Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
HOT IT SOFT SKILLS PYTHON PROJECT R - DATA SCIENCE - ML BIGDATA- MONGO DB 2017-2018
BIGDATA mongoDB BIG DATA - HADOOP PROJECTS WEKA-Machine Learning MACHINE LEARNING-ML(Data Scientist)
PhD Projects JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17
CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP ANDROID APPS IEEE PHP Projects 2017-18
IEEE PHP Projects PHP Application Projects Dot Net IEEE 2017-18 RAZOR MVC 4 ASP.NET 2017-18
ANGULAR JS , Dot Net IEEE 2016-17 RAZOR MVC 4 ASP.NET ASP.NET MVC Framework
Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects
IEEE 2011-2012 Dotnet Projects Dotnet Application Projects JAVA IEEE 2017-18 JAVA IEEE 2016-17
Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects
IEEE 2011-2012 Java Project Java Application Projects Dotnet Mini Projects Struts Application Projects
Java Mini Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS
AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS Internet of things (IoT) RESTful Web services
 
HOT IT SOFT SKILLS
MEAN: MongoDB, Ember, AngularJS and nodeJS
1. Big Scholarly Data: A Survey
2. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
3. Big Data, Big Knowledge Big Data for Personalized Healthcare
4. Deduplication on Encrypted Big Data in Cloud
5. Secure Sensitive Data Sharing on a Big Data Platform
6. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
7. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
8. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
9. Self-Healing in Mobile Networks with Big Data
10. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
11. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
12. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
13. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
14. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
15. Developing Apps for visually imapired people: Lessons learned from social network
16. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
17. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
18. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
19. Design of secure location and message sharing system for android platform
20. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
21. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
22. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
23. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
24. Privacy Protection based Access Control Scheme in Cloud-based Services
25. Privacy-Preserving Selective Aggregation of Online User Behavior Data
26. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
27. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


PYTHON PROJECT
PYTHON TRAINING WITH PROJECT
28. PYTHON PROJECT FLOW
29. PYTHON PROGRAM EXECUTION
30. PYTHON INSTALLATION


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
31. R PROGRAM TRAINING
32. R IEEE PROJECTS


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
33. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
34. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
35. Efficient Recommendation of De-identification Policies using MapReduce
36. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
37. Big Scholarly Data: A Survey
38. SocialQ&A: An Online Social Network Based Question and Answer System
39. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
40. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
41. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
42. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
43. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
44. User-Centric Similarity Search
45. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
46. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
47. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
48. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
49. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
50. Processing Incomplete k Nearest Neighbor Search
51. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
52. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
53. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
54. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
55. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
56. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
57. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
58. Deduplication on Encrypted Big Data in Cloud
59. Dynamic Resource Allocation for MapReduce with Partitioning Skew
60. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
61. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
62. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
63. Self-Healing in Mobile Networks with Big Data
64. Secure Sensitive Data Sharing on a Big Data Platform
65. Big Data, Big Knowledge: Big Data for Personalized Healthcare
66. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
67. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
68. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
69. Differentially Private Frequent Itemset Mining via Transaction Splitting
70. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
71. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
72. Fast Best-Effort Pattern Matching in Large Attributed Graphs


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
73. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
74. MRSIM: Mitigating Reducer Skew In MapReduce
75. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
76. HADOOP WITH HEALTHCARE DATA ANALYSYS
77. HADOOP WEBLOG DATA ANALYSES
78. BANK DATA ANALYTIC WITH HADOOP
79. HADOOP TRAINING


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
80. Diabetics Dataset
81. Excercise Dataset
82. MEDICAL DATA ANALYSES
83. WEKA PRIVACY DATA SET ANALYSES


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
84. Polynomial Time Algorithm-PTA
85. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
86. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
87. K-Means For Clustering


PhD Projects
Developing PhD proposal
88. PhD Project Guidance
89. PhD Projects


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
90. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
91. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
92. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
93. Privacy-Preserving Location-Proximity for Mobile Apps
94. Cooperative Query Answer Authentication
95. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
96. ZapDroid: Managing Infrequently Used Applications on Smartphones
97. Searching Trajectories by Regions of Interest
98. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
99. A Classroom Scheduling Service for Smart Classes
100. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
101. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
102. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
103. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
104. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
105. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
106. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
107. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
108. Authentication of Smartphone Users Using Behavioral Biometrics
109. An Exploration of Geographic Authentication Schemes
110. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
111. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
112. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
113. Distributed secret sharing approach with cheater prevention
114. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
115. Efficient privacy preserving location based query over outsourced encrypted data
116. Utilizing the Cloud to Store Hijacked Camera Images
117. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
118. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
119. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
120. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
121. Enabling privacy preserving location proof for mobile users.
122. Optimizing User Experience in Choosing Android Applications
123. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
124. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
125. FoodForCare: An Android Application for Self-Care with Healthy Food
126. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
127. Silence is Golden: Enhancing Privacy of Location-Based Services
128. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
129. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
130. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
131. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
132. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
133. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
134. Adapting to User Interest Drift for POI Recommendation
135. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
136. Developing Apps for visually imapired people: Lessons learned from social network
137. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
138. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
139. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
140. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
141. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
142. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
143. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
144. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
145. Mobile cloud support for semantic enriched speech recognition in social care
146. Distributing secret sharing approach with cheater prevention based on QR code
147. Design of Secure Location and Message Sharing System for Android Platform
148. The impact of cloud technology on the automation of businesses
149. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
150. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
151. Rescue Management System
152. Android Army - Military Apps
153. Android Beauty Parlor
154. Android E Municipality
155. ANDROID NURSE AID
156. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
157. GPS Employee Tracking System
OUR MODERN SOCITY
158. ANDROID APPS FOR INSURANCE SYSTEM
159. BUDGET HOME DESIGN -ANDROID APPS
160. Former To Former Apps
161. Pets Care
ONLINE CONSUMERS PROCESSING
162. House Hold Appliancies Warranty Management
163. GPS Transport Packers and Movers
Android Apps
164. MY LIBRARY
165. FACULTY RATING SYSTEM
166. App for self organizer
167. ONLINE DOCTOR APPOINTMENT
168. Conference Event Mobile Assistant
169. Mobile Prescription
170. Metastore Application
171. Android SmartCampus
172. Android Shopping Mall
173. TOLL GATE -Barcode Billing System --ANDROID
174. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
175. Taste Hunt For Restaurants
176. POLICE APPS
177. Android Blood Bank
178. Mobile Expense Claim System Android
179. Android Intelligent Time Tracking System TICK
180. Android Course and Attendance Management System
181. Android Event Reminder
182. Android Attendance Assessment
183. Android Advance Shopping
184. Android CAR POOLING
185. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
186. Android HOSPITAL
187. ATHLETE MEET GUIDE
188. Android Apps PARKING MANAGER
189. Love and Care
190. Food Waste Management System
191. Travel Guide
192. Android Provisional Store
193. Best Baby Care with Vaccines Remainder
194. Android Assist for Lecturer and Student
195. Android Personal Assistance (PA)
196. Android Application for College Management System
197. Tollgate Payment system in android
198. Intelligence Quotient (IQ) Test
199. GPS LOCATION ALARM SYSTEM
200. Location Based Intelligent Mobile Organizer
201. BANK ACCOUNT TRACKER FOR ANDROID
202. UNIT CONVERTER
203. Tips and Tax Calculator in Android
204. TEXT EDITOR FOR ANDROID
205. Student Attendance Tracking System
206. Smart Money With Daily Expenses
207. Simple And Secure Android TO DO List Application
208. Restaurant Table Order Management System
209. Online Shopping
210. Online Examination System For Android
211. ANDROID SHOPPING LOCATION IDENTIFIER
212. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
213. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
214. MICRO CREDIT BANKING ON SMARTPHONE
215. LOCATION BASED ALARM
216. Insurance in android
217. GOOGLE PLACE FINDER
218. Friend Mapper on Mobiles - Friend Locator
219. EXPENSE MANAGER
220. Employee Diractory
221. Online job search
222. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
223. ANDROID STUDENT RESULT ANALYZING SYSTEM
224. CloudMoV : Cloud-based Mobile Social TV
225. Bus Reservation
226. Budget Planner
227. Android SMS Systems
228. ANDROID LEAVE MANAGEMENT SYSTEM
229. ANDROID EVENT SCHEDULER/REMINDER
230. Android Grocery Shopping List
231. Android Attack Application
232. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
233. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
234. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
235. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
236. Optimizing Display Advertising Markets
237. Using Knowledge Libraries to Transfer Expert Knowledge
238. Semantic Retrieval of Trademarks Based on Conceptual Similarity
239. Understanding and Predicting Question Subjectivity in Social Question and Answering
240. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
241. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
242. Fast Top-K Path-based Relevance Query on Massive Graphs
243. Web Image Search Re-ranking with Click-based Similarity and Typicality
244. Automatically Mining Facets for Queries from Their Search Results
245. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
246. Statistical Entity Extraction from Web
247. Question Answering System for an Effective Collaborative Learning
248. Lost in Translation: Improving Decoy Documents via Automated Translation
249. Learn to Personalized Image Search from the Photo Sharing Websites
250. In Tags We Trust Trust modeling in social tagging of multimedia content
251. Efficient Anonymous Message Submission
252. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
253. Employment Knowledge Database
254. Organise Corporate Training For Client Project s
255. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
256. ONLINE VEHICLE SHOWROOM SYSTEMS
257. Online Voting
258. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
259. School Management System
260. Secure Online Course Automation
261. School Automation System
262. Online Aquarum
263. Web Direct Recruitment Analysis
PHP Apps
264. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
265. TRADE / INDUSTRY WEB PORTAL
266. Feeding the poor from the supermarket
267. Application for recording your goals and habits
268. VISUAL WAY TO RAISE AWARENESS
269. Municipal Corporation
270. Online Polling For Publishers And Brands
271. Avoid Food Wastage
272. Web Doctor
273. ONLINE FOOD ORDERING SYSTEM
274. E-Tendering
275. Improving Rural Communities
276. Green Planet Awarness
277. Development of an Online Course Portal for a campus
278. Auxon Test
279. WEB BASED LEARNING SYSTEM
280. Tagging in online social networks
281. Secured file Downloading system
282. Cryptonite : A Secure and Performant Data Repository on Public Clouds
283. searching a image from websites
284. Online University
285. Online product Opinion and Ranking System
286. MNC LEAVE MANAGEMENT SYSTEM
287. Home appliances online purchase
288. Freelancer Job
289. E-Tutor Online Jobs
290. Statistical Entity Extraction from Web
291. Effective Collaborative Learning
292. Development of an e-Post Office System
293. Question Answering System for an Effective Collaborative Learning


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
294. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
295. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
296. Privacy Protection based Access Control Scheme in Cloud-based Services
297. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
298. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
299. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
300. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
301. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
302. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
303. Explaining Missing Answers to Top-k SQL Queries
304. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
305. Continuous Top-k Monitoring on Document Streams
306. Generating Query Facets using Knowledge Bases
307. Query Reorganization Algorithms for Efficient Boolean Information Filtering


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
308. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
309. Privacy Protection based Access Control Scheme in Cloud-based Services
310. Dynamic Facet Ordering for Faceted Product Search Engines
311. Continuous Top-k Monitoring on Document Streams


ANGULAR JS ,
ANGULAR JS
312. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
313. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
314. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
315. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
316. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
317. Generating Query Facets using Knowledge Bases
318. Private Over-threshold Aggregation Protocols over Distributed Datasets
319. Private Over-threshold Aggregation Protocols over Distributed Datasets


Dot Net IEEE 2016-17
IEEE Transactions on Computers
320. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
321. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
322. TagBook: A Semantic Video Representation without Supervision for Event Detection
323. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
324. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
325. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
326. The Impact of Review Environment on Review Credibility
327. Private Over-threshold Aggregation Protocols over Distributed Datasets
328. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
329. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
330. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
331. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
332. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
333. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
334. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
335. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
336. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
337. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
338. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
339. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
340. What Is Happening in The Video Annotate Video by Sentence
341. Two level QR code for private message sharing and document authentication.
342. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
343. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
344. Mining Health Examination Records A Graph-based Approach
345. A Credibility Analysis System for Assessing Information on Twitter
346. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
347. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
348. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
349. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
350. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
351. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
352. Predicting Personalized Image Emotion Perceptions in Social Networks
353. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
354. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
355. Explaining Missing Answers to Top-k SQL Queries
356. Bilevel Feature Extraction Based Text Mining
357. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
358. Privacy-Preserving Outsourced Media Search
359. Modeling and Verification of Online Shopping Business Processes
360. User Preference Learning for Online Social Recommendation
361. Steganalysis Features for Content-Adaptive JPEG Steganography
362. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
363. PiCode: a New Picture-Embedding 2D Barcode
364. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
365. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
366. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
367. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
368. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
369. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
370. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
371. Cloud workflow scheduling with deadlines and time slot availability
372. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
373. Path-Based Epidemic Spreading in Networks
374. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
375. On the Resiliency of Static Forwarding Tables
376. Network Capability in Localizing Node Failures via End-to-End Path Measurements
377. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
378. DX: Latency-Based Congestion Control for Datacenters


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
379. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
380. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
381. A Forecasting Methodology for Workload Forecasting in Cloud Systems
382. Optimal Shipping Strategy and Return Service Charge Under No-Reason
383. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
384. A Recommendation System to Facilitate Business Process Modeling
385. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
386. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
387. User Differentiated Verifiable File Search on the Cloud
388. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
389. Statistical Features Based Real-time Detection of Drifted Twitter Spam
390. Incremental Consolidation of Data-Intensive Multi-flows
391. Service Pattern: An Integrated Business Process Model for Modern Service Industry
392. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
393. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
394. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
395. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
396. Democratic Diffusion Aggregation for Image Retrieval


ASP.NET MVC Framework
ASP.NET MVC Framework Project
397. Towards Effective Bug Triage with Software Data Reduction Techniques
398. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
399. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
400. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
401. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
402. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
403. Proof of retrievability with public verifiability resilient against related-key attacks
404. Secure Anonymous Key Distribution Scheme for Smart Grid
405. Converses For Secret Key Agreement and Secure Computing
406. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
407. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
408. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
409. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
410. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
411. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
412. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
413. Hacking is not random: a case-control study of webser ver-compromise risk
414. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
415. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
416. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
417. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
418. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
419. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
420. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
421. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
422. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
423. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
424. Diversifying Web Service Recommendation Results via Exploring Service Usage History
425. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
426. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
427. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
428. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
429. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
430. Cross-Domain Feature Learning in Multimedia
431. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
432. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
433. Saliency-based color accessibility
434. Contextual Online Learning for Multimedia Content Aggregation
435. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
436. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
437. An Attribute-assisted Reranking Model for Web Image Search
438. RRW - A Robust and Reversible Watermarking
439. Steganography Using Reversible Texture Synthesis
440. Single Image Super-Resolution Based on Gradient Profile Sharpness
441. Detection and Rectification of Distorted Fingerprints
442. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
443. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
444. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
445. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
446. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
447. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
448. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
449. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
450. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
451. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
452. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
453. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
454. Authenticated Key Exchange Protocols for Parallel Network File Systems
455. Data Collection in Multi-Application Sharing Wireless Sensor Networks
456. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
457. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
458. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
459. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
460. Optimum Power Allocation in Sensor Networks for Active Radar Applications
461. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
462. Context-based Diversification for Keyword Queries over XML Data
463. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
464. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
465. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
466. Tweet Segmentation and Its Application to Named Entity Recognition
467. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
468. Automatic Group Happiness Intensity Analysis
469. RRW - A Robust and Reversible Watermarking Technique for Relational Data
470. Query Aware Determinization of Uncertain Objects
471. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
472. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
473. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
474. Cotton Leaf Disease Identification using Pattern Recognition Techniques
475. Efficient Community Formation for Web Services
476. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
477. Secure Mining of Association Rules in Hor izontally Distributed Databases
478. Dynamic Query Forms for Database Queries
479. Secure kNN Query Processing in Untrusted Cloud Environments
480. An Empirical Performance Evaluation of Relational Keyword Search Systems
481. Keyword Query Routing
482. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
483. Demand Bidding Program and Its Application in Hotel Energy Management
484. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
485. Incremental Detection of Inconsistencies in Distributed Data
486. A Cocktail Approach for Travel Package Recommendation
487. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
488. A Random Decision Tree Framework for Privacy-Preserving Data Mining
489. Analysis of Field Data on Web Security Vulnerabilities
490. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
491. A Reliability Improvement Method for SOA-Based Applications
492. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
493. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
494. Web Service Recommendation via Exploiting Location and QoS Information
495. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
496. Exploiting Rateless Codes in Cloud Storage Systems
497. COMIC:Cost Optimization for Internet Content Multihoming
498. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
499. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
500. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
501. Uniform Embedding for Efficient JPEG Steganography
502. Secure Deduplication with Efficient and Reliable Convergent Key Management
503. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
504. Link Quality Aware Code Dissemination in Wireless Sensor Networks
505. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
506. Location Aware Keyword Query Suggestion Based on Document Proximity
507. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
508. A secure data self-destructing scheme in cloud computing
509. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
510. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
511. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
512. Secure kNN Query Processing in Untrusted Cloud Environments
513. Exploiting Rateless Codes in Cloud Storage Systems
514. Fuzzy Authorization for Cloud Storage
515. Planning vs. dynamic control Resource allocation in corporate clouds
516. Automatic Scaling of Internet Applications for Cloud Computing Services
517. Strategy-proof Pricing for Cloud Service Composition
518. Privacy Preserving Delegated Access Control in Public Clouds
519. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
520. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
521. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
522. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
523. A Mechanism Design Approach to Resource Procurement in Cloud Computing
524. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
525. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
526. A Scientometric Analysis of Cloud Computing Literature
527. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
528. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
529. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
530. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
531. FeatureMatch: A General ANNF Estimation Technique and its Applications
532. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
533. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
534. As-Projective-As-Possible Image Stitching with Moving DLT
535. Sharing Visual Secrets in Single Image Random Dot Stereograms
536. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
537. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
538. A New Iterative Triclass Thresholding Technique in Image Segmentation
539. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
540. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
541. An Iranian License Plate Recognition System Based on Color Features
542. Learning Layouts for Single-Page Graphic Designs
543. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
544. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
545. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
546. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
547. Fingerprint Compression Based on Sparse Representation
548. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
549. LBP-Based Edge-Texture Features for Object Recoginition
550. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
551. Toward Experiential Mobile Media Processing
552. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
553. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
554. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
555. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
556. Designing Truthful Spectrum Double Auctions with Local Markets
557. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
558. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
559. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
560. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
561. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
562. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
563. A Study on Clinical Prediction Using Data Mining Techniques
564. Online Payment System using Steganography and Visual Cryptography
565. Efficient Instant-Fuzzy Search with Proximity Ranking
566. Attribute Based Encryption with Privacy Preserving In Clouds
567. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
568. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
569. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
570. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
571. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
572. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
573. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
574. The Target Tracking in Mobile Sensor Networks
575. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
576. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
577. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
578. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
579. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
580. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
581. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
582. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
583. SUSIE: Search Using Services and Information Extraction
584. SeDas: A Self-Destructing Data System Based on Active Storage Framework
585. Secure Mining of Association Rules in Horizontally Distributed Databases
586. Sampling Online Social Networks
587. Privacy Preserving Delegated Access Control in Public Clouds
588. Mining Order-Preserving Submatrices from Data with Repeated Measurements
589. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
590. Ginix : Generalized Inverted Index for Keyword Search
591. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
592. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
593. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
594. Dynamic Query Forms for Database Queries
595. Cost-Based Optimization of Service Compositions
596. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
597. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
598. Automatic Extraction of Top-k Lists from the Web
599. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
600. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
601. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
602. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
603. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
604. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
605. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
606. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
607. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
608. Privacy Preserving Data Sharing With Anonymous ID Assignment
609. Non-Cooperative Location Privacy
610. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
611. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
612. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
613. Cloud based emails boundaries and vulnerabilities
614. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
615. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
616. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
617. Optimal Content Downloading in Vehicular Networks
618. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
619. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
620. View-invariant action recognition based on Artificial Neural Networks
621. User-aware Image Tag Refinement via Ternary Semantic Analysis
622. Separable Reversible Data Hiding in Encrypted Image
623. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
624. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
625. Robust Face-Name Graph Matching for Movie Character Identification
626. IntentSearch:Capturing User Intention for One-Click Internet Image Search
627. Improving Color Constancy by Photometric Edge Weighting
628. Exploring the design space of social network-based Sybil defenses
629. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
630. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
631. AnnoSearch: Image Auto-Annotation by Search
632. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
633. Scalable Scheduling of Updates in Streaming Data Warehouses
634. Scalable Learning of Collective Behavior
635. Ranking Model Adaptation for Domain-Specific Search
636. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
637. Outsourced Similarity Search on Metric Data Assets
638. Organizing User Search Histories
639. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
640. Mining Web Graphs for Recommendations
641. Joint Top K Spatial Keyword Query Processing
642. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
643. Identifying Content for Planned Events Across Social Media Sites
644. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
645. Generative Models for Item Adoptions Using Social Correlation
646. Efficient Data Mining for XML Queries Answering Support
647. Efficient audit service outsourcing for data integrity in clouds
648. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
649. Effective Pattern Discovery for Text Mining
650. Combined Mining: Discovering Informative Knowledge in Complex Data
651. Decentralized Probabilistic Text Clustering
652. Computing Structural Statistics by Keywords in Databases
653. Bridging Social and Data Networks
654. Answering General Time-Sensitive Queries
655. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
656. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
657. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
658. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
659. Resource-Aware Application State Monitoring
660. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
661. Query Access Assurance in Outsourced Databases
662. Linear and Differential Cryptanalysis
663. Expert Discovery and Interactions in Mixed Service-Oriented Systems
664. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
665. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
666. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
667. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
668. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
669. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
670. ROAuth: Recommendation Based Open Authorization
671. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
672. Recommendation Models for Open Authorization
673. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
674. Packet-Hiding Methods for Preventing Selective Jamming Attacks
675. On Privacy of Encrypted Speech Communications
676. OAuth Web Authorization Protocol
677. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
678. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
679. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
680. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
681. Fast Matrix Embedding by Matrix Extending
682. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
683. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
684. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
685. Access control for online social networks third party applications
SOFTWARE ENGINEERING
686. Measuring Code Quality to Improve Specification Mining
687. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
688. Towards Secure and Dependable Storage Services in Cloud Computing
689. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
690. Remote Display Solutions for Mobile Cloud Computing
691. Privacy Preserving Delegated Access Control in Public Clouds
692. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
693. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
694. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
695. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
696. Load-Balancing Multipath Switching System with Flow Slice
697. Assessing the Veracity of Identity Assertions via OSNs
698. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
699. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
700. A New Cell-Counting-Based Attack Against Tor
701. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
702. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
703. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
704. Network Assisted Mobile Computing with Optimal Uplink Query Processing
705. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
706. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
707. Fast Release Capture Sampling in Large-Scale Sensor Networks
708. Cooperative download in vehicular environments
709. Cooperative Data Dissemination via Roadside WLANs
710. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
711. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
712. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
713. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
714. Hiding Sensitive Association Rule for Privacy Preservation
715. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
716. Development of Certificate Authority Services for Web Applications
717. Detecting and Validating Sybil Groups in theWild
718. Association Rule Extracting Knowledge Using Market Basket Analysis
719. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
720. Valuable Detours: Least-Cost Anypath Routing
721. Self-Reconfigurable Wireless Mesh Networks
722. Reliability in Layered Networks with Random Link Failures
723. NABS:Novel Approaches for Biometric Systems
724. Live Streaming with Receiver-based Peer-division Multiplexing
725. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
726. Continuous Neighbor Discovery in Asynchronous Sensor Networks
727. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
728. Virtualized Screen: A Third Element for CloudMobile Convergence
729. Steganographic Embedding in JPEG Images with Visual Criterion
730. On the Typical Statistic Features for Image Blind Steganalysis
731. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
732. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
733. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
734. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
735. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
736. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
737. Vulnerability Analysis in SOA-Based Business Processes
738. Service-Oriented Architecture for High-Dimensional Private Data Mashup
739. Service-Centric Framework for a Digital Government Application
740. Server-Side Streaming Processing of WS-Security
741. OWLPath: An OWL Ontology-Guided Query Editor
742. Monitoring Service Systems from a Language-Action Perspective
743. Extracting Product Features and Sentiments from Chinese Customer Reviews
744. Expert Discovery and Interactions in Mixed Service-Oriented Systems
745. Automated Certification for Compliant Cloud-based Business Processes
746. Addressing Dependability throughout the SOA Life Cycle
747. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
748. The Geometric Efficient Matching Algorithm for Firewalls
749. Secure Service-Oriented Architecture for Mobile Transactions
750. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
751. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
752. Privacy-Preserving Updates to Anonymous and Confidential Databases
753. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
754. IPAS: Implicit Password Authentication System
755. Improving Security and Performance in the Tor Network through Tunable Path Selection
756. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
757. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
758. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
759. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
760. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
761. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
762. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
763. Data Delivery Properties of Human Contact Networks
764. Converge-Cast: On the Capacity and Delay Tradeoffs
765. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
766. USHER: Improving Data Quality with Dynamic Forms
767. The World in a Nutshell: Concise Range Queries
768. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
769. Scalable Scheduling of Updates in Streaming Data Warehouses
770. Scalable Learning of Collective Behavior
771. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
772. Publishing Search Logs A Comparative Study of Privacy Guarantees
773. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
774. Optimal Service Pricing for a Cloud Cache
775. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
776. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
777. Mining Web Graphs for Recommendations
778. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
779. Integration of Sound Signature Authentication System
780. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
781. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
782. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
783. Exploring Application-Level Semantics for Data Compression
784. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
785. Data Leakage Detection
786. Cost-aware rank join with random and sorted access
787. Collaborative Filtering with Personalized Skylines
788. Bridging Socially-Enhanced Virtual Communities
789. Automatic Discovery of Personal Name Aliases from the Web
790. A Personalized Ontology Model for Web Information Gathering
791. Adaptive Provisioning of Human Expertise in Service-oriented Systems
792. A Query Formulation Language for the Data Web
793. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
794. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
795. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
796. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
797. Towards Secure and Dependable Storage Services in Cloud Computing
798. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
799. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
800. Data Integrity Proofs in Cloud Storage
801. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
802. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
803. Feature-level Sentiment Analysis for Chinese Product Reviews
804. Equal-sized Cells Mean Equal-sized Packets in Tor?
805. Customer Relationship Management Based on Data Mining Technique
806. Authentication Schemes for Session Passwords using Color and Images
807. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
808. Online Trends Management Service in It Industry
809. Session Management System in It Industry
810. Tools for Non IT Expert Developer
ERP PROJECTS
811. New Company Policy Clearance System
812. Recommend To Friend
813. Consultanting About the Foreign Peoples
814. Performance System Analysis In Industry
815. Non It People Performance
MODERN AGRICULTURE
816. Cotton Leaf Disease Identification using Pattern Recognition Techniques
817. Agriculture Marketing in Generation
818. Agriculture Assist
819. Sponsor For Agriculture
SPORTS
820. Play Ground Booking
OUR MODERN SOCITY
821. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
822. RAILWAY SEAT RESERVATION SYSTEM
823. Railway Management Service
824. It Park Media
825. Automation Transport Maintance
826. Yell Help For Children
827. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
828. Apartment Maintenance
829. Power Consumption Monitoring House Hold Electronic Device
830. Direct Q Less Reservation System in train
Advance Health Care System
831. MAC Sensing Protocol
832. World Wide Cloud Inter Hospital Acess Health Care System
833. Live Doctor
Dotnet Apps
834. TELEVISION CHANNEL PROGRAM MANAGEMENT
835. WIN THE TRUST OF AN INDIAN CONSUMER
836. ONLINE ACCOUNT MANAGEMENT
837. SMART CAB BOOKING SYSTEM
838. ONLINE FAST FOOD ORDER
839. Travel Mate Add Module
840. Work Order System Call Centre
841. SPORTS MANAGEMENT SYSTEM
842. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
843. Pick-It Courier Service
844. Online Taxi Booking
845. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
846. INCOMETAX MAINTAINANCE SYSTEM
847. Hotel Reservation
848. ERP System
849. Bug Tracking System
850. Vendor Information System For Shiping
851. Top-K ranking System
852. Secure Medical Image Archive System
853. Business Activity Coordination Using Web Services
854. Management Portal
855. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
856. Secure Data Filtering Recommendation System
857. Online Resources Sharing via Social Networks
858. Secure self-destructing in Cloud Computing
859. Web Resourecs File Authorization Management
860. Click based image re-ranking system
861. Tree Structure Data Analiysis Mining
862. Web Resource Allocation for CorPerate
863. Web Vulnerabilities and Security
864. Fuzzy Cloud Search Using XML
865. Cloud Data Supporting Secure Query Search
866. Tour Recommender Systems on Web
867. Distributed Interactive Web Applications
868. Secure Query Processing for Cloud
869. Online Data Storage with less pricing
870. Cost Based Web Content Managemnts
871. Web Hospital Management
872. Online Data storage with low price
873. Secure Online Data Block Authorization
874. Profitable Onlin web Server System
875. Online Economies File Manager for Multi Keying
876. Online Community Management
877. Key based Online Data Managements
878. Critical Workflow Management for Web Documents
879. Secure Online Documents Managements for Group Sharing
880. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
881. Online Marketing Automation System
882. Internal organization change management System
883. Secure confirmation of sensitive transaction data in modern Internet banking services
884. Privacy security with TPA in cloud computing
885. Company Information Tracking System
886. Online Virtualized screen Processing
887. Web Service for Airline Management
888. Web Social Club
889. Quantum Key Cryptography
890. Patient Data Management Based On Hospital Location
891. Online Software Developer Community
892. Online Developed Software sales
893. Avoid repeated measurements On Genetics Dataset
894. College Lab Maintenance System
895. Industrial Manpower Resource Organizer
896. Web Query Construction and Search on Complex Data
897. Hospital Emergency Data Management
898. Data confidentiality On Health-care Information System
899. Secure Online Trading
900. Fast Real-Time Event Alert Using social Network
901. Secure E-Mail Organizer
902. Web User Service Management System
903. Easy SQL Query for Non-IT Manager
904. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
905. Customer Relationship Management (CRM) on Banking
906. Online Company ERP System
907. Constructing E-Tourism
908. Web based Multi Service Ranking System
909. Dynamic Customer Data Hiding in Banking
910. Online Distributed Social Clubs
911. Virtual Shopping with Negative Feedback Reputation Systems
912. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
913. Web Service Oriented Query Authentication Technique
914. Web Based Customer Favorite vehicle Search Engine
915. Web Based Book Publishing System
916. Virtual Energy- Based Encryption and Keying
917. Video Fraud Detecting On social Network
918. Video Compression with Data hiding & Data Extraction
919. Vendor Information System for Shipping
920. VALUE ADDED TAX (VAT)
921. Universal Smart Card
922. Ultimate Location Information Systems
923. Top K Ranking System
924. Techno Task Manager
925. Supply Chain Management
926. Substitution-Permutation cryptanalysis System
927. Streaming Data Warehouse Updations
928. Step by Step Monitoring for Product Purchasing System
929. Steganography for Data Reading and Writing AVI files
930. SQL TUNER
931. SMS Transaction Security
932. Session Authentication Passwords using Color
933. Service Availability Guarantees on Virtual Economy
934. Server Fraud Detection on Cloud
935. Sentence Based Search on Cloud
936. Semantic Web Search Engines
937. Secured Image communicator
938. Secure smart application on web application
939. Secure Service-Oriented Smartcard systems
940. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
941. Secure Location Identification System
942. Secure and Cloud Based Patient Information Systems
943. Reduce the Password Guessing Attacks using Click Point
944. Recommendation System Based on Graph
945. Quantum Key Cryptography
946. Quality Controller
947. Public Web Status Monitoring System
948. Project Trade Pool
949. Product Marketing Analysis On Public Opinion
950. Predicting Users Behaviors Using Web Mining
951. Personal Health Information on M-Healthcare Emergency
952. Optimum Online Knowledge Base
953. Online Training Program
954. Online Time sensitive queries
955. Online Tag Based Image Retrieval and Effective Management
956. Online Social networks controls using cloud
957. Online Rental System
958. Online product Opinion and Ranking System
959. Online Dynamic form creation for Non-IT Peoples
960. Online Digital Contract Signing in Mistrusted Parities
961. Online Aventure
962. Online Shopping
963. News Ticker Project
964. Net Bank in Recharge
965. Multi User Public Auditing System of Data Storage Security
966. Multi Location Networked Mobile Auto Intimates
967. Modern Distributed Business Applications for Supply Chain Management
968. Market Intelligence Based Public Sentiment Analysis
969. Leave Management System
970. Joint processing of spatial keyword queries
971. Intelligence Missing Items in Shopping Cart
972. Information Leak Detection and Prevention
973. Industrial Manpower Resource Organizer
974. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
975. Human Expertise Search Engine
976. Home appliances online Purchase
977. High Secure Corporate Web Search Engine
978. High Degree Patient Privacy on Secure Data Outsourcing
979. Group Movement Pattern Discovery
980. Graph Based Share Market Data Updating
981. Generic Business Portal
982. Flight Booking Portal
983. Firewall using Packet Filtering
984. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
985. Ethical and Social issues in File sharing system
986. Enterprener Sales Report Management
987. Encyclopedia for Computer Science
988. Employee Based Performance Monitoring and Action Systems
989. Emerging Patient Health Information Exchange System On Cloud
990. Efficient Search on Outsourced data using Cloud
991. Efficient and Secure Data Processing on Queries Similarity
992. Distributed Database Optimization on HealthCare
993. Digital Asset Management Systems (DAMS) Using Watermarking
994. Detecting Fraud on Vehicle Insurance System
995. Defeating Lazy Servers Database Vs Query Access Assurance
996. Data Processing for Disease-Treatment Relations
997. Data Mining Analysis on EB bill system
998. Data confidential against untrusted servers using attribute-based encryption (ABE)
999. Data Aggregation using SQL clustering
1000. Customer Sales Analysis System Based On Purchasing
1001. Cryptography on Personal confidential information
1002. Cost Based Secure Cloud Data Systems
1003. Market Based Analysis for consumer correct decision
1004. Construction Company Work Order System
1005. Complete Medical Transcription System(Mts)
1006. Company Security Reporting System(CSRS)
1007. College Result Analysis
1008. Cloud Economic Benefit On Scientific Computing
1009. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1010. Centralized Event Planer across Social Media Sites
1011. Call Center Management
1012. A Reservation-Based Coordination Protocol for Web Services
1013. Building construction and cost estimation
1014. Budget Planner
1015. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1016. Automatically identifying query groups on Web Search Engine
1017. Auditing Data integrity and data storage using cloud
1018. Application layer blocker for preventing on cyber security
1019. Advanced One-Click User Web Search Engine
1020. Advance Patient Management System


JAVA IEEE 2017-18
IEEE Transactions on Big Data
1021. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
1022. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
Services Computing
1023. Resource renting for periodical cloud workflow applications
IEEE Transactions on Security Computing
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1024. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1025. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
1026. Search Rank Fraud and Malware Detection in Google Play
1027. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
1028. Influence Maximization in Trajectory Databases
1029. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
1030. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
1031. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
1032. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
1033. Computing Semantic Similarity of Concepts in Knowledge Graphs
1034. QDA: A Query-Driven Approach to Entity Resolution
1035. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
1036. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
1037. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
1038. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
1039. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
1040. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
1041. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
1042. Two-Factor Data Security Protection Mechanism for Cloud Storage System
1043. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
1044. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
1045. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
1046. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
1047. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
1048. Where You Are Is Who You Are User Identification by Matching Statistics
1049. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
1050. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
1051. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
1052. Online Subgraph Skyline Analysis Over Knowledge Graphs
1053. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
1054. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
1055. ID2S Password-Authenticated Key Exchange Protocols
1056. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
1057. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
1058. Classification model to predict the learners' academic performance using big data
1059. Electronic Commerce Meets the Semantic Web
1060. Mining High Utility Patterns in One Phase without Generating Candidates
1061. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
1062. Automatic Generation of Social Event Storyboard from Image Click-through Data
1063. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
1064. Understanding Deep Representations Learned in Modeling Users Likes
1065. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
1066. Topic-Oriented Exploratory Search Based on an Indexing Network
1067. Relevance Feedback Algorithms Inspired By Quantum Detection
1068. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
1069. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1070. Efficiently Estimating Statistics of Points of Interests on Maps
1071. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
1072. Aspect-level Influence Discovery from Graphs
1073. Sentiment Embeddings with Applications to Sentiment Analysis
1074. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
1075. Resolving Multi-party Privacy Conflicts in Social Media
1076. Encrypted Data Management with Deduplication in Cloud Computing
1077. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1078. Crawling Hidden Objects with kNN Queries
1079. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
1080. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
1081. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
1082. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
1083. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
1084. Nearest Keyword Set Search in Multi-dimensional Datasets
1085. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
1086. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
1087. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
1088. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
1089. Immutable Authentication and Integrity Schemes for Outsourced Databases
1090. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
1091. Server-Aided Public Key Encryption with Keyword Search
1092. Online Learning in Large-Scale Contextual Recommender Systems
1093. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
1094. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
1095. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
1096. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
1097. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
1098. Multi-Modal Event Topic Model for Social Event Analysis
1099. Social friend recommendation on multiple network correlation
1100. Tag Based Image Search by Social Re-ranking
1101. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
1102. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
1103. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
1104. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
1105. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
1106. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
1107. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
1108. Rank-Based Similarity Search: Reducing the Dimensional Dependence
1109. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
1110. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
1111. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
1112. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
1113. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1114. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
1115. On the Security of data access control for multiauthority cloud storage system
1116. Trust-based Service Management for Social Internet of Things Systems
1117. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1118. Formalization and Verification of Group Behavior Interactions
1119. Group Key Agreement with Local Connectivity
1120. Data Lineage in Malicious Environments
1121. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1122. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
1123. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1124. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
1125. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
1126. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1127. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
1128. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
1129. Quantitative Reasoning About Cloud Security Using Service Level Agreements
1130. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
1131. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
1132. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
1133. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
1134. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
1135. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
1136. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1137. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
1138. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1139. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1140. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
1141. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1142. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
1143. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
1144. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
1145. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
1146. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1147. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1148. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
1149. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
1150. Secure Auditing and Deduplicating Data in Cloud
1151. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1152. Towards reproducibility in online social network Research
1153. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
1154. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
1155. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
1156. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
1157. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
1158. Making Digital Artifacts on the Web Verifiable and Reliable
1159. Anonymizing Collections of Tree-Structured Data
1160. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1161. FOCS: Fast Overlapped Community Search
1162. Sparsity Learning Formulations for Mining Time-Varying Data
1163. The Impact of View Histories on Edit Recommendations
1164. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
1165. Discovery of Ranking Fraud for Mobile Apps
1166. Towards Effective Bug Triage with Software Data Reduction Techniques
1167. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
1168. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1169. Auditing for Distributed Storage Systems
1170. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1171. Uploader Intent for Online Video: Typology, Inference and Applications
1172. YouTube Video Promotion by Cross-network
1173. Semantic-Improved Color Imaging Applications: It Is All About Context
1174. Geolocalized Modeling for Dish Recognition
1175. Learning to Rank Image Tags with Limited Training Examples
1176. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
1177. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1178. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
1179. Tracking Temporal Community Strength in Dynamic Networks
1180. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
1181. Towards Information Diffusion in Mobile Social Networks
1182. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1183. An Efficient Privacy-Preserving Ranked Keyword Search Method
1184. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
1185. Dispersing Instant Social Video Service Across Multiple Clouds
1186. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1187. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
1188. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
1189. A Computational Dynamic Trust Model for User Authorization
1190. Secure Distributed Deduplication Systems with Improved Reliability
1191. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1192. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1193. Leveraging the Tail Time for Saving Energy in Cellular Networks
1194. Keylogging-resistant Visual Authentication Protocols
1195. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
1196. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
1197. Preserving Location Privacy in Geo-Social Applications
1198. Efficient Authentication for Mobile and Pervasive Computing
1199. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
1200. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1201. Typicality-Based Collaborative Filtering Recommendation
1202. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
1203. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
1204. Keyword Search Over Probabilistic RDF Graphs
1205. Efficient Prediction of Difficult Keyword Queries over Databases
1206. Interpreting the Public Sentiment Variations on Twitter
1207. An Efficient Recommendation Method for Improving Business Process Modeling
1208. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
1209. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
1210. On the use of Side Information for Mining Text Data
1211. Privacy Preserving and Content Protecting Location based Queries
1212. Fast Nearest Neighbor Search with Keywords
1213. Towards Differential Query Services in Cost-Efficient Clouds
1214. Facilitating Document Annotation using Content and Querying Value
1215. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
1216. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
1217. Secure Outsourced Attribute-Based Signatures
1218. Supporting Privacy Protection in Personalized Web Search
1219. Dealing With Concept Drifts in Process Mining
1220. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
1221. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
1222. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
1223. Active Learning of Constraints for Semi-Supervised Clustering
1224. Best Keyword Cover Search
1225. Personalized Recommendation Combining User Interest and Social Circle
1226. Online Feature Selection and Its Applications
1227. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
1228. Incremental Affinity Propagation Clustering Based on Message Passing
1229. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
1230. Secure kNN Query Processing in Untrusted Cloud Environments
1231. Malware Propagation in Large-Scale Networks
1232. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
1233. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
1234. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
1235. Efficient Ranking on Entity Graphs with Personalized Relationships
1236. Task Trail: An Effective Segmentation of User Search Behavior
1237. Privacy-Preserving Enhanced Collaborative Tagging
1238. XSPath Navigation on XML Schemas Made Easy
1239. Security Evaluation of Pattern Classifiers under Attack
1240. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
1241. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1242. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
1243. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1244. Nothing is for Free: Security in Searching Shared and Encrypted Data
1245. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1246. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1247. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1248. Behavioral Malware Detection in Delay Tolerant Networks
1249. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
1250. Private Searching on Streaming Data Based on Keyword Frequency
1251. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1252. On the Security of Trustee-Based Social Authentications
1253. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1254. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
1255. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
1256. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1257. A Two-stage Deanonymization Attack Against Anonymized Social Networks
1258. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
1259. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
1260. Scalable architecture for multi-user encrypted SQL operations on cloud database services
1261. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1262. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1263. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1264. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1265. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1266. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1267. Secure kNN Query Processing in Untrusted Cloud Environments
1268. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
1269. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
1270. A Hybrid Cloud Approach for Secure Authorized Deduplication
1271. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
1272. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
1273. A Novel Model for Competition and Cooperation Among Cloud Providers
1274. CLOUDQUAL: A Quality Model for Cloud Services
1275. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
1276. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
1277. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
1278. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
1279. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
1280. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
1281. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
1282. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
1283. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
1284. Enhanced Security for Association Rule Mining to secure Transactional Databases
1285. Operational Pattern Revealing Technique in Text Mining
1286. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
1287. Personalized web search using Browsing history and domain Knowledge
1288. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
1289. Data Security the Challenge of Cloud Computing
1290. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
1291. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1292. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
1293. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
1294. User Action Interpretation for Online Content Optimization
1295. Spatial Query Integrity with Voronoi Neighbors
1296. Spatial Approximate String Search
1297. Sensitive Label Privacy Protection on Social Network Data
1298. Secure Mining of Association Rules in Horizontally Distributed Databases
1299. Secure Logging As a Service Delegating Log Management to the Cloud
1300. Robust Module-based Data Management
1301. Ranking on Data Manifold with Sink Points
1302. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
1303. Privacy-Enhanced Web Service Composition
1304. Privacy against Aggregate Knowledge Attacks
1305. Preventing Private Information Inference Attacks on Social Networks
1306. PMSE: A Personalized Mobile Search Engine
1307. Personalized QoS-Aware Web Service Recommendation and Visualization
1308. Optimal Client-Server Assignment for Internet Distributed Systems
1309. Online Search and Buying Behaviour in Consumer Markets
1310. M-Privacy for Collaborative Data Publishing
1311. Mining User Queries with Markov Chains: Application to Online Image Retrieval
1312. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
1313. Incentive Compatible Privacy-Preserving Data Analysis
1314. Improving Security and Efficiency in Attribute-Based Data Sharing
1315. FoCUS: Learning to Crawl Web Forums
1316. Fast Nearest Neighbor Search with Keywords
1317. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
1318. Facilitating Effective User Navigation through Website Structure Improvement
1319. Facilitating Document Annotation using Content and Querying Value
1320. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
1321. Efficient Evaluation of SUM Queries over Probabilistic Data*
1322. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
1323. Dynamic Query Forms for Database Queries
1324. Dynamic Personalized Recommendation on Sparse Data
1325. Distributed Strategies for Mining Outliers in Large Data Sets
1326. Crowdsourcing Predictors of Behavioral Outcomes
1327. Co-Occurrence-Based Diffusion for Expert Search on the Web
1328. Comparable Entity Mining from Comparative Questions
1329. CloudMoV: Cloud-based Mobile Social TV
1330. Anomaly Detection via Online Oversampling Principal Component Analysis
1331. Anomaly Detection Approach Using Hidden Markov Model
1332. Annotating Search Results from Web Databases
1333. A System to Filter Unwanted Messages from OSN User Walls
1334. A Survey of XML Tree Patterns
1335. A Probabilistic Approach to String Transformation
1336. A New Algorithm for Inferring User Search Goals with Feedback Sessions
1337. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
1338. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
1339. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
1340. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
1341. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
1342. Towards Differential Query Services in Cost-Efficient Clouds
1343. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
1344. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1345. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
1346. QoS Ranking Prediction for Cloud Services
1347. Priority-Based Consolidation of Parallel Workloads in the Cloud
1348. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1349. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
1350. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
1351. Load Rebalancing for Distributed File Systems in Clouds
1352. Label-Embedding for Attribute-Based Classification
1353. IP-Geolocation Mapping for Moderately Connected Internet Regions
1354. Identity-Based Secure Distributed Data Storage Schemes
1355. Hint-based Execution of Workloads in Clouds with Nefeli
1356. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
1357. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
1358. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
1359. Efficient Two-Server Password-Only Authenticated Key Exchange
1360. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
1361. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
1362. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
1363. Winds of Change: From Vendor Lock-In to the Meta Cloud
1364. Supporting the Migration of Applications to the Cloud through a Decision Support System
1365. Storing Shared Data on the Cloud via Security-Mediator
1366. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
1367. Privacy-Preserving Public Auditing for Secure Cloud Storage
1368. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
1369. Outsourcing Privacy-Preserving Social Networks to a Cloud
1370. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
1371. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
1372. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
1373. Efficient Security Solution for Privacy-Preserving Cloud Services
1374. Collaboration in Multicloud Computing Environments: Framework and Security Issues
1375. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
1376. Cloud-based DDoS Attacks and Defenses
1377. Cloud computing for mobile users can offloading compution save energy
1378. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
1379. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
1380. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
1381. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
1382. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
1383. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
1384. Two tales of privacy in online social networks
1385. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
1386. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
1387. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
1388. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
1389. Security and Privacy-Enhancing Multicloud Architectures
1390. Security Using Colors and Armstrong Numbers
1391. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
1392. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
1393. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
1394. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
1395. Privacy Preserving Data Analytics for Smart Homes
1396. On Inference-Proof View Processing of XML Documents
1397. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
1398. Extracting Spread-Spectrum Hidden Data from Digital Media
1399. Efficiently Outsourcing Multiparty Computation under Multiple Keys
1400. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
1401. Craigslist Scams and Community Composition: Investigating Online Fraud
1402. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
1403. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
1404. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
1405. Super-Resolution-based Inpainting
1406. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
1407. Image Authentication Using Stochastic Diffusion
1408. Hierarchical Super-Resolution-Based Inpainting
1409. Circular Reranking for Visual Search
1410. Bootstrapping Visual Categorization With Relevant Negatives
1411. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
1412. An extended visual cryptography scheme without pixel expansion for halftone images
1413. An Adaptive Cloud Downloading Service
NETWORKING
1414. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
1415. Topological Conditions for In-Network Stabilization of Dynamical Systems
1416. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
1417. Price Differentiation for Communication Networks
1418. Participatory Privacy: Enabling Privacy in Participatory Sensing
1419. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
1420. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1421. On the Role of Mobility for Multi-message Gossip
1422. Fully Anonymous Profile Matching in Mobile Social Networks
1423. Fault Node Recovery Algorithm for a Wireless Sensor Network
1424. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
1425. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
1426. Access Policy Consolidation for Event Processing Systems
1427. A Fast Re-Route Method
SOFTWARE ENGINEERING
1428. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
1429. Vampire attacks: Draining life from wireless ad-hoc sensor networks
1430. Towards a Statistical Framework for Source Anonymity in Sensor Networks
1431. Search Me If You Can: Privacy-preserving Location Query Service
1432. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
1433. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
1434. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
1435. Distributed Cooperative Caching in Social Wireless Networks
1436. Community-Aware Opportunistic Routing in Mobile Social Networks
1437. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
1438. The Devils Behind Web Application Vulnerabilities
1439. Security Architecture for Cloud Networking
1440. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
1441. Secure Overlay Cloud Storage with Access Control and Assured Deletion
1442. Risk-Aware Mitigation for MANET Routing Attacks
1443. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
1444. Privacy-preserving Enforcement of Spatially Aware RBAC
1445. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
1446. pCloud: A Distributed System for Practical PIR
1447. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1448. Online Modeling of Proactive Moderation System for Auction Fraud Detection
1449. Fast and accurate annotation of short texts with Wikipedia pages
1450. FADE: Secure Overlay Cloud Storage with File Assured Deletion
1451. Ensuring Distributed Accountability for Data Sharing in the Cloud
1452. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
1453. Direct and Indirect Discrimination Prevention Methods
1454. Detecting Spam Zombies by Monitoring Outgoing Messages
1455. Detecting Anomalous Insiders in Collaborative Information Systems
1456. Data-Provenance Verification For Secure Hosts
1457. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
1458. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
1459. Payments for Outsourced Computations
1460. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
1461. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1462. Toward Private Joins on Outsourced Data
1463. Statistical Entity Extraction from Web
1464. Slicing: A New Approach to Privacy Preserving Data Publishing
1465. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
1466. Resilient Identity Crime Detection
1467. Ranking Model Adaptation for Domain-Specific Search
1468. Organizing User Search Histories
1469. On the Spectral Characterization and Scalable Mining of Network Communities
1470. Multiparty Access Control for Online Social Networks: Model and Mechanisms
1471. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
1472. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1473. How do Facebookers use Friendlists
1474. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
1475. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
1476. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
1477. Enabling Multilevel Trust in Privacy Preserving Data Mining
1478. Enabling cross-site interactions in social networks
1479. Efficient Similarity Search over Encrypted Data
1480. Efficient Extended Boolean Retrieval
1481. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
1482. Efficient Anonymous Message Submission
1483. Effective Pattern Discovery for Text Mining
1484. DDD: A New Ensemble Approach for Dealing with Concept Drift
1485. Credibility Ranking of Tweets during High Impact Events
1486. Creating Evolving User Behavior Profiles Automatically
1487. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
1488. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
1489. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
1490. Anomaly Detection for Discrete Sequences: A Survey
1491. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
1492. Advance Mining of Temporal High Utility Itemset
1493. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
1494. Reliable Re-encryption in Unreliable Clouds
1495. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
1496. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
1497. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
1498. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
1499. Gossip-based Resource Management for Cloud Environments
1500. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
1501. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
1502. Cloud Data Protection for the Masses
1503. Cloud Computing Security: From Single to Multi-Clouds
1504. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
1505. In Tags We Trust Trust modeling in social tagging of multimedia content
1506. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
1507. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
1508. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
1509. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
1510. Cut Detection in Wireless Sensor Networks
1511. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
1512. TrickleDNS: Bootstrapping DNS Security using Social Trust
1513. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
1514. Policy-by-Example for Online Social Networks
1515. Packet Loss Control Using Tokens at the Network Edge
1516. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1517. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
1518. Independent Directed Acyclic Graphs for Resilient Multipath Routing
1519. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
1520. Game-Theoretic Pricing for Video Streaming in Mobile Networks
1521. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
1522. Auditing for Network Coding Storage
1523. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
1524. Privacy Preserving Cloud Data Access With Multi-Authorities
1525. Movie Rating and Review Summarization in Mobile Environment
1526. IDSaaS: Intrusion Detection System as a Service in Public Clouds
1527. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
1528. BibPro: A Citation Parser Based on Sequence Alignment Techniques
1529. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
1530. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
1531. RITAS: Services for Randomized Intrusion Tolerance
1532. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
1533. Nymble: Blocking Misbehaving Users in Anonymizing Networks
1534. Modeling and Detection of Camouflaging Worm
1535. Coding for Cryptographic Security Enhancement using Stopping Sets
1536. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
1537. Wireless Sensor Network Security model using Zero Knowledge Protocol
1538. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
1539. Throughput Optimization in Mobile Backbone Networks
1540. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
1541. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
1542. Fast Data Collection in Tree-Based Wireless Sensor Networks
1543. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
1544. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
1545. SPAF: Stateless FSA-based Packet Filters
1546. Selfish Overlay Network Creation and Maintenance
1547. ProgME: Towards Programmable Network MEasurement
1548. Locating Equivalent Servants over P2P Networks
1549. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
1550. Buffer Sizing for 802.11 Based Networks
1551. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
1552. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
1553. Improving Utilization of Infrastructure Clouds
1554. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
1555. CloudTPS: Scalable Transactions for Web Applications in the Cloud
1556. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1557. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
1558. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
1559. Ranking Spatial Data by Quality Preferences
1560. Making Aggregation Work in Uncertain and Probabilistic Databases
1561. Load Shedding in Mobile Systems with MobiQual
1562. Group Enclosing Queries
1563. Extended XML Tree Pattern Matching: Theories and Algorithms
1564. Effective Navigation of Query Results Based on Concept Hierarchies
1565. Discovering Conditional Functional Dependencies
1566. Decision Trees for Uncertain Data
1567. Data Leakage Detection
1568. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1569. Young Talent Tracker
1570. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1571. International Plant Import and Export
OUR MODERN SOCITY
1572. Trained Volunteers Create A Successful Social Campaign
1573. Finger thump Based Shopping Cart
1574. Finger Print E-Voting Systems
1575. Create a Successful Anti- Nuclear Campaign
1576. Crowding Funding Mobilization
1577. People Power of India
1578. Modern Finger Print Voting System
1579. Election Commission Management
1580. Online Painting Auction
1581. Reality Show Ticket Booking System
1582. Online Broadway Motel Food Ordering System
1583. Fashion Studio Model Management
1584. Women's Selfhelp Group
Advance Health Care System
1585. Organizing medical camp for public health development
1586. Homeopathy Health Record
1587. Consumer Legal Advicer
1588. Raw Requried Online Medicine
1589. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1590. I School
1591. Job fair section process
1592. Advertising in E-Book
1593. Students Skills With Modern Industries
1594. College Placement And College Event
1595. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1596. Cloud Storage Public Digital Certificate
ERP PROJECTS
1597. Customer Relationship Management
1598. Corporate Trouble Shooter
1599. Corporate Event Organisation
1600. Engnering Lab Maintenance
1601. Select Your Age(Business Motivation all age group)
1602. Software Requirements Analysis for Client Side
1603. ERP System (Enterprint Resource Plan
LATEST BANKING
1604. User Opinion For Indian Banking Service And Cashless Economy
1605. Advanced Banking System
1606. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1607. Economic Usage of Solar Energy
1608. Gps Consumers Complients
1609. Online Softskills Tracks
1610. Online Buy And Sale Software
1611. Budget Home Design
1612. Online Product Exchange
1613. Jewellery Management
1614. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1615. Moderate Robatics System with Public Opinion
Java Apps
1616. Online overview of skills really used in jobs
1617. Land Bank for Nursery
1618. Developing Rural Economy
1619. ECOPS - Electronics Police Record Management System
1620. Website Evaluation Using Opinion Mining
1621. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1622. INSURANCE MANAGEMENT SYSTEM
1623. e-Fraud Prevention based on the Self- Authentication of e-Documents
1624. Hope Center
1625. Exam crazy
1626. BUGS REPORTING SYSTEM
1627. LOCATION BASED CONSUMER COMPLAINT
1628. Speed Racing
1629. ROADSTER
1630. META CAFE
1631. ONLINE VIDEO LOCKER
1632. Management System in Metro Train
1633. Plant Shopping on Web
1634. Reporting Online Media News Systems
1635. Informative Content Extraction
1636. E-commerce Complaint Management System
1637. Modern Agriculture Development System
1638. Loan Online Application
1639. Rural Community Developement
1640. LOVE AND CARE
1641. GREEN PLANT
1642. Advance Couier Service
1643. Community Awarness
1644. E_Music
1645. Staff Management System
1646. E-TENDERING
1647. Hotel Management
1648. Crime File Management System
1649. Cloud Cyber Attack
1650. Cloud Cost Management for Customer Sensitive Data
1651. Advance Web based Multimedia Answer Generation
1652. Commaunity Awareness
1653. E-Commerce Complaints
1654. Modern Agriculture Development System
1655. Plant Shopping on Web
1656. ONLINE VIDEO LOCKER
1657. ONLINE VIDEO LOCKER
1658. Reporting Online Media News Systems
1659. Online Plant Shopping
1660. Community Awareness
1661. Loan Online Application
1662. Modern Agriculture Development System
1663. Online Digital Library
1664. Geo Base Services
1665. Civil Supplies and Consumer Protection Department
1666. Citizen Opinions vs Government Policies
1667. Protecting Used Data Privacy for Attackers
1668. Web Hospital Management
1669. Easy SQL Query for Non-IT Manager
1670. Online Shopping with Fraud detection
1671. Efficient Spatial Query Processing
1672. Cryptographic Key Exchange Authentication
1673. Online Global Information Service Center
1674. Contracts Business Events Management
1675. Online Secure image Social Networks
1676. Outsourcing of Online Image Reconstruction
1677. Trust based Profile Matching Secure Social Network
1678. Secure and Distance based Online Social Network (OSN)
1679. Efficient Online Image Retrieval System
1680. Data Sharing In Cloud Storage by Using Key-Aggregate
1681. Multicast Key Management for Cloud
1682. Face-to-face contact on Mobile Social Networks
1683. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1684. Dynamically Growing Online Survey for Behavioral Outcomes
1685. Advance Web based Multimedia Answer Generation
1686. College Result Analysis with Horizontally Distributed Databases
1687. Feedback Decision Support for mHealth monitoring
1688. Exchange Secrete Key for Data Producers and Consumers
1689. Efficient Information Retrieval Using Ranked Query (EIRQ)
1690. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1691. Web Hosting On Cloud
1692. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1693. Web Server Security with Web Client Management System
1694. Web Parser on Sequence Alignment Techniques
1695. Web Page re-Ranking System for Library
1696. Web Eye
1697. Voting System for Web Library
1698. VIRTUAL CLASSROOM SYSTEM
1699. Unique Web Resources Utilization Monitoring System
1700. Transport Management System
1701. Pre-paid Recharging System on Banking
1702. Tollgate Management
1703. Time To Time Stock Market Updater and Monitoring System
1704. Sql Tuner
1705. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1706. SMS Based Mobile Banking with Security
1707. Sms Topup
1708. Vendor Information System For Shipping
1709. Sequential Anomaly Detection from User Behaviour
1710. Secure SMS Transaction System on banking
1711. Secure Online Documents Management System in Cloud
1712. Secure File Uploading Server with Advance Protecting System
1713. Secure File Monitoring System on Cloud
1714. Relational Logic Search Engine On Healthcare
1715. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1716. Quick Customer decision support on Web Sales Portal
1717. Query Response System for File Management
1718. Quality Visualization on Web TV
1719. Project Work Tracking System
1720. Product Market Manipulations on Asian stock market
1721. Predicting Top Company Share Based on High Utility Data
1722. Automation of Analysis and Development Management
1723. Pharmacy Information System
1724. Personalize Your News on Web
1725. Online University
1726. Online tagging for multimedia content
1727. Online Search Ranking On Multiple Domain
1728. Online Rental House Web Portal
1729. Online Recruitment System
1730. Online Real Estate Property Management
1731. Online Multi Type Documents Search Engine
1732. ONLINE MOBILE BILLING SYSTEM
1733. Online Jewelry Management
1734. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1735. Online Examination System
1736. Online Ensemble Learning Approach
1737. Online Banking With Fraud Detecting
1738. Online Auction Bit
1739. ONLINE ADVERTISING SYSTEM
1740. Nutraceuticals Management System
1741. Nearest Shopping Location Identification Systems
1742. Multilevel Images Authentication Systems
1743. Multi New Product Survey Management
1744. Movie Recommender Systems via User- Item Subgroups
1745. Movie Rating and Recommendation on Mobile
1746. Modern Municipal Corporation
1747. Mobile TV Quality Management
1748. Mobile Banking WAP
1749. Manifold Entrust Scheme
1750. Management System in Train
1751. Secure Mailing System
1752. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1753. LEAVE MANAGEMENT SYSTEM FOR MNC
1754. Knowledge Based Decision Support System(KMS)
1755. Key Management for Content Integration
1756. Inter Bank Fund Transfer in Distributed Network
1757. Information and Knowledge Extracting from a large amount of data
1758. Industry Standard Authorization For Sensitive Resources
1759. Implementation and Validating Environmental and Health
1760. iKnoweb Extracting and Integrating Entity Information System
1761. HUMAN ASSURANCE ADMINISTRATION
1762. High_level network Security Using Packet Filtering
1763. High and Low Level SQL Query Executor
1764. GLOBAL COUNSELLING SYSTEM
1765. A Game Theory for Online Security
1766. Distributed Transaction Proxy
1767. Freelancer Job
1768. File Security With Multi Database System
1769. FILE SEARCH ENGINE
1770. Fertilizer Management System
1771. Fast Web Information Gathering with Alias Detection
1772. E-Tutor Online Jobs
1773. Enterprise Stock and Accounting System
1774. Ensuring Data Storage Security in Cloud Computing
1775. Encrypted IT Auditing on Cloud Computing
1776. Encrypted Data Storage Vs Data Against illegal Access
1777. Enabling Site Interaction In Social Community
1778. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1779. E-Music world
1780. Employee Resource Management
1781. Employee Management System
1782. E-Learning
1783. E Fraud Prevention based on the Self Authentication of e Documents
1784. Distribution System for Discount Sales
1785. Distributed Data Integration on Electricity Board
1786. Disease Information Hiding on Publishing Healthcare Data
1787. Digital Documents Attestation Systems
1788. Defending Against Web Application Vulnerabilities
1789. Defects Analysis Systems
1790. Data theft detection mobile cloud computing
1791. Data Base Fraud Detection Systems
1792. Customer Information Hiding for Data Mismanagement in Banking
1793. Company Security Reporting System(CSRS)
1794. E -Crime File Management System
1795. Credit Card Management System
1796. Corporate Requirement System
1797. Consumer Sales Online Fake Product Detection and Deletion
1798. Company Information Tracking System
1799. Cloud Policy-Based File Assure Deletion
1800. Cloud Data Theft Attacks
1801. Cloud Cyber Attacks against Social Networks
1802. Cloud Cost Management for Customer Sensitive Data
1803. Client Favorite Photo Search Engine on Web
1804. Citizen Card System
1805. Card Management System
1806. Design &Development of Car Parking and Automation Billing Systems
1807. Customer Care Service
1808. BPO Call Center
1809. Automation of IT Process Management
1810. Modeling and Automated Containment of Worms
1811. Attribute Key Based Data Security System
1812. As Needed Basis Accountability for Cloud Data Sharing
1813. Annotation of short texts With Wikipedia pages
1814. AIRLINE RESERVATION SYSTEM
1815. Advance User Management on Social Website
1816. A Semantic Web Based Scientific News Aggregator


Dotnet Mini Projects
Mini Projects
1817. VALUE ADDED TAX (VAT)
1818. User Oriented Network Attacks
1819. Secure Back Up
1820. Screen Capture And Mouse I/O
1821. Sales Bill Printing System using Excel
1822. Password Security
1823. Online User Mobile Rating
1824. Online Sensex Graph System
1825. Online Book Publishing
1826. NEWS TICKER PROJECT
1827. Multi Storage file
1828. Message Chating
1829. Medical Equipment in WAP
1830. Login Authentication Scheme
1831. Information Alert System
1832. Image Encryption And Decryption
1833. Generic Business Portal
1834. Flight Booking Portal
1835. File Transfer using Cryptography Techniques
1836. File Splitting
1837. Excel Format in Report
1838. EB Management System
1839. Dynamic Web Form Creation
1840. Android Image Search


Struts Application Projects
Struts Apps
1841. Public Sentiment Analysis with Online Shopping Using Struts
1842. Modern distributed business for supply-chain management
1843. High Confidential Personal Disease Reporting System
1844. Distributor Sensitive Data Management Using Struts
1845. Development of Certificate Authority Services for Web Applications
1846. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1847. Website Tracking System
1848. Website Ranking System
1849. Treasure Warehouse
1850. Student Information System
1851. Storage security
1852. PRISON MANAGEMENT SYSTEM
1853. E-Licence Investigation System
1854. Online Secure File Transfer System
1855. Online Medicine Purchase
1856. ONLINE EDUCATION
1857. Online Agriculture System
1858. Mobile Survey
1859. ISSUE TRACKING SYSYTEM
1860. HOSPITAL MANAGEMENT SYSYTEMS
1861. HealthCare Management System
1862. Global Employee Acclaimer
1863. E-VOTING FOR ASSOCIATION
1864. Encrypted Register Form
1865. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1866. E INSURANCE
1867. Courier Tracking Systems
1868. corporate Transportation
1869. Collectorate Communication Systems
1870. Budget Approval System
1871. BLOOD BANK MANAGEMENT SYSTEMS
1872. ATTENDANCE MANAGEMENT SYSTEM
1873. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1874. Sponsor For Agriculture
1875. Agriculture Assist
1876. Agriculture Marketing in Generation
1877. International Plant Import and Export
MODERN EDUCATION SYSTEM
1878. Old In Gold
1879. I School
1880. College Placement And Events
1881. Rural Area Educational Trouble Shooter
1882. Web Direct Recruitment Analysis
1883. Online Aquarum
1884. School Automation System
1885. Secure Online Course Automation
1886. Session Management System in It Industry
1887. Tools for Non IT Expert Developer
1888. Students Skills With Modern Industries
MODERN TECHNOLOGY
1889. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1890. Customer Favarate Greeting Card Design
1891. GPS Transport Packers and Movers
1892. House Hold Appliancies Warranty Management
1893. Direct Q Less Reservation System in train
1894. Power Consumption Monitoring House Hold Electronic Device
1895. Apartment Maintenance
1896. Budget Home Design
1897. Online Buy And Sale Software
1898. Online Softskills Tracks
1899. Gps Consumers Complients
1900. Economic Usage of Solar Energy
Advance Health Care System
1901. Organizing medical camp for public health development
1902. LIVE WEB DOCTOR CONSULTATION
1903. World Wide Cloud Inter Hospital Acess Health Care System
1904. MAC Sensing Protocol
1905. Medical Record Authentication
1906. Raw Requried Online Medicine
1907. Consumer Legal Advicer
1908. Homeopathy Health Record
SPORTS
1909. Play Ground Booking
1910. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1911. Cloud Storage Public Digital Certificate
ERP PROJECTS
1912. Corporate Trouble Shooter
1913. Entrepreneur Fault Analysis
1914. Organise Corporate Training For Client Projects
1915. Employment Knowledge Database
1916. GPS Employee Tracking System
1917. Non It People Performance
1918. Performance System Analysis In Industry
1919. Consultanting About the Foreign Peoples
1920. Recommend To Friend
1921. New Company Policy Clearance System
1922. ERP System (Enterprint Resource Plan
1923. Software Requirements Analysis for Client Side
1924. Select Your Age(Business Motivation all age group)
1925. Engnering Lab Maintenance
1926. Corporate Event Organisation
LATEST BANKING
1927. EyeBank Management System
1928. Advanced Banking System
OUR MODERN SOCIETY
1929. Trained Volunteers Create A Successful Social Campaign
1930. Finger thump Based Shopping Cart
1931. Railway Management Service
1932. Create a Successful Anti- Nuclear Campaign
1933. Crowding Funding Mobilization
1934. People Power of India
1935. Pets Care
1936. Feature in Best Potitical Leader in India
1937. Yell Help For Children
1938. Automation Transport Maintance
1939. It Park Media
1940. Online Painting Auction
1941. Election Commission Management
1942. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
1943. ANDROID APPS FOR INSURANCE SYSTEM
1944. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
1945. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
1946. ANDROID APPS FOR DOCTOR APPOINTMENT
1947. LIVE WEB DOCTOR CONSULTATION
1948. ANDROID APPS ON DOCTOR WITH NURSE
1949. HOSPITAL ANDROID APPS
1950. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
1951. Fertilizer Management System -Java, JSP, MySQL
1952. Land Bank for Nursery -Java, JSP, MySQL
1953. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
1954. FORMER APPS - ANDROID
1955. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
1956. Online Banking with Fraud Detecting- Java JSP, MySQL
1957. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
1958. MICRO CREDIT BANKING ON SMARTPHONE


Internet of things (IoT)
IoT Projects
1959. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
1960. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1961. FogRoute: DTN-based Data Dissemination Model in Fog Computing


RESTful Web services
REST API
1962. Big Scholarly Data: A Survey
1963. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved