129. Excel Format in Report
2130. EB Management System
2131. Dynamic Web Form Creation
2132. Android Image Search


Struts Application Projects
Struts Apps
2133. Public Sentiment Analysis with Online Shopping Using Struts
2134. Modern distributed business for supply-chain management
2135. High Confidential Personal Disease Reporting System
2136. Distributor Sensitive Data Management Using Struts
2137. Development of Certificate Authority Services for Web Applications
2138. Access Control on User-To-User Interactions in Social Networks


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2139. Sponsor For Agriculture
2140. Agriculture Assist
2141. Agriculture Marketing in Generation
2142. International Plant Import and Export
MODERN EDUCATION SYSTEM
2143. Old In Gold
2144. I School
2145. College Placement And Events
2146. Rural Area Educational Trouble Shooter
2147. Web Direct Recruitment Analysis
2148. Online Aquarum
2149. School Automation System
2150. Secure Online Course Automation
2151. Session Management System in It Industry
2152. Tools for Non IT Expert Developer
2153. Students Skills With Modern Industries
MODERN TECHNOLOGY
2154. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2155. Customer Favarate Greeting Card Design
2156. GPS Transport Packers and Movers
2157. House Hold Appliancies Warranty Management
2158. Direct Q Less Reservation System in train
2159. Power Consumption Monitoring House Hold Electronic Device
2160. Apartment Maintenance
2161. Budget Home Design
2162. Online Buy And Sale Software
2163. Online Softskills Tracks
2164. Gps Consumers Complients
2165. Economic Usage of Solar Energy
Advance Health Care System
2166. Organizing medical camp for public health development
2167. LIVE WEB DOCTOR CONSULTATION
2168. World Wide Cloud Inter Hospital Acess Health Care System
2169. MAC Sensing Protocol
2170. Medical Record Authentication
2171. Raw Requried Online Medicine
2172. Consumer Legal Advicer
2173. Homeopathy Health Record
SPORTS
2174. Play Ground Booking
2175. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2176. Cloud Storage Public Digital Certificate
ERP PROJECTS
2177. Corporate Trouble Shooter
2178. Entrepreneur Fault Analysis
2179. Organise Corporate Training For Client Projects
2180. Employment Knowledge Database
2181. GPS Employee Tracking System
2182. Non It People Performance
2183. Performance System Analysis In Industry
2184. Consultanting About the Foreign Peoples
2185. Recommend To Friend
2186. New Company Policy Clearance System
2187. ERP System (Enterprint Resource Plan
2188. Software Requirements Analysis for Client Side
2189. Select Your Age(Business Motivation all age group)
2190. Engnering Lab Maintenance
2191. Corporate Event Organisation
LATEST BANKING
2192. EyeBank Management System
2193. Advanced Banking System
OUR MODERN SOCIETY
2194. Trained Volunteers Create A Successful Social Campaign
2195. Finger thump Based Shopping Cart
2196. Railway Management Service
2197. Create a Successful Anti- Nuclear Campaign
2198. Crowding Funding Mobilization
2199. People Power of India
2200. Pets Care
2201. Feature in Best Potitical Leader in India
2202. Yell Help For Children
2203. Automation Transport Maintance
2204. It Park Media
2205. Online Painting Auction
2206. Election Commission Management
2207. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2208. ANDROID APPS FOR INSURANCE SYSTEM
2209. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2210. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2211. ANDROID APPS FOR DOCTOR APPOINTMENT
2212. LIVE WEB DOCTOR CONSULTATION
2213. ANDROID APPS ON DOCTOR WITH NURSE
2214. HOSPITAL ANDROID APPS
2215. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2216. Fertilizer Management System -Java, JSP, MySQL
2217. Land Bank for Nursery -Java, JSP, MySQL
2218. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2219. FORMER APPS - ANDROID
2220. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2221. Online Banking with Fraud Detecting- Java JSP, MySQL
2222. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2223. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2224. Big Scholarly Data: A Survey
2225. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Whatsapp : 09566137117
Support : 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved
o