Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) NEW TECHNOLOGY-HELP VIDEO BLOCK CHAIN TECH - BITCOIN
R - DATA SCIENCE - ML WEKA-Machine Learning Internet of things (IoT) BIG DATA - HADOOP PROJECTS
BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB PhD Projects JOBS CONSULTANCY - SOFT SKILLS
JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID
ANDOROID JSON PHP ANDROID APPS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects ASP.NET MVC Framework JAVA IEEE LATEST JAVA IEEE 2016-17
Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects
IEEE 2011-2012 Java Project Dot Net IEEE 2017-18 ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18
RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects
IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects Java Application Projects
Dotnet Application Projects Dotnet Mini Projects Struts Application Projects Java Mini Projects
SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS
BANKING PROJECTS RESTful Web services
 
PYTHON PROJECT - IEEE
PYTHON APPLICATION
1. MULTIMEDIA CONTENT PROTECTION
2. Student Performance Analysis - PYTHON
3. HOTEL MANAGEMENT
4. DATA MINING ON SOCIAL MEDIA SENTIMENT
IMAGE PROCESSING
5. Currency Recognition System
PYTHON TRAINING WITH PROJECT
6. Linear Regression Algorithm
7. A Machine Learning Approach to Routing
8. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
9. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
10. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
11. CYBER SECURITY
12. Automatic Sentiment Detection in Naturalistic Audio
13. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
14. Student Performance Analysis - PYTHON
15. E-assessment using image processing in ∞Exams
16. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
17. NLP - NATURAL LANGUAGE PROCESSING
18. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
19. Image Based Appraisal of Real Estate Properties-IEEE 2017
20. FOOD WASTE ORGANIZER
21. PYTHON PROJECT FLOW
22. PYTHON PROGRAM EXECUTION
23. PYTHON INSTALLATION


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
24. Speech Recognition in Social Care - NLP
25. Text-to-Speech (TTS)- NLP
26. Voice Scheduler - NLP
27. VOICE SEARCH ENGINE - NLP
28. LINEAR REGRESSION - PYTHON
29. LATENT DIRICHLET ALLOCATION
30. DIGITAL IMAGE PROCESSING - PYTHON
31. DECISION TREE LEARNING - ALGORITHM
32. NAIVE BAYES CLASSIFIER
33. K - MEANS CLUSTERING
34. Dengu Data Analysis Using R-program
35. Shopping Data set Analyse Using R Machine Learning
36. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
37. Polynomial Time Algorithm-PTA
38. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
39. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
40. K-Means For Clustering


NEW TECHNOLOGY-HELP VIDEO
IEEE PROJECT LIST
41. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
42. NAIVE BAYES CLASSIFIER
43. K - MEANS CLUSTERING
44. LINEAR REGRESSION - PYTHON
45. LATENT DIRICHLET ALLOCATION
46. DIGITAL IMAGE PROCESSING - PYTHON
47. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
48. MACHINE LEARNING-ML ALGORITHM
49. WHAT IS MACHINE LEARNING - AI
50. NATURAL LANGAUAGE PROCESSING - NLP
51. VISION - Visual Data


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
52. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
53. R - ADVANCE IMAGE PROCESSING
54. Dengu Data Analysis Using R-program
55. Shopping Data set Analysis Using R Machine Learning
56. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
57. R PROGRAM TRAINING
58. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
59. COMAPRISON OF VARIOUS DOCKING SCORES
60. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
61. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
62. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
63. MICRO ARRAY GENE EXPRESSION ANALYSIS
64. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
65. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
66. Diabetics Dataset
67. Excercise Dataset
68. MEDICAL DATA ANALYSES
69. WEKA PRIVACY DATA SET ANALYSES


Internet of things (IoT)
IoT Projects
70. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
71. Who Moved My Data? Privacy Protection in Smartphones
72. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
73. IOT Projects
74. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
75. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
76. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
77. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
78. MRSIM: Mitigating Reducer Skew In MapReduce
79. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
80. HADOOP WITH HEALTHCARE DATA ANALYSYS
81. HADOOP WEBLOG DATA ANALYSES
82. BANK DATA ANALYTIC WITH HADOOP
83. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
84. Bucket Based Data Deduplication Technique for Big Data Storage System
85. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
86. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
87. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
88. Efficient Recommendation of De-identification Policies using MapReduce
89. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
90. Big Scholarly Data: A Survey
91. SocialQ&A: An Online Social Network Based Question and Answer System
92. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
93. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
94. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
95. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
96. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
97. User-Centric Similarity Search
98. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
99. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
100. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
101. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
102. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
103. Processing Incomplete k Nearest Neighbor Search
104. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
105. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
106. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
107. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
108. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
109. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
110. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
111. Deduplication on Encrypted Big Data in Cloud
112. Dynamic Resource Allocation for MapReduce with Partitioning Skew
113. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
114. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
115. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
116. Self-Healing in Mobile Networks with Big Data
117. Secure Sensitive Data Sharing on a Big Data Platform
118. Big Data, Big Knowledge: Big Data for Personalized Healthcare
119. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
120. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
121. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
122. Differentially Private Frequent Itemset Mining via Transaction Splitting
123. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
124. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
125. Fast Best-Effort Pattern Matching in Large Attributed Graphs


PhD Projects
Developing PhD proposal
126. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
127. Diabetics Dataset
128. MEDICAL DATA ANALYSES
129. R IEEE PROJECTS
130. PhD Project Guidance
131. PhD Projects


JOBS CONSULTANCY - SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
132. E-assessment using image processing in ∞Exams
133. NLP - NATURAL LANGUAGE PROCESSING
134. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
135. Dengu Data Analysis Using R-program
136. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
137. Big Scholarly Data: A Survey
138. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
139. Big Data, Big Knowledge Big Data for Personalized Healthcare
140. Deduplication on Encrypted Big Data in Cloud
141. Secure Sensitive Data Sharing on a Big Data Platform
142. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
143. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
144. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
145. Self-Healing in Mobile Networks with Big Data
146. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
147. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
148. Child Monitoring - ANDROID APPS
149. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
150. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
151. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
152. Developing Apps for visually imapired people: Lessons learned from social network
153. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
154. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
155. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
156. Design of secure location and message sharing system for android platform
157. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
158. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
159. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
160. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
161. Privacy Protection based Access Control Scheme in Cloud-based Services
162. Privacy-Preserving Selective Aggregation of Online User Behavior Data
163. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
164. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
165. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
166. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
167. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
168. Who Moved My Data? Privacy Protection in Smartphones
169. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
170. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
171. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
172. Privacy-Preserving Aggregate Queries for Optimal Location Selection
173. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
174. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
175. Efficient Clue-based Route Search on Road Networks
176. Privacy-Preserving Location-Proximity for Mobile Apps
177. Cooperative Query Answer Authentication
178. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
179. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
180. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
181. ZapDroid: Managing Infrequently Used Applications on Smartphones
182. Searching Trajectories by Regions of Interest
183. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
184. A Classroom Scheduling Service for Smart Classes
185. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
186. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
187. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
188. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
189. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
190. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
191. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
192. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
193. Authentication of Smartphone Users Using Behavioral Biometrics
194. An Exploration of Geographic Authentication Schemes
195. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
196. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
197. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
198. Distributed secret sharing approach with cheater prevention
199. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
200. Efficient privacy preserving location based query over outsourced encrypted data
201. Utilizing the Cloud to Store Hijacked Camera Images
202. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
203. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
204. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
205. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
206. Enabling privacy preserving location proof for mobile users.
207. Optimizing User Experience in Choosing Android Applications
208. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
209. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
210. FoodForCare: An Android Application for Self-Care with Healthy Food
211. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
212. Silence is Golden: Enhancing Privacy of Location-Based Services
213. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
214. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
215. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
216. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
217. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
218. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
219. Adapting to User Interest Drift for POI Recommendation
220. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
221. Developing Apps for visually imapired people: Lessons learned from social network
222. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
223. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
224. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
225. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
226. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
227. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
228. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
229. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
230. Mobile cloud support for semantic enriched speech recognition in social care
231. Distributing secret sharing approach with cheater prevention based on QR code
232. Design of Secure Location and Message Sharing System for Android Platform
233. The impact of cloud technology on the automation of businesses
234. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
235. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
236. Rescue Management System
237. Android Army - Military Apps
238. Android Beauty Parlor
239. Android E Municipality
240. ANDROID NURSE AID
241. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
242. Human Resource (HR)- APPS
243. GPS Employee Tracking System
OUR MODERN SOCITY
244. RECYCLE APP WASTE COLLECTION REUSE
245. Bikes Rental - APPS
246. Location Based Alarm - GPS
247. ANDROID APPS FOR INSURANCE SYSTEM
248. BUDGET HOME DESIGN -ANDROID APPS
249. Former To Former Apps
250. Pets Care
ONLINE CONSUMERS PROCESSING
251. House Hold Appliancies Warranty Management
252. GPS Transport Packers and Movers
Android Apps
253. MY LIBRARY
254. FACULTY RATING SYSTEM
255. App for self organizer
256. ONLINE DOCTOR APPOINTMENT
257. Conference Event Mobile Assistant
258. Mobile Prescription
259. Metastore Application
260. Android SmartCampus
261. Android Shopping Mall
262. TOLL GATE -Barcode Billing System --ANDROID
263. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
264. Taste Hunt For Restaurants
265. POLICE APPS
266. Android Blood Bank
267. Mobile Expense Claim System Android
268. Android Intelligent Time Tracking System TICK
269. Android Course and Attendance Management System
270. Android Event Reminder
271. Android Attendance Assessment
272. Android Advance Shopping
273. Android CAR POOLING
274. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
275. Android HOSPITAL
276. ATHLETE MEET GUIDE
277. Android Apps PARKING MANAGER
278. Love and Care
279. Food Waste Management System
280. Travel Guide
281. Android Provisional Store
282. Best Baby Care with Vaccines Remainder
283. Android Assist for Lecturer and Student
284. Android Personal Assistance (PA)
285. Android Application for College Management System
286. Tollgate Payment system in android
287. Intelligence Quotient (IQ) Test
288. GPS LOCATION ALARM SYSTEM
289. Location Based Intelligent Mobile Organizer
290. BANK ACCOUNT TRACKER FOR ANDROID
291. UNIT CONVERTER
292. Tips and Tax Calculator in Android
293. TEXT EDITOR FOR ANDROID
294. Student Attendance Tracking System
295. Smart Money With Daily Expenses
296. Simple And Secure Android TO DO List Application
297. Restaurant Table Order Management System
298. Online Shopping
299. Online Examination System For Android
300. ANDROID SHOPPING LOCATION IDENTIFIER
301. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
302. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
303. MICRO CREDIT BANKING ON SMARTPHONE
304. LOCATION BASED ALARM
305. Insurance in android
306. GOOGLE PLACE FINDER
307. Friend Mapper on Mobiles - Friend Locator
308. EXPENSE MANAGER
309. Employee Diractory
310. Online job search
311. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
312. ANDROID STUDENT RESULT ANALYZING SYSTEM
313. CloudMoV : Cloud-based Mobile Social TV
314. Bus Reservation
315. Budget Planner
316. Android SMS Systems
317. ANDROID LEAVE MANAGEMENT SYSTEM
318. ANDROID EVENT SCHEDULER/REMINDER
319. Android Grocery Shopping List
320. Android Attack Application
321. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
322. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
323. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
324. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
325. Optimizing Display Advertising Markets
326. Using Knowledge Libraries to Transfer Expert Knowledge
327. Semantic Retrieval of Trademarks Based on Conceptual Similarity
328. Understanding and Predicting Question Subjectivity in Social Question and Answering
329. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
330. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
331. Fast Top-K Path-based Relevance Query on Massive Graphs
332. Web Image Search Re-ranking with Click-based Similarity and Typicality
333. Automatically Mining Facets for Queries from Their Search Results
334. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
335. Statistical Entity Extraction from Web
336. Question Answering System for an Effective Collaborative Learning
337. Lost in Translation: Improving Decoy Documents via Automated Translation
338. Learn to Personalized Image Search from the Photo Sharing Websites
339. In Tags We Trust Trust modeling in social tagging of multimedia content
340. Efficient Anonymous Message Submission
341. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
342. Employment Knowledge Database
343. Organise Corporate Training For Client Project s
344. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
345. ONLINE VEHICLE SHOWROOM SYSTEMS
346. Online Voting
347. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
348. School Management System
349. Secure Online Course Automation
350. School Automation System
351. Online Aquarum
352. Web Direct Recruitment Analysis
PHP Apps
353. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
354. TRADE / INDUSTRY WEB PORTAL
355. Feeding the poor from the supermarket
356. Application for recording your goals and habits
357. VISUAL WAY TO RAISE AWARENESS
358. Municipal Corporation
359. Online Polling For Publishers And Brands
360. Avoid Food Wastage
361. Web Doctor
362. ONLINE FOOD ORDERING SYSTEM
363. E-Tendering
364. Improving Rural Communities
365. Green Planet Awarness
366. Development of an Online Course Portal for a campus
367. Auxon Test
368. WEB BASED LEARNING SYSTEM
369. Tagging in online social networks
370. Secured file Downloading system
371. Cryptonite : A Secure and Performant Data Repository on Public Clouds
372. searching a image from websites
373. Online University
374. Online product Opinion and Ranking System
375. MNC LEAVE MANAGEMENT SYSTEM
376. Home appliances online purchase
377. Freelancer Job
378. E-Tutor Online Jobs
379. Statistical Entity Extraction from Web
380. Effective Collaborative Learning
381. Development of an e-Post Office System
382. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
383. Towards Effective Bug Triage with Software Data Reduction Techniques
384. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
385. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
386. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
387. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
388. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
389. Proof of retrievability with public verifiability resilient against related-key attacks
390. Secure Anonymous Key Distribution Scheme for Smart Grid
391. Converses For Secret Key Agreement and Secure Computing
392. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


JAVA IEEE LATEST
IEEE Transactions on Big Data
393. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
394. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
395. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
Services Computing
396. Two Layer Clustering model for Mobile Customer Analysis
397. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
398. Consumer oriented web services ranking and classification
399. Resource renting for periodical cloud workflow applications
IEEE Transactions on Security Computing
400. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
401. QoS Recommendation in Cloud Services
402. Securing Aggregate Queries for DNA Databases
403. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
404. A robust reputation management mechanism in the federated cloud
405. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
406. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
407. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
408. Energy-efficient Query Processing in Web Search Engines
409. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
410. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
411. BiRank: Towards Ranking on Bipartite Graphs
412. QoS Recommendation in Cloud Services
413. Public Interest Analysis Based on Implicit Feedback of IPTV Users
414. Search Rank Fraud and Malware Detection in Google Play
415. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
416. Influence Maximization in Trajectory Databases
417. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
418. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
419. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
420. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
421. Computing Semantic Similarity of Concepts in Knowledge Graphs
422. QDA: A Query-Driven Approach to Entity Resolution
423. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
424. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
425. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
426. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
427. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
428. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
429. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
430. Two-Factor Data Security Protection Mechanism for Cloud Storage System
431. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
432. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
433. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
434. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
435. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
436. Where You Are Is Who You Are User Identification by Matching Statistics
437. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
438. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
439. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
440. Online Subgraph Skyline Analysis Over Knowledge Graphs
441. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
442. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
443. ID2S Password-Authenticated Key Exchange Protocols
444. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
445. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
446. Classification model to predict the learners' academic performance using big data
447. Electronic Commerce Meets the Semantic Web
448. Mining High Utility Patterns in One Phase without Generating Candidates
449. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
450. Automatic Generation of Social Event Storyboard from Image Click-through Data
451. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
452. Understanding Deep Representations Learned in Modeling Users Likes
453. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
454. Topic-Oriented Exploratory Search Based on an Indexing Network
455. Relevance Feedback Algorithms Inspired By Quantum Detection
456. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
457. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
458. Efficiently Estimating Statistics of Points of Interests on Maps
459. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
460. Aspect-level Influence Discovery from Graphs
461. Sentiment Embeddings with Applications to Sentiment Analysis
462. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
463. Resolving Multi-party Privacy Conflicts in Social Media
464. Encrypted Data Management with Deduplication in Cloud Computing
465. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
466. Crawling Hidden Objects with kNN Queries
467. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
468. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
469. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
470. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
471. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
472. Nearest Keyword Set Search in Multi-dimensional Datasets
473. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
474. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
475. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
476. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
477. Immutable Authentication and Integrity Schemes for Outsourced Databases
478. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
479. Server-Aided Public Key Encryption with Keyword Search
480. Online Learning in Large-Scale Contextual Recommender Systems
481. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
482. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
483. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
484. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
485. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
486. Multi-Modal Event Topic Model for Social Event Analysis
487. Social friend recommendation on multiple network correlation
488. Tag Based Image Search by Social Re-ranking
489. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
490. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
491. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
492. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
493. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
494. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
495. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
496. Rank-Based Similarity Search: Reducing the Dimensional Dependence
497. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
498. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
499. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
500. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
501. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
502. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
503. On the Security of data access control for multiauthority cloud storage system
504. Trust-based Service Management for Social Internet of Things Systems
505. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
506. Formalization and Verification of Group Behavior Interactions
507. Group Key Agreement with Local Connectivity
508. Data Lineage in Malicious Environments
509. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
510. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
511. Enabling Cloud Storage Auditing with Key-Exposure Resistance
512. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
513. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
514. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
515. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
516. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
517. Quantitative Reasoning About Cloud Security Using Service Level Agreements
518. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
519. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
520. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
521. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
522. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
523. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
524. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
525. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
526. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
527. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
528. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
529. Enabling Cloud Storage Auditing with Key-Exposure Resistance
530. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
531. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
532. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
533. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
534. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
535. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
536. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
537. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
538. Secure Auditing and Deduplicating Data in Cloud
539. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
540. Towards reproducibility in online social network Research
541. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
542. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
543. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
544. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
545. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
546. Making Digital Artifacts on the Web Verifiable and Reliable
547. Anonymizing Collections of Tree-Structured Data
548. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
549. FOCS: Fast Overlapped Community Search
550. Sparsity Learning Formulations for Mining Time-Varying Data
551. The Impact of View Histories on Edit Recommendations
552. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
553. Discovery of Ranking Fraud for Mobile Apps
554. Towards Effective Bug Triage with Software Data Reduction Techniques
555. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
556. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
557. Auditing for Distributed Storage Systems
558. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
559. Uploader Intent for Online Video: Typology, Inference and Applications
560. YouTube Video Promotion by Cross-network
561. Semantic-Improved Color Imaging Applications: It Is All About Context
562. Geolocalized Modeling for Dish Recognition
563. Learning to Rank Image Tags with Limited Training Examples
564. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
565. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
566. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
567. Tracking Temporal Community Strength in Dynamic Networks
568. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
569. Towards Information Diffusion in Mobile Social Networks
570. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
571. An Efficient Privacy-Preserving Ranked Keyword Search Method
572. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
573. Dispersing Instant Social Video Service Across Multiple Clouds
574. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
575. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
576. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
577. A Computational Dynamic Trust Model for User Authorization
578. Secure Distributed Deduplication Systems with Improved Reliability
579. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
580. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
581. Leveraging the Tail Time for Saving Energy in Cellular Networks
582. Keylogging-resistant Visual Authentication Protocols
583. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
584. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
585. Preserving Location Privacy in Geo-Social Applications
586. Efficient Authentication for Mobile and Pervasive Computing
587. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
588. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
589. Typicality-Based Collaborative Filtering Recommendation
590. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
591. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
592. Keyword Search Over Probabilistic RDF Graphs
593. Efficient Prediction of Difficult Keyword Queries over Databases
594. Interpreting the Public Sentiment Variations on Twitter
595. An Efficient Recommendation Method for Improving Business Process Modeling
596. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
597. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
598. On the use of Side Information for Mining Text Data
599. Privacy Preserving and Content Protecting Location based Queries
600. Fast Nearest Neighbor Search with Keywords
601. Towards Differential Query Services in Cost-Efficient Clouds
602. Facilitating Document Annotation using Content and Querying Value
603. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
604. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
605. Secure Outsourced Attribute-Based Signatures
606. Supporting Privacy Protection in Personalized Web Search
607. Dealing With Concept Drifts in Process Mining
608. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
609. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
610. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
611. Active Learning of Constraints for Semi-Supervised Clustering
612. Best Keyword Cover Search
613. Personalized Recommendation Combining User Interest and Social Circle
614. Online Feature Selection and Its Applications
615. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
616. Incremental Affinity Propagation Clustering Based on Message Passing
617. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
618. Secure kNN Query Processing in Untrusted Cloud Environments
619. Malware Propagation in Large-Scale Networks
620. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
621. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
622. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
623. Efficient Ranking on Entity Graphs with Personalized Relationships
624. Task Trail: An Effective Segmentation of User Search Behavior
625. Privacy-Preserving Enhanced Collaborative Tagging
626. XSPath Navigation on XML Schemas Made Easy
627. Security Evaluation of Pattern Classifiers under Attack
628. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
629. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
630. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
631. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
632. Nothing is for Free: Security in Searching Shared and Encrypted Data
633. SocialTube: P2P-assisted Video Sharing in Online Social Networks
634. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
635. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
636. Behavioral Malware Detection in Delay Tolerant Networks
637. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
638. Private Searching on Streaming Data Based on Keyword Frequency
639. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
640. On the Security of Trustee-Based Social Authentications
641. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
642. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
643. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
644. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
645. A Two-stage Deanonymization Attack Against Anonymized Social Networks
646. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
647. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
648. Scalable architecture for multi-user encrypted SQL operations on cloud database services
649. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
650. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
651. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
652. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
653. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
654. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
655. Secure kNN Query Processing in Untrusted Cloud Environments
656. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
657. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
658. A Hybrid Cloud Approach for Secure Authorized Deduplication
659. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
660. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
661. A Novel Model for Competition and Cooperation Among Cloud Providers
662. CLOUDQUAL: A Quality Model for Cloud Services
663. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
664. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
665. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
666. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
667. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
668. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
669. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
670. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
671. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
672. Enhanced Security for Association Rule Mining to secure Transactional Databases
673. Operational Pattern Revealing Technique in Text Mining
674. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
675. Personalized web search using Browsing history and domain Knowledge
676. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
677. Data Security the Challenge of Cloud Computing
678. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
679. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
680. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
681. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
682. User Action Interpretation for Online Content Optimization
683. Spatial Query Integrity with Voronoi Neighbors
684. Spatial Approximate String Search
685. Sensitive Label Privacy Protection on Social Network Data
686. Secure Mining of Association Rules in Horizontally Distributed Databases
687. Secure Logging As a Service Delegating Log Management to the Cloud
688. Robust Module-based Data Management
689. Ranking on Data Manifold with Sink Points
690. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
691. Privacy-Enhanced Web Service Composition
692. Privacy against Aggregate Knowledge Attacks
693. Preventing Private Information Inference Attacks on Social Networks
694. PMSE: A Personalized Mobile Search Engine
695. Personalized QoS-Aware Web Service Recommendation and Visualization
696. Optimal Client-Server Assignment for Internet Distributed Systems
697. Online Search and Buying Behaviour in Consumer Markets
698. M-Privacy for Collaborative Data Publishing
699. Mining User Queries with Markov Chains: Application to Online Image Retrieval
700. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
701. Incentive Compatible Privacy-Preserving Data Analysis
702. Improving Security and Efficiency in Attribute-Based Data Sharing
703. FoCUS: Learning to Crawl Web Forums
704. Fast Nearest Neighbor Search with Keywords
705. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
706. Facilitating Effective User Navigation through Website Structure Improvement
707. Facilitating Document Annotation using Content and Querying Value
708. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
709. Efficient Evaluation of SUM Queries over Probabilistic Data*
710. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
711. Dynamic Query Forms for Database Queries
712. Dynamic Personalized Recommendation on Sparse Data
713. Distributed Strategies for Mining Outliers in Large Data Sets
714. Crowdsourcing Predictors of Behavioral Outcomes
715. Co-Occurrence-Based Diffusion for Expert Search on the Web
716. Comparable Entity Mining from Comparative Questions
717. CloudMoV: Cloud-based Mobile Social TV
718. Anomaly Detection via Online Oversampling Principal Component Analysis
719. Anomaly Detection Approach Using Hidden Markov Model
720. Annotating Search Results from Web Databases
721. A System to Filter Unwanted Messages from OSN User Walls
722. A Survey of XML Tree Patterns
723. A Probabilistic Approach to String Transformation
724. A New Algorithm for Inferring User Search Goals with Feedback Sessions
725. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
726. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
727. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
728. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
729. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
730. Towards Differential Query Services in Cost-Efficient Clouds
731. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
732. SocialTube: P2P-assisted Video Sharing in Online Social Networks
733. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
734. QoS Ranking Prediction for Cloud Services
735. Priority-Based Consolidation of Parallel Workloads in the Cloud
736. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
737. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
738. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
739. Load Rebalancing for Distributed File Systems in Clouds
740. Label-Embedding for Attribute-Based Classification
741. IP-Geolocation Mapping for Moderately Connected Internet Regions
742. Identity-Based Secure Distributed Data Storage Schemes
743. Hint-based Execution of Workloads in Clouds with Nefeli
744. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
745. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
746. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
747. Efficient Two-Server Password-Only Authenticated Key Exchange
748. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
749. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
750. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
751. Winds of Change: From Vendor Lock-In to the Meta Cloud
752. Supporting the Migration of Applications to the Cloud through a Decision Support System
753. Storing Shared Data on the Cloud via Security-Mediator
754. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
755. Privacy-Preserving Public Auditing for Secure Cloud Storage
756. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
757. Outsourcing Privacy-Preserving Social Networks to a Cloud
758. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
759. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
760. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
761. Efficient Security Solution for Privacy-Preserving Cloud Services
762. Collaboration in Multicloud Computing Environments: Framework and Security Issues
763. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
764. Cloud-based DDoS Attacks and Defenses
765. Cloud computing for mobile users can offloading compution save energy
766. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
767. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
768. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
769. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
770. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
771. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
772. Two tales of privacy in online social networks
773. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
774. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
775. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
776. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
777. Security and Privacy-Enhancing Multicloud Architectures
778. Security Using Colors and Armstrong Numbers
779. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
780. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
781. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
782. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
783. Privacy Preserving Data Analytics for Smart Homes
784. On Inference-Proof View Processing of XML Documents
785. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
786. Extracting Spread-Spectrum Hidden Data from Digital Media
787. Efficiently Outsourcing Multiparty Computation under Multiple Keys
788. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
789. Craigslist Scams and Community Composition: Investigating Online Fraud
790. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
791. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
792. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
793. Super-Resolution-based Inpainting
794. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
795. Image Authentication Using Stochastic Diffusion
796. Hierarchical Super-Resolution-Based Inpainting
797. Circular Reranking for Visual Search
798. Bootstrapping Visual Categorization With Relevant Negatives
799. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
800. An extended visual cryptography scheme without pixel expansion for halftone images
801. An Adaptive Cloud Downloading Service
NETWORKING
802. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
803. Topological Conditions for In-Network Stabilization of Dynamical Systems
804. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
805. Price Differentiation for Communication Networks
806. Participatory Privacy: Enabling Privacy in Participatory Sensing
807. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
808. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
809. On the Role of Mobility for Multi-message Gossip
810. Fully Anonymous Profile Matching in Mobile Social Networks
811. Fault Node Recovery Algorithm for a Wireless Sensor Network
812. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
813. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
814. Access Policy Consolidation for Event Processing Systems
815. A Fast Re-Route Method
SOFTWARE ENGINEERING
816. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
817. Vampire attacks: Draining life from wireless ad-hoc sensor networks
818. Towards a Statistical Framework for Source Anonymity in Sensor Networks
819. Search Me If You Can: Privacy-preserving Location Query Service
820. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
821. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
822. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
823. Distributed Cooperative Caching in Social Wireless Networks
824. Community-Aware Opportunistic Routing in Mobile Social Networks
825. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
826. The Devils Behind Web Application Vulnerabilities
827. Security Architecture for Cloud Networking
828. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
829. Secure Overlay Cloud Storage with Access Control and Assured Deletion
830. Risk-Aware Mitigation for MANET Routing Attacks
831. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
832. Privacy-preserving Enforcement of Spatially Aware RBAC
833. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
834. pCloud: A Distributed System for Practical PIR
835. Packet-Hiding Methods for Preventing Selective Jamming Attacks
836. Online Modeling of Proactive Moderation System for Auction Fraud Detection
837. Fast and accurate annotation of short texts with Wikipedia pages
838. FADE: Secure Overlay Cloud Storage with File Assured Deletion
839. Ensuring Distributed Accountability for Data Sharing in the Cloud
840. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
841. Direct and Indirect Discrimination Prevention Methods
842. Detecting Spam Zombies by Monitoring Outgoing Messages
843. Detecting Anomalous Insiders in Collaborative Information Systems
844. Data-Provenance Verification For Secure Hosts
845. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
846. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
847. Payments for Outsourced Computations
848. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
849. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
850. Toward Private Joins on Outsourced Data
851. Statistical Entity Extraction from Web
852. Slicing: A New Approach to Privacy Preserving Data Publishing
853. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
854. Resilient Identity Crime Detection
855. Ranking Model Adaptation for Domain-Specific Search
856. Organizing User Search Histories
857. On the Spectral Characterization and Scalable Mining of Network Communities
858. Multiparty Access Control for Online Social Networks: Model and Mechanisms
859. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
860. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
861. How do Facebookers use Friendlists
862. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
863. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
864. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
865. Enabling Multilevel Trust in Privacy Preserving Data Mining
866. Enabling cross-site interactions in social networks
867. Efficient Similarity Search over Encrypted Data
868. Efficient Extended Boolean Retrieval
869. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
870. Efficient Anonymous Message Submission
871. Effective Pattern Discovery for Text Mining
872. DDD: A New Ensemble Approach for Dealing with Concept Drift
873. Credibility Ranking of Tweets during High Impact Events
874. Creating Evolving User Behavior Profiles Automatically
875. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
876. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
877. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
878. Anomaly Detection for Discrete Sequences: A Survey
879. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
880. Advance Mining of Temporal High Utility Itemset
881. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
882. Reliable Re-encryption in Unreliable Clouds
883. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
884. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
885. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
886. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
887. Gossip-based Resource Management for Cloud Environments
888. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
889. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
890. Cloud Data Protection for the Masses
891. Cloud Computing Security: From Single to Multi-Clouds
892. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
893. In Tags We Trust Trust modeling in social tagging of multimedia content
894. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
895. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
896. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
897. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
898. Cut Detection in Wireless Sensor Networks
899. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
900. TrickleDNS: Bootstrapping DNS Security using Social Trust
901. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
902. Policy-by-Example for Online Social Networks
903. Packet Loss Control Using Tokens at the Network Edge
904. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
905. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
906. Independent Directed Acyclic Graphs for Resilient Multipath Routing
907. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
908. Game-Theoretic Pricing for Video Streaming in Mobile Networks
909. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
910. Auditing for Network Coding Storage
911. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
912. Privacy Preserving Cloud Data Access With Multi-Authorities
913. Movie Rating and Review Summarization in Mobile Environment
914. IDSaaS: Intrusion Detection System as a Service in Public Clouds
915. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
916. BibPro: A Citation Parser Based on Sequence Alignment Techniques
917. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
918. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
919. RITAS: Services for Randomized Intrusion Tolerance
920. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
921. Nymble: Blocking Misbehaving Users in Anonymizing Networks
922. Modeling and Detection of Camouflaging Worm
923. Coding for Cryptographic Security Enhancement using Stopping Sets
924. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
925. Wireless Sensor Network Security model using Zero Knowledge Protocol
926. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
927. Throughput Optimization in Mobile Backbone Networks
928. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
929. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
930. Fast Data Collection in Tree-Based Wireless Sensor Networks
931. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
932. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
933. SPAF: Stateless FSA-based Packet Filters
934. Selfish Overlay Network Creation and Maintenance
935. ProgME: Towards Programmable Network MEasurement
936. Locating Equivalent Servants over P2P Networks
937. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
938. Buffer Sizing for 802.11 Based Networks
939. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
940. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
941. Improving Utilization of Infrastructure Clouds
942. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
943. CloudTPS: Scalable Transactions for Web Applications in the Cloud
944. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
945. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
946. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
947. Ranking Spatial Data by Quality Preferences
948. Making Aggregation Work in Uncertain and Probabilistic Databases
949. Load Shedding in Mobile Systems with MobiQual
950. Group Enclosing Queries
951. Extended XML Tree Pattern Matching: Theories and Algorithms
952. Effective Navigation of Query Results Based on Concept Hierarchies
953. Discovering Conditional Functional Dependencies
954. Decision Trees for Uncertain Data
955. Data Leakage Detection
956. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
957. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
958. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
959. Privacy Protection based Access Control Scheme in Cloud-based Services
960. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
961. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
962. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
963. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
964. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
965. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
966. Explaining Missing Answers to Top-k SQL Queries
967. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
968. Continuous Top-k Monitoring on Document Streams
969. Generating Query Facets using Knowledge Bases
970. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
971. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
972. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
973. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
974. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
975. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
976. Generating Query Facets using Knowledge Bases
977. Private Over-threshold Aggregation Protocols over Distributed Datasets
978. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
979. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
980. Privacy Protection based Access Control Scheme in Cloud-based Services
981. Dynamic Facet Ordering for Faceted Product Search Engines
982. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
983. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
984. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
985. A Forecasting Methodology for Workload Forecasting in Cloud Systems
986. Optimal Shipping Strategy and Return Service Charge Under No-Reason
987. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
988. A Recommendation System to Facilitate Business Process Modeling
989. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
990. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
991. User Differentiated Verifiable File Search on the Cloud
992. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
993. Statistical Features Based Real-time Detection of Drifted Twitter Spam
994. Incremental Consolidation of Data-Intensive Multi-flows
995. Service Pattern: An Integrated Business Process Model for Modern Service Industry
996. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
997. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
998. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
999. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1000. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1001. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1002. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1003. TagBook: A Semantic Video Representation without Supervision for Event Detection
1004. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1005. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1006. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1007. The Impact of Review Environment on Review Credibility
1008. Private Over-threshold Aggregation Protocols over Distributed Datasets
1009. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1010. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1011. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1012. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1013. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1014. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1015. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1016. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1017. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1018. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1019. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1020. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1021. What Is Happening in The Video Annotate Video by Sentence
1022. Two level QR code for private message sharing and document authentication.
1023. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1024. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1025. Mining Health Examination Records A Graph-based Approach
1026. A Credibility Analysis System for Assessing Information on Twitter
1027. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1028. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1029. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1030. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1031. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1032. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1033. Predicting Personalized Image Emotion Perceptions in Social Networks
1034. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1035. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1036. Explaining Missing Answers to Top-k SQL Queries
1037. Bilevel Feature Extraction Based Text Mining
1038. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1039. Privacy-Preserving Outsourced Media Search
1040. Modeling and Verification of Online Shopping Business Processes
1041. User Preference Learning for Online Social Recommendation
1042. Steganalysis Features for Content-Adaptive JPEG Steganography
1043. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1044. PiCode: a New Picture-Embedding 2D Barcode
1045. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1046. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1047. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1048. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1049. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1050. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1051. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1052. Cloud workflow scheduling with deadlines and time slot availability
1053. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1054. Path-Based Epidemic Spreading in Networks
1055. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1056. On the Resiliency of Static Forwarding Tables
1057. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1058. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1059. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1060. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1061. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1062. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1063. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1064. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1065. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1066. Hacking is not random: a case-control study of webser ver-compromise risk
1067. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1068. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1069. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1070. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1071. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1072. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1073. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1074. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1075. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1076. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1077. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1078. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1079. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1080. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1081. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1082. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1083. Cross-Domain Feature Learning in Multimedia
1084. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1085. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1086. Saliency-based color accessibility
1087. Contextual Online Learning for Multimedia Content Aggregation
1088. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1089. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1090. An Attribute-assisted Reranking Model for Web Image Search
1091. RRW - A Robust and Reversible Watermarking
1092. Steganography Using Reversible Texture Synthesis
1093. Single Image Super-Resolution Based on Gradient Profile Sharpness
1094. Detection and Rectification of Distorted Fingerprints
1095. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1096. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1097. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1098. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1099. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1100. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1101. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1102. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1103. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1104. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1105. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1106. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1107. Authenticated Key Exchange Protocols for Parallel Network File Systems
1108. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1109. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1110. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1111. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1112. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1113. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1114. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1115. Context-based Diversification for Keyword Queries over XML Data
1116. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1117. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1118. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1119. Tweet Segmentation and Its Application to Named Entity Recognition
1120. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1121. Automatic Group Happiness Intensity Analysis
1122. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1123. Query Aware Determinization of Uncertain Objects
1124. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1125. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1126. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1127. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1128. Efficient Community Formation for Web Services
1129. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1130. Secure Mining of Association Rules in Hor izontally Distributed Databases
1131. Dynamic Query Forms for Database Queries
1132. Secure kNN Query Processing in Untrusted Cloud Environments
1133. An Empirical Performance Evaluation of Relational Keyword Search Systems
1134. Keyword Query Routing
1135. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1136. Demand Bidding Program and Its Application in Hotel Energy Management
1137. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1138. Incremental Detection of Inconsistencies in Distributed Data
1139. A Cocktail Approach for Travel Package Recommendation
1140. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1141. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1142. Analysis of Field Data on Web Security Vulnerabilities
1143. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1144. A Reliability Improvement Method for SOA-Based Applications
1145. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1146. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1147. Web Service Recommendation via Exploiting Location and QoS Information
1148. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1149. Exploiting Rateless Codes in Cloud Storage Systems
1150. COMIC:Cost Optimization for Internet Content Multihoming
1151. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1152. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1153. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1154. Uniform Embedding for Efficient JPEG Steganography
1155. Secure Deduplication with Efficient and Reliable Convergent Key Management
1156. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1157. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1158. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1159. Location Aware Keyword Query Suggestion Based on Document Proximity
1160. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1161. A secure data self-destructing scheme in cloud computing
1162. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1163. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1164. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1165. Secure kNN Query Processing in Untrusted Cloud Environments
1166. Exploiting Rateless Codes in Cloud Storage Systems
1167. Fuzzy Authorization for Cloud Storage
1168. Planning vs. dynamic control Resource allocation in corporate clouds
1169. Automatic Scaling of Internet Applications for Cloud Computing Services
1170. Strategy-proof Pricing for Cloud Service Composition
1171. Privacy Preserving Delegated Access Control in Public Clouds
1172. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1173. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1174. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1175. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1176. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1177. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1178. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1179. A Scientometric Analysis of Cloud Computing Literature
1180. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1181. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1182. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1183. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1184. FeatureMatch: A General ANNF Estimation Technique and its Applications
1185. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1186. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1187. As-Projective-As-Possible Image Stitching with Moving DLT
1188. Sharing Visual Secrets in Single Image Random Dot Stereograms
1189. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1190. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1191. A New Iterative Triclass Thresholding Technique in Image Segmentation
1192. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1193. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1194. An Iranian License Plate Recognition System Based on Color Features
1195. Learning Layouts for Single-Page Graphic Designs
1196. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1197. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1198. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1199. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1200. Fingerprint Compression Based on Sparse Representation
1201. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1202. LBP-Based Edge-Texture Features for Object Recoginition
1203. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1204. Toward Experiential Mobile Media Processing
1205. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1206. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1207. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1208. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1209. Designing Truthful Spectrum Double Auctions with Local Markets
1210. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1211. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1212. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1213. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1214. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1215. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1216. A Study on Clinical Prediction Using Data Mining Techniques
1217. Online Payment System using Steganography and Visual Cryptography
1218. Efficient Instant-Fuzzy Search with Proximity Ranking
1219. Attribute Based Encryption with Privacy Preserving In Clouds
1220. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1221. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1222. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1223. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1224. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1225. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1226. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1227. The Target Tracking in Mobile Sensor Networks
1228. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1229. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1230. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1231. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1232. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1233. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1234. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1235. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1236. SUSIE: Search Using Services and Information Extraction
1237. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1238. Secure Mining of Association Rules in Horizontally Distributed Databases
1239. Sampling Online Social Networks
1240. Privacy Preserving Delegated Access Control in Public Clouds
1241. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1242. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1243. Ginix : Generalized Inverted Index for Keyword Search
1244. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1245. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1246. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1247. Dynamic Query Forms for Database Queries
1248. Cost-Based Optimization of Service Compositions
1249. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1250. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1251. Automatic Extraction of Top-k Lists from the Web
1252. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1253. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1254. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1255. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1256. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1257. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1258. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1259. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1260. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1261. Privacy Preserving Data Sharing With Anonymous ID Assignment
1262. Non-Cooperative Location Privacy
1263. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1264. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1265. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1266. Cloud based emails boundaries and vulnerabilities
1267. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1268. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1269. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1270. Optimal Content Downloading in Vehicular Networks
1271. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1272. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1273. View-invariant action recognition based on Artificial Neural Networks
1274. User-aware Image Tag Refinement via Ternary Semantic Analysis
1275. Separable Reversible Data Hiding in Encrypted Image
1276. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1277. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1278. Robust Face-Name Graph Matching for Movie Character Identification
1279. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1280. Improving Color Constancy by Photometric Edge Weighting
1281. Exploring the design space of social network-based Sybil defenses
1282. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1283. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1284. AnnoSearch: Image Auto-Annotation by Search
1285. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1286. Scalable Scheduling of Updates in Streaming Data Warehouses
1287. Scalable Learning of Collective Behavior
1288. Ranking Model Adaptation for Domain-Specific Search
1289. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1290. Outsourced Similarity Search on Metric Data Assets
1291. Organizing User Search Histories
1292. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1293. Mining Web Graphs for Recommendations
1294. Joint Top K Spatial Keyword Query Processing
1295. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1296. Identifying Content for Planned Events Across Social Media Sites
1297. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1298. Generative Models for Item Adoptions Using Social Correlation
1299. Efficient Data Mining for XML Queries Answering Support
1300. Efficient audit service outsourcing for data integrity in clouds
1301. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1302. Effective Pattern Discovery for Text Mining
1303. Combined Mining: Discovering Informative Knowledge in Complex Data
1304. Decentralized Probabilistic Text Clustering
1305. Computing Structural Statistics by Keywords in Databases
1306. Bridging Social and Data Networks
1307. Answering General Time-Sensitive Queries
1308. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1309. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1310. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1311. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1312. Resource-Aware Application State Monitoring
1313. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1314. Query Access Assurance in Outsourced Databases
1315. Linear and Differential Cryptanalysis
1316. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1317. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1318. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1319. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1320. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1321. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1322. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1323. ROAuth: Recommendation Based Open Authorization
1324. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1325. Recommendation Models for Open Authorization
1326. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1327. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1328. On Privacy of Encrypted Speech Communications
1329. OAuth Web Authorization Protocol
1330. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1331. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1332. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1333. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1334. Fast Matrix Embedding by Matrix Extending
1335. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1336. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1337. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1338. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1339. Measuring Code Quality to Improve Specification Mining
1340. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1341. Towards Secure and Dependable Storage Services in Cloud Computing
1342. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1343. Remote Display Solutions for Mobile Cloud Computing
1344. Privacy Preserving Delegated Access Control in Public Clouds
1345. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1346. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1347. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1348. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1349. Load-Balancing Multipath Switching System with Flow Slice
1350. Assessing the Veracity of Identity Assertions via OSNs
1351. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1352. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1353. A New Cell-Counting-Based Attack Against Tor
1354. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1355. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1356. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1357. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1358. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1359. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1360. Fast Release Capture Sampling in Large-Scale Sensor Networks
1361. Cooperative download in vehicular environments
1362. Cooperative Data Dissemination via Roadside WLANs
1363. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1364. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1365. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1366. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1367. Hiding Sensitive Association Rule for Privacy Preservation
1368. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1369. Development of Certificate Authority Services for Web Applications
1370. Detecting and Validating Sybil Groups in theWild
1371. Association Rule Extracting Knowledge Using Market Basket Analysis
1372. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1373. Valuable Detours: Least-Cost Anypath Routing
1374. Self-Reconfigurable Wireless Mesh Networks
1375. Reliability in Layered Networks with Random Link Failures
1376. NABS:Novel Approaches for Biometric Systems
1377. Live Streaming with Receiver-based Peer-division Multiplexing
1378. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1379. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1380. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1381. Virtualized Screen: A Third Element for CloudMobile Convergence
1382. Steganographic Embedding in JPEG Images with Visual Criterion
1383. On the Typical Statistic Features for Image Blind Steganalysis
1384. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1385. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1386. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1387. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1388. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1389. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1390. Vulnerability Analysis in SOA-Based Business Processes
1391. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1392. Service-Centric Framework for a Digital Government Application
1393. Server-Side Streaming Processing of WS-Security
1394. OWLPath: An OWL Ontology-Guided Query Editor
1395. Monitoring Service Systems from a Language-Action Perspective
1396. Extracting Product Features and Sentiments from Chinese Customer Reviews
1397. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1398. Automated Certification for Compliant Cloud-based Business Processes
1399. Addressing Dependability throughout the SOA Life Cycle
1400. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1401. The Geometric Efficient Matching Algorithm for Firewalls
1402. Secure Service-Oriented Architecture for Mobile Transactions
1403. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1404. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1405. Privacy-Preserving Updates to Anonymous and Confidential Databases
1406. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1407. IPAS: Implicit Password Authentication System
1408. Improving Security and Performance in the Tor Network through Tunable Path Selection
1409. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1410. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1411. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1412. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1413. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1414. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1415. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1416. Data Delivery Properties of Human Contact Networks
1417. Converge-Cast: On the Capacity and Delay Tradeoffs
1418. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1419. USHER: Improving Data Quality with Dynamic Forms
1420. The World in a Nutshell: Concise Range Queries
1421. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1422. Scalable Scheduling of Updates in Streaming Data Warehouses
1423. Scalable Learning of Collective Behavior
1424. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1425. Publishing Search Logs A Comparative Study of Privacy Guarantees
1426. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1427. Optimal Service Pricing for a Cloud Cache
1428. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1429. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1430. Mining Web Graphs for Recommendations
1431. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1432. Integration of Sound Signature Authentication System
1433. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1434. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1435. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1436. Exploring Application-Level Semantics for Data Compression
1437. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1438. Data Leakage Detection
1439. Cost-aware rank join with random and sorted access
1440. Collaborative Filtering with Personalized Skylines
1441. Bridging Socially-Enhanced Virtual Communities
1442. Automatic Discovery of Personal Name Aliases from the Web
1443. A Personalized Ontology Model for Web Information Gathering
1444. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1445. A Query Formulation Language for the Data Web
1446. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1447. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1448. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1449. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1450. Towards Secure and Dependable Storage Services in Cloud Computing
1451. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1452. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1453. Data Integrity Proofs in Cloud Storage
1454. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1455. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1456. Feature-level Sentiment Analysis for Chinese Product Reviews
1457. Equal-sized Cells Mean Equal-sized Packets in Tor?
1458. Customer Relationship Management Based on Data Mining Technique
1459. Authentication Schemes for Session Passwords using Color and Images
1460. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1461. Young Talent Tracker
1462. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1463. International Plant Import and Export
OUR MODERN SOCITY
1464. Trained Volunteers Create A Successful Social Campaign
1465. Finger thump Based Shopping Cart
1466. Finger Print E-Voting Systems
1467. Create a Successful Anti- Nuclear Campaign
1468. Crowding Funding Mobilization
1469. People Power of India
1470. Modern Finger Print Voting System
1471. Election Commission Management
1472. Online Painting Auction
1473. Reality Show Ticket Booking System
1474. Online Broadway Motel Food Ordering System
1475. Fashion Studio Model Management
1476. Women's Selfhelp Group
Advance Health Care System
1477. Organizing medical camp for public health development
1478. Homeopathy Health Record
1479. Consumer Legal Advicer
1480. Raw Requried Online Medicine
1481. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1482. I School
1483. Job fair section process
1484. Advertising in E-Book
1485. Students Skills With Modern Industries
1486. College Placement And College Event
1487. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1488. Cloud Storage Public Digital Certificate
ERP PROJECTS
1489. Customer Relationship Management
1490. Corporate Trouble Shooter
1491. Corporate Event Organisation
1492. Engnering Lab Maintenance
1493. Select Your Age(Business Motivation all age group)
1494. Software Requirements Analysis for Client Side
1495. ERP System (Enterprint Resource Plan
LATEST BANKING
1496. User Opinion For Indian Banking Service And Cashless Economy
1497. Advanced Banking System
1498. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1499. Economic Usage of Solar Energy
1500. Gps Consumers Complients
1501. Online Softskills Tracks
1502. Online Buy And Sale Software
1503. Budget Home Design
1504. Online Product Exchange
1505. Jewellery Management
1506. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1507. Moderate Robatics System with Public Opinion
Java Apps
1508. Online overview of skills really used in jobs
1509. Land Bank for Nursery
1510. Developing Rural Economy
1511. ECOPS - Electronics Police Record Management System
1512. Website Evaluation Using Opinion Mining
1513. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1514. INSURANCE MANAGEMENT SYSTEM
1515. e-Fraud Prevention based on the Self- Authentication of e-Documents
1516. Hope Center
1517. Exam crazy
1518. BUGS REPORTING SYSTEM
1519. LOCATION BASED CONSUMER COMPLAINT
1520. Speed Racing
1521. ROADSTER
1522. META CAFE
1523. ONLINE VIDEO LOCKER
1524. Management System in Metro Train
1525. Plant Shopping on Web
1526. Reporting Online Media News Systems
1527. Informative Content Extraction
1528. E-commerce Complaint Management System
1529. Modern Agriculture Development System
1530. Loan Online Application
1531. Rural Community Developement
1532. LOVE AND CARE
1533. GREEN PLANT
1534. Advance Couier Service
1535. Community Awarness
1536. E_Music
1537. Staff Management System
1538. E-TENDERING
1539. Hotel Management
1540. Crime File Management System
1541. Cloud Cyber Attack
1542. Cloud Cost Management for Customer Sensitive Data
1543. Advance Web based Multimedia Answer Generation
1544. Commaunity Awareness
1545. E-Commerce Complaints
1546. Modern Agriculture Development System
1547. Plant Shopping on Web
1548. ONLINE VIDEO LOCKER
1549. ONLINE VIDEO LOCKER
1550. Reporting Online Media News Systems
1551. Online Plant Shopping
1552. Community Awareness
1553. Loan Online Application
1554. Modern Agriculture Development System
1555. Online Digital Library
1556. Geo Base Services
1557. Civil Supplies and Consumer Protection Department
1558. Citizen Opinions vs Government Policies
1559. Protecting Used Data Privacy for Attackers
1560. Web Hospital Management
1561. Easy SQL Query for Non-IT Manager
1562. Online Shopping with Fraud detection
1563. Efficient Spatial Query Processing
1564. Cryptographic Key Exchange Authentication
1565. Online Global Information Service Center
1566. Contracts Business Events Management
1567. Online Secure image Social Networks
1568. Outsourcing of Online Image Reconstruction
1569. Trust based Profile Matching Secure Social Network
1570. Secure and Distance based Online Social Network (OSN)
1571. Efficient Online Image Retrieval System
1572. Data Sharing In Cloud Storage by Using Key-Aggregate
1573. Multicast Key Management for Cloud
1574. Face-to-face contact on Mobile Social Networks
1575. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1576. Dynamically Growing Online Survey for Behavioral Outcomes
1577. Advance Web based Multimedia Answer Generation
1578. College Result Analysis with Horizontally Distributed Databases
1579. Feedback Decision Support for mHealth monitoring
1580. Exchange Secrete Key for Data Producers and Consumers
1581. Efficient Information Retrieval Using Ranked Query (EIRQ)
1582. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1583. Web Hosting On Cloud
1584. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1585. Web Server Security with Web Client Management System
1586. Web Parser on Sequence Alignment Techniques
1587. Web Page re-Ranking System for Library
1588. Web Eye
1589. Voting System for Web Library
1590. VIRTUAL CLASSROOM SYSTEM
1591. Unique Web Resources Utilization Monitoring System
1592. Transport Management System
1593. Pre-paid Recharging System on Banking
1594. Tollgate Management
1595. Time To Time Stock Market Updater and Monitoring System
1596. Sql Tuner
1597. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1598. SMS Based Mobile Banking with Security
1599. Sms Topup
1600. Vendor Information System For Shipping
1601. Sequential Anomaly Detection from User Behaviour
1602. Secure SMS Transaction System on banking
1603. Secure Online Documents Management System in Cloud
1604. Secure File Uploading Server with Advance Protecting System
1605. Secure File Monitoring System on Cloud
1606. Relational Logic Search Engine On Healthcare
1607. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1608. Quick Customer decision support on Web Sales Portal
1609. Query Response System for File Management
1610. Quality Visualization on Web TV
1611. Project Work Tracking System
1612. Product Market Manipulations on Asian stock market
1613. Predicting Top Company Share Based on High Utility Data
1614. Automation of Analysis and Development Management
1615. Pharmacy Information System
1616. Personalize Your News on Web
1617. Online University
1618. Online tagging for multimedia content
1619. Online Search Ranking On Multiple Domain
1620. Online Rental House Web Portal
1621. Online Recruitment System
1622. Online Real Estate Property Management
1623. Online Multi Type Documents Search Engine
1624. ONLINE MOBILE BILLING SYSTEM
1625. Online Jewelry Management
1626. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1627. Online Examination System
1628. Online Ensemble Learning Approach
1629. Online Banking With Fraud Detecting
1630. Online Auction Bit
1631. ONLINE ADVERTISING SYSTEM
1632. Nutraceuticals Management System
1633. Nearest Shopping Location Identification Systems
1634. Multilevel Images Authentication Systems
1635. Multi New Product Survey Management
1636. Movie Recommender Systems via User- Item Subgroups
1637. Movie Rating and Recommendation on Mobile
1638. Modern Municipal Corporation
1639. Mobile TV Quality Management
1640. Mobile Banking WAP
1641. Manifold Entrust Scheme
1642. Management System in Train
1643. Secure Mailing System
1644. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1645. LEAVE MANAGEMENT SYSTEM FOR MNC
1646. Knowledge Based Decision Support System(KMS)
1647. Key Management for Content Integration
1648. Inter Bank Fund Transfer in Distributed Network
1649. Information and Knowledge Extracting from a large amount of data
1650. Industry Standard Authorization For Sensitive Resources
1651. Implementation and Validating Environmental and Health
1652. iKnoweb Extracting and Integrating Entity Information System
1653. HUMAN ASSURANCE ADMINISTRATION
1654. High_level network Security Using Packet Filtering
1655. High and Low Level SQL Query Executor
1656. GLOBAL COUNSELLING SYSTEM
1657. A Game Theory for Online Security
1658. Distributed Transaction Proxy
1659. Freelancer Job
1660. File Security With Multi Database System
1661. FILE SEARCH ENGINE
1662. Fertilizer Management System
1663. Fast Web Information Gathering with Alias Detection
1664. E-Tutor Online Jobs
1665. Enterprise Stock and Accounting System
1666. Ensuring Data Storage Security in Cloud Computing
1667. Encrypted IT Auditing on Cloud Computing
1668. Encrypted Data Storage Vs Data Against illegal Access
1669. Enabling Site Interaction In Social Community
1670. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1671. E-Music world
1672. Employee Resource Management
1673. Employee Management System
1674. E-Learning
1675. E Fraud Prevention based on the Self Authentication of e Documents
1676. Distribution System for Discount Sales
1677. Distributed Data Integration on Electricity Board
1678. Disease Information Hiding on Publishing Healthcare Data
1679. Digital Documents Attestation Systems
1680. Defending Against Web Application Vulnerabilities
1681. Defects Analysis Systems
1682. Data theft detection mobile cloud computing
1683. Data Base Fraud Detection Systems
1684. Customer Information Hiding for Data Mismanagement in Banking
1685. Company Security Reporting System(CSRS)
1686. E -Crime File Management System
1687. Credit Card Management System
1688. Corporate Requirement System
1689. Consumer Sales Online Fake Product Detection and Deletion
1690. Company Information Tracking System
1691. Cloud Policy-Based File Assure Deletion
1692. Cloud Data Theft Attacks
1693. Cloud Cyber Attacks against Social Networks
1694. Cloud Cost Management for Customer Sensitive Data
1695. Client Favorite Photo Search Engine on Web
1696. Citizen Card System
1697. Card Management System
1698. Design &Development of Car Parking and Automation Billing Systems
1699. Customer Care Service
1700. BPO Call Center
1701. Automation of IT Process Management
1702. Modeling and Automated Containment of Worms
1703. Attribute Key Based Data Security System
1704. As Needed Basis Accountability for Cloud Data Sharing
1705. Annotation of short texts With Wikipedia pages
1706. AIRLINE RESERVATION SYSTEM
1707. Advance User Management on Social Website
1708. A Semantic Web Based Scientific News Aggregator


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1709. Online Trends Management Service in It Industry
1710. Session Management System in It Industry
1711. Tools for Non IT Expert Developer
ERP PROJECTS
1712. New Company Policy Clearance System
1713. Recommend To Friend
1714. Consultanting About the Foreign Peoples
1715. Performance System Analysis In Industry
1716. Non It People Performance
MODERN AGRICULTURE
1717. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1718. Agriculture Marketing in Generation
1719. Agriculture Assist
1720. Sponsor For Agriculture
SPORTS
1721. Play Ground Booking
OUR MODERN SOCITY
1722. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1723. RAILWAY SEAT RESERVATION SYSTEM
1724. Railway Management Service
1725. It Park Media
1726. Automation Transport Maintance
1727. Yell Help For Children
1728. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1729. Apartment Maintenance
1730. Power Consumption Monitoring House Hold Electronic Device
1731. Direct Q Less Reservation System in train
Advance Health Care System
1732. MAC Sensing Protocol
1733. World Wide Cloud Inter Hospital Acess Health Care System
1734. Live Doctor
Dotnet Apps
1735. TELEVISION CHANNEL PROGRAM MANAGEMENT
1736. WIN THE TRUST OF AN INDIAN CONSUMER
1737. ONLINE ACCOUNT MANAGEMENT
1738. SMART CAB BOOKING SYSTEM
1739. ONLINE FAST FOOD ORDER
1740. Travel Mate Add Module
1741. Work Order System Call Centre
1742. SPORTS MANAGEMENT SYSTEM
1743. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1744. Pick-It Courier Service
1745. Online Taxi Booking
1746. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1747. INCOMETAX MAINTAINANCE SYSTEM
1748. Hotel Reservation
1749. ERP System
1750. Bug Tracking System
1751. Vendor Information System For Shiping
1752. Top-K ranking System
1753. Secure Medical Image Archive System
1754. Business Activity Coordination Using Web Services
1755. Management Portal
1756. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1757. Secure Data Filtering Recommendation System
1758. Online Resources Sharing via Social Networks
1759. Secure self-destructing in Cloud Computing
1760. Web Resourecs File Authorization Management
1761. Click based image re-ranking system
1762. Tree Structure Data Analiysis Mining
1763. Web Resource Allocation for CorPerate
1764. Web Vulnerabilities and Security
1765. Fuzzy Cloud Search Using XML
1766. Cloud Data Supporting Secure Query Search
1767. Tour Recommender Systems on Web
1768. Distributed Interactive Web Applications
1769. Secure Query Processing for Cloud
1770. Online Data Storage with less pricing
1771. Cost Based Web Content Managemnts
1772. Web Hospital Management
1773. Online Data storage with low price
1774. Secure Online Data Block Authorization
1775. Profitable Onlin web Server System
1776. Online Economies File Manager for Multi Keying
1777. Online Community Management
1778. Key based Online Data Managements
1779. Critical Workflow Management for Web Documents
1780. Secure Online Documents Managements for Group Sharing
1781. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1782. Online Marketing Automation System
1783. Internal organization change management System
1784. Secure confirmation of sensitive transaction data in modern Internet banking services
1785. Privacy security with TPA in cloud computing
1786. Company Information Tracking System
1787. Online Virtualized screen Processing
1788. Web Service for Airline Management
1789. Web Social Club
1790. Quantum Key Cryptography
1791. Patient Data Management Based On Hospital Location
1792. Online Software Developer Community
1793. Online Developed Software sales
1794. Avoid repeated measurements On Genetics Dataset
1795. College Lab Maintenance System
1796. Industrial Manpower Resource Organizer
1797. Web Query Construction and Search on Complex Data
1798. Hospital Emergency Data Management
1799. Data confidentiality On Health-care Information System
1800. Secure Online Trading
1801. Fast Real-Time Event Alert Using social Network
1802. Secure E-Mail Organizer
1803. Web User Service Management System
1804. Easy SQL Query for Non-IT Manager
1805. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1806. Customer Relationship Management (CRM) on Banking
1807. Online Company ERP System
1808. Constructing E-Tourism
1809. Web based Multi Service Ranking System
1810. Dynamic Customer Data Hiding in Banking
1811. Online Distributed Social Clubs
1812. Virtual Shopping with Negative Feedback Reputation Systems
1813. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1814. Web Service Oriented Query Authentication Technique
1815. Web Based Customer Favorite vehicle Search Engine
1816. Web Based Book Publishing System
1817. Virtual Energy- Based Encryption and Keying
1818. Video Fraud Detecting On social Network
1819. Video Compression with Data hiding & Data Extraction
1820. Vendor Information System for Shipping
1821. VALUE ADDED TAX (VAT)
1822. Universal Smart Card
1823. Ultimate Location Information Systems
1824. Top K Ranking System
1825. Techno Task Manager
1826. Supply Chain Management
1827. Substitution-Permutation cryptanalysis System
1828. Streaming Data Warehouse Updations
1829. Step by Step Monitoring for Product Purchasing System
1830. Steganography for Data Reading and Writing AVI files
1831. SQL TUNER
1832. SMS Transaction Security
1833. Session Authentication Passwords using Color
1834. Service Availability Guarantees on Virtual Economy
1835. Server Fraud Detection on Cloud
1836. Sentence Based Search on Cloud
1837. Semantic Web Search Engines
1838. Secured Image communicator
1839. Secure smart application on web application
1840. Secure Service-Oriented Smartcard systems
1841. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1842. Secure Location Identification System
1843. Secure and Cloud Based Patient Information Systems
1844. Reduce the Password Guessing Attacks using Click Point
1845. Recommendation System Based on Graph
1846. Quantum Key Cryptography
1847. Quality Controller
1848. Public Web Status Monitoring System
1849. Project Trade Pool
1850. Product Marketing Analysis On Public Opinion
1851. Predicting Users Behaviors Using Web Mining
1852. Personal Health Information on M-Healthcare Emergency
1853. Optimum Online Knowledge Base
1854. Online Training Program
1855. Online Time sensitive queries
1856. Online Tag Based Image Retrieval and Effective Management
1857. Online Social networks controls using cloud
1858. Online Rental System
1859. Online product Opinion and Ranking System
1860. Online Dynamic form creation for Non-IT Peoples
1861. Online Digital Contract Signing in Mistrusted Parities
1862. Online Aventure
1863. Online Shopping
1864. News Ticker Project
1865. Net Bank in Recharge
1866. Multi User Public Auditing System of Data Storage Security
1867. Multi Location Networked Mobile Auto Intimates
1868. Modern Distributed Business Applications for Supply Chain Management
1869. Market Intelligence Based Public Sentiment Analysis
1870. Leave Management System
1871. Joint processing of spatial keyword queries
1872. Intelligence Missing Items in Shopping Cart
1873. Information Leak Detection and Prevention
1874. Industrial Manpower Resource Organizer
1875. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1876. Human Expertise Search Engine
1877. Home appliances online Purchase
1878. High Secure Corporate Web Search Engine
1879. High Degree Patient Privacy on Secure Data Outsourcing
1880. Group Movement Pattern Discovery
1881. Graph Based Share Market Data Updating
1882. Generic Business Portal
1883. Flight Booking Portal
1884. Firewall using Packet Filtering
1885. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1886. Ethical and Social issues in File sharing system
1887. Enterprener Sales Report Management
1888. Encyclopedia for Computer Science
1889. Employee Based Performance Monitoring and Action Systems
1890. Emerging Patient Health Information Exchange System On Cloud
1891. Efficient Search on Outsourced data using Cloud
1892. Efficient and Secure Data Processing on Queries Similarity
1893. Distributed Database Optimization on HealthCare
1894. Digital Asset Management Systems (DAMS) Using Watermarking
1895. Detecting Fraud on Vehicle Insurance System
1896. Defeating Lazy Servers Database Vs Query Access Assurance
1897. Data Processing for Disease-Treatment Relations
1898. Data Mining Analysis on EB bill system
1899. Data confidential against untrusted servers using attribute-based encryption (ABE)
1900. Data Aggregation using SQL clustering
1901. Customer Sales Analysis System Based On Purchasing
1902. Cryptography on Personal confidential information
1903. Cost Based Secure Cloud Data Systems
1904. Market Based Analysis for consumer correct decision
1905. Construction Company Work Order System
1906. Complete Medical Transcription System(Mts)
1907. Company Security Reporting System(CSRS)
1908. College Result Analysis
1909. Cloud Economic Benefit On Scientific Computing
1910. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1911. Centralized Event Planer across Social Media Sites
1912. Call Center Management
1913. A Reservation-Based Coordination Protocol for Web Services
1914. Building construction and cost estimation
1915. Budget Planner
1916. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1917. Automatically identifying query groups on Web Search Engine
1918. Auditing Data integrity and data storage using cloud
1919. Application layer blocker for preventing on cyber security
1920. Advanced One-Click User Web Search Engine
1921. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
1922. VALUE ADDED TAX (VAT)
1923. User Oriented Network Attacks
1924. Secure Back Up
1925. Screen Capture And Mouse I/O
1926. Sales Bill Printing System using Excel
1927. Password Security
1928. Online User Mobile Rating
1929. Online Sensex Graph System
1930. Online Book Publishing
1931. NEWS TICKER PROJECT
1932. Multi Storage file
1933. Message Chating
1934. Medical Equipment in WAP
1935. Login Authentication Scheme
1936. Information Alert System
1937. Image Encryption And Decryption
1938. Generic Business Portal
1939. Flight Booking Portal
1940. File Transfer using Cryptography Techniques
1941. File Splitting
1942. Excel Format in Report
1943. EB Management System
1944. Dynamic Web Form Creation
1945. Android Image Search


Struts Application Projects
Struts Apps
1946. Public Sentiment Analysis with Online Shopping Using Struts
1947. Modern distributed business for supply-chain management
1948. High Confidential Personal Disease Reporting System
1949. Distributor Sensitive Data Management Using Struts
1950. Development of Certificate Authority Services for Web Applications
1951. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1952. Website Tracking System
1953. Website Ranking System
1954. Treasure Warehouse
1955. Student Information System
1956. Storage security
1957. PRISON MANAGEMENT SYSTEM
1958. E-Licence Investigation System
1959. Online Secure File Transfer System
1960. Online Medicine Purchase
1961. ONLINE EDUCATION
1962. Online Agriculture System
1963. Mobile Survey
1964. ISSUE TRACKING SYSYTEM
1965. HOSPITAL MANAGEMENT SYSYTEMS
1966. HealthCare Management System
1967. Global Employee Acclaimer
1968. E-VOTING FOR ASSOCIATION
1969. Encrypted Register Form
1970. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1971. E INSURANCE
1972. Courier Tracking Systems
1973. corporate Transportation
1974. Collectorate Communication Systems
1975. Budget Approval System
1976. BLOOD BANK MANAGEMENT SYSTEMS
1977. ATTENDANCE MANAGEMENT SYSTEM
1978. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1979. Sponsor For Agriculture
1980. Agriculture Assist
1981. Agriculture Marketing in Generation
1982. International Plant Import and Export
MODERN EDUCATION SYSTEM
1983. Old In Gold
1984. I School
1985. College Placement And Events
1986. Rural Area Educational Trouble Shooter
1987. Web Direct Recruitment Analysis
1988. Online Aquarum
1989. School Automation System
1990. Secure Online Course Automation
1991. Session Management System in It Industry
1992. Tools for Non IT Expert Developer
1993. Students Skills With Modern Industries
MODERN TECHNOLOGY
1994. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1995. Customer Favarate Greeting Card Design
1996. GPS Transport Packers and Movers
1997. House Hold Appliancies Warranty Management
1998. Direct Q Less Reservation System in train
1999. Power Consumption Monitoring House Hold Electronic Device
2000. Apartment Maintenance
2001. Budget Home Design
2002. Online Buy And Sale Software
2003. Online Softskills Tracks
2004. Gps Consumers Complients
2005. Economic Usage of Solar Energy
Advance Health Care System
2006. Organizing medical camp for public health development
2007. LIVE WEB DOCTOR CONSULTATION
2008. World Wide Cloud Inter Hospital Acess Health Care System
2009. MAC Sensing Protocol
2010. Medical Record Authentication
2011. Raw Requried Online Medicine
2012. Consumer Legal Advicer
2013. Homeopathy Health Record
SPORTS
2014. Play Ground Booking
2015. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2016. Cloud Storage Public Digital Certificate
ERP PROJECTS
2017. Corporate Trouble Shooter
2018. Entrepreneur Fault Analysis
2019. Organise Corporate Training For Client Projects
2020. Employment Knowledge Database
2021. GPS Employee Tracking System
2022. Non It People Performance
2023. Performance System Analysis In Industry
2024. Consultanting About the Foreign Peoples
2025. Recommend To Friend
2026. New Company Policy Clearance System
2027. ERP System (Enterprint Resource Plan
2028. Software Requirements Analysis for Client Side
2029. Select Your Age(Business Motivation all age group)
2030. Engnering Lab Maintenance
2031. Corporate Event Organisation
LATEST BANKING
2032. EyeBank Management System
2033. Advanced Banking System
OUR MODERN SOCIETY
2034. Trained Volunteers Create A Successful Social Campaign
2035. Finger thump Based Shopping Cart
2036. Railway Management Service
2037. Create a Successful Anti- Nuclear Campaign
2038. Crowding Funding Mobilization
2039. People Power of India
2040. Pets Care
2041. Feature in Best Potitical Leader in India
2042. Yell Help For Children
2043. Automation Transport Maintance
2044. It Park Media
2045. Online Painting Auction
2046. Election Commission Management
2047. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2048. ANDROID APPS FOR INSURANCE SYSTEM
2049. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2050. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2051. ANDROID APPS FOR DOCTOR APPOINTMENT
2052. LIVE WEB DOCTOR CONSULTATION
2053. ANDROID APPS ON DOCTOR WITH NURSE
2054. HOSPITAL ANDROID APPS
2055. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2056. Fertilizer Management System -Java, JSP, MySQL
2057. Land Bank for Nursery -Java, JSP, MySQL
2058. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2059. FORMER APPS - ANDROID
2060. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2061. Online Banking with Fraud Detecting- Java JSP, MySQL
2062. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2063. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2064. Big Scholarly Data: A Survey
2065. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved