Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) PYTHON APPLICATION PROJECTS JAVA IEEE LATEST
LATEST PROJECTS UPDATES Internet of things (IoT) -BLOCKCHAIN BLOCK CHAIN TECH - BITCOIN Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PhD Guidance JAVA SPRING AND HIBERNATE JAVA IEEE 2016-17 IEEE 2014-2015 Java Projects
Latest IEEE 2015-2016 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project
Java Application Projects Java Mini Projects NEW TECHNOLOGY-HELP VIDEO R - DATA SCIENCE - ML
WEKA-Machine Learning BIG DATA - HADOOP PROJECTS BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB
ANDROID APPS IEEE ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP
ANDROID APPS COLLEGE MINI PROJECTS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects ASP.NET MVC Framework Dot Net IEEE 2017-18 ANGULAR JS ,
RAZOR MVC 4 ASP.NET 2017-18 RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects
IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects
Dotnet Application Projects Dotnet Mini Projects Struts Application Projects SOFT IDEA FOR DIGITAL SOCIETY
INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS
RESTful Web services
 
PYTHON PROJECT - IEEE
MORE PYTHON IEEE
1. A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
2. End-to-end Active Object Tracking and Its Real-world Deployment via Reinforcement Learning
3. Leveraging Unlabelled Data for Emotion Recognition with Enhanced Collaborative Semi-Supervised
4. Education data Analysis and Predict of Performance using Machine Learning
5. Design of QR Code based Mall Shopping Guide System
6. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
7. Sentiment Lexicon
8. SUBWAY PASSENGER FLOW FORECASTING WITH MULTI-STATION AND EXTERNAL FACTORS
9. Personalized Recommendation of Social Images by Constructing a User Interest
10. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
11. Opinion Mining using Ontological Spam Detection
12. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
13. Phishing Web Sites Features Classification
14. using data mining to predict hospital admissions from the emergency department
15. Correlated Matrix Factorization for Recommendation with Implicit Feedback
16. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
17. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
18. Text Detection and Recognition
19. Blue Eyes Technology-identifies human emotions (sad, happy, Angry or surprised
20. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
21. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
22. Iris Recognition
23. Currency Recognition System
PYTHON TRAINING WITH PROJECT
24. Privacy Characterization and Quantification in Data Publishing
25. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
26. Opinion Mining using Ontological Spam Detection
27. Predicting the top-N popular videos via cross-domain hybrid model
28. Fraquent itemsets mining with differential privacy over large scale data
29. Phishing Web Sites Features Classification
30. Dynamic Facet Ordering for Faceted Product Search Engines
31. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
32. Machine Learning and Deep Learning Methods for Cybersecurity
33. Linear Regression Algorithm Predict the volution of Community in Future
34. A User-Centric Machine Learning Framework for Cyber Security Operations Center
35. Linear Regression Algorithm
36. A Machine Learning Approach to Routing
37. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
38. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
39. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
40. CYBER SECURITY
41. Automatic Sentiment Detection in Naturalistic Audio
42. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
43. Student Performance Analysis - PYTHON
44. E-assessment using image processing in ∞Exams
45. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
46. NLP - NATURAL LANGUAGE PROCESSING
47. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
48. Image Based Appraisal of Real Estate Properties-IEEE 2017
49. FOOD WASTE ORGANIZER
50. PYTHON PROJECT FLOW
51. PYTHON PROGRAM EXECUTION
52. PYTHON INSTALLATION
PYTHON APPLICATION
53. Fake News Analysis using Machine Learning - ML
54. Brain Tumor Detection Image Segmentation Using OpenCV
55. Road Accident Analysis Using Machine Learning
56. Inferring Salient Objects from Human Fixations
57. ROTOSCOPING APPEARANCE MODELS
58. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
59. Consumer Attitudes towards Insurance Products
60. Organic Food
61. BOOK RECOMMENDATION SYSTEM PYTHON
62. Web Scraping Using PYTHON
63. MULTIMEDIA CONTENT PROTECTION
64. Student Performance Analysis - PYTHON
65. HOTEL MANAGEMENT
66. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Reinforcement Learning
67. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
68. End-to-end Active Object Tracking and Its Real-world Deployment via Reinforcement Learning
Unsupervised Learning
69. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
70. Event Management With Analysis - Python
Supervised Learning
71. A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
72. Leveraging Unlabelled Data for Emotion Recognition with Enhanced Collaborative Semi-Supervised
73. Education data Analysis and Predict of Performance using Machine Learning
74. Design of QR Code based Mall Shopping Guide System
75. Blue Eyes Technology -identifies human emotions (sad, happy, Angry or surprised
76. Fake News Analysis using Machine Learning - ML
77. Road Accident Analysis Using Machine Learning
78. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
79. Text Detection and Recognition
80. ROTOSCOPING APPEARANCE MODELS
81. Inferring Salient Objects from Human Fixations
82. Privacy Data Mess-apps
83. Speech Recognition in Social Care - NLP
84. Text-to-Speech (TTS)- NLP
85. Voice Scheduler - NLP
86. VOICE SEARCH ENGINE - NLP
87. LINEAR REGRESSION - PYTHON
88. LATENT DIRICHLET ALLOCATION
89. DIGITAL IMAGE PROCESSING - PYTHON
90. DECISION TREE LEARNING - ALGORITHM
91. NAIVE BAYES CLASSIFIER
92. K - MEANS CLUSTERING
93. Dengu Data Analysis Using R-program
94. Shopping Data set Analyse Using R Machine Learning
95. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
96. Polynomial Time Algorithm-PTA
97. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
98. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
99. K-Means For Clustering


PYTHON APPLICATION PROJECTS
PYTHON-AI APPLICATION
100. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
101. Heart Disease Prediction System
102. Web Scraping Using
103. BOOK RECOMMENDATION SYSTEM PYTHON
104. Road Accident Analysis Using Machine Learning
105. Organic Food
106. Consumer Attitudes towards Insurance Products
107. Brain Tumor Detection Image Segmentation Using OpenCV
108. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
109. ROTOSCOPING APPEARANCE MODELS
110. Inferring Salient Objects from Human Fixations
111. Fake News Analysis using Machine Learning


JAVA IEEE LATEST
IEEE Transactions on Big Data
112. Web Media and Stock Markets : A Survey and Future Directions from a Big Data Perspective
113. Patient Oriented Framework Using Bigdata
114. Improving Instance Selection Methods for Big Data Classification
115. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
116. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
117. AIR5: Five Pillars of Artificial Intelligence Research
118. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
119. FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things
120. Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
121. Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud
122. A Fog-centric Secure Cloud Storage Scheme
123. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
124. Performance Enhancement of Information Retrieval via Artificial Intelligence
125. Crime Pattern Analysis, Visualization And Prediction Using Data Mining
126. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
127. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
128. A Web Service Discovery Approach Based on Common Topic Groups Extraction
129. Dynamic Facet Ordering for Faceted Product Search Engines
130. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
131. Flexible Wildcard Searchable Encryption System
132. QoS Recommendation in Cloud Services
133. Securing Aggregate Queries for DNA Databases
134. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
135. A robust reputation management mechanism in the federated cloud
136. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
137. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
138. A Generalized Locally Linear Factorization Machine with Supervised Variational Encoding
139. Mining Users Trust From E-Commerce Reviews Based on Sentiment Similarity Analysis
140. FraudFind Financial Fraud Detection by Analyzing Human Behavior
141. Cancer Disease Prediction Survey Analysis
142. RoadSense: Smartphone Application to Estimate Road Conditions using Accelerometer and Gyroscope
143. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
144. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
145. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
146. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
147. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
148. Energy-efficient Query Processing in Web Search Engines
149. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
150. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
151. BiRank: Towards Ranking on Bipartite Graphs
152. QoS Recommendation in Cloud Services
153. Public Interest Analysis Based on Implicit Feedback of IPTV Users
154. Search Rank Fraud and Malware Detection in Google Play
155. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
156. Influence Maximization in Trajectory Databases
157. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
158. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
159. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
160. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
161. Computing Semantic Similarity of Concepts in Knowledge Graphs
162. QDA: A Query-Driven Approach to Entity Resolution
163. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
164. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
165. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
166. CONTENT BASED IMAGE RETRIEVAL
167. Identifying At Risk Students for Early Interventions A Time Series Clustering
168. Two Layer Clustering model for Mobile Customer Analysis
169. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
170. Consumer oriented web services ranking and classification
171. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
172. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
173. Collusion Defender: Preserving Subscribers’ Privacy in Publish and Subscribe Systems
174. Measures of Scatter and Fisher Discriminant Analysis for Uncertain Data
175. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
176. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
177. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
178. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
179. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
180. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
181. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
182. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


LATEST PROJECTS UPDATES
BIG DATA JAVA - NOSQL- MONGODB
183. Blockchain for AI
PYTHON - AI
184. A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
185. Fast Detection of Multiple Objects in Traffic Scenes With a Common Detection Framework
186. Object Tracking and Its Real-world Deployment via Reinforcement Learning
187. Text Detection and Recognition
188. Education data Analysis and Predict of Performance using Machine Learning
189. Design of QR Code based Mall Shopping Guide System
190. Blue Eyes Technology which identifies human emotions (sad, happy, Angry or surprised)
191. Automatic HTML Code Generation from Mock-up Images Using Machine Learning Techniques
192. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
193. Inferring Salient Objects from Human Fixations
194. ROTOSCOPING APPEARANCE MODELS
195. Event Management With Analysis - Python
196. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
197. Iris Recognition
198. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
199. Object Detection
200. Rainfall Rate Prediction
201. Drug Usage in Social Media
202. SUBWAY PASSENGER FLOW FORECASTING


Internet of things (IoT) -BLOCKCHAIN
IOT Under Developing - Topic
203. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
204. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
205. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
206. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
207. Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality
208. Review of Standard Ontologies for the Web of Things
IoT Projects
209. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
210. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
211. Who Moved My Data? Privacy Protection in Smartphones
212. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
213. IOT Projects
214. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
215. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
216. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
217. Trustworthy Electronic Voting Using Adjusted Blockchain Technology
218. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
219. Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors
220. Blockchain for AI
221. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


Soft Skill Development-BE,MCA,MSc- PYTHON, IOT, BLOCKCHAIN
PYTHON PROJECT WITH PLACEMENT TRAINING
222. Reinforcement learning - AI
223. Urban Street Cleanlines Assessment Using Mobile Edge Computing and Deep Learning
224. Fake News Analysis using Machine Learning - ML
225. Brain Tumor Detection Image Segmentation Using OpenCV
226. Blockchain for AI: Review and Open Research Challenges
227. Road Accident Analysis Using Machine Learning
228. E-assessment using image processing in ∞Exams
229. NLP - NATURAL LANGUAGE PROCESSING
230. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
231. Dengu Data Analysis Using R-program
232. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
233. Blockchain-assisted Public-key Encryption with Keyword Search against Keyword Guessing Attacks for Cloud Storage
234. Big Scholarly Data: A Survey
235. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
236. Big Data, Big Knowledge Big Data for Personalized Healthcare
237. Deduplication on Encrypted Big Data in Cloud
238. Secure Sensitive Data Sharing on a Big Data Platform
239. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
240. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
241. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
242. Self-Healing in Mobile Networks with Big Data
243. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
244. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
245. Child Monitoring - ANDROID APPS
246. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
247. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
248. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
249. Developing Apps for visually imapired people: Lessons learned from social network
250. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
251. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
252. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
253. Design of secure location and message sharing system for android platform
254. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
255. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
256. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
257. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
258. Privacy Protection based Access Control Scheme in Cloud-based Services
259. Privacy-Preserving Selective Aggregation of Online User Behavior Data
260. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
261. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


PhD Guidance
Cyber Security and Privacy
262. Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment
263. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
264. Blockchain for AI
Developing PhD proposal
265. Inferring Salient Objects from Human Fixations
266. ROTOSCOPING APPEARANCE MODELS
267. BRAIN SIZE ANALYSIS SYSTEM USING ML-ALGORITHM
268. Review of Standard Ontologies for the Web of Things
269. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
270. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
271. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
272. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
273. Approximate Data Aggregation in Sensor Equipped IoT Networks
274. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
275. Diabetics Dataset
276. MEDICAL DATA ANALYSES
277. R IEEE PROJECTS
278. PhD Project Guidance
279. PhD Projects


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
280. FISHING DISASTER MANAGEMENT SYSTEM
281. SPRING AND HIBERNATE


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
282. Two-Factor Data Security Protection Mechanism for Cloud Storage System
283. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
284. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
285. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
286. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
287. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
288. Where You Are Is Who You Are User Identification by Matching Statistics
289. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
290. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
291. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
292. Online Subgraph Skyline Analysis Over Knowledge Graphs
293. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
294. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
295. ID2S Password-Authenticated Key Exchange Protocols
296. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
297. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
298. Classification model to predict the learners' academic performance using big data
299. Electronic Commerce Meets the Semantic Web
300. Mining High Utility Patterns in One Phase without Generating Candidates
301. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
302. Automatic Generation of Social Event Storyboard from Image Click-through Data
303. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
304. Understanding Deep Representations Learned in Modeling Users Likes
305. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
306. Topic-Oriented Exploratory Search Based on an Indexing Network
307. Relevance Feedback Algorithms Inspired By Quantum Detection
308. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
309. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
310. Efficiently Estimating Statistics of Points of Interests on Maps
311. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
312. Aspect-level Influence Discovery from Graphs
313. Sentiment Embeddings with Applications to Sentiment Analysis
314. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
315. Resolving Multi-party Privacy Conflicts in Social Media
316. Encrypted Data Management with Deduplication in Cloud Computing
317. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
318. Crawling Hidden Objects with kNN Queries
319. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
320. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
321. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
322. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
323. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
324. Nearest Keyword Set Search in Multi-dimensional Datasets
325. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
326. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
327. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
328. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
329. Immutable Authentication and Integrity Schemes for Outsourced Databases
330. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
331. Server-Aided Public Key Encryption with Keyword Search
332. Online Learning in Large-Scale Contextual Recommender Systems
333. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
334. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
335. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
336. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
337. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
338. Multi-Modal Event Topic Model for Social Event Analysis
339. Social friend recommendation on multiple network correlation
340. Tag Based Image Search by Social Re-ranking
341. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
342. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
343. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
344. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
345. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
346. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
347. Packet-Scale Congestion Control Paradigm


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
348. Leveraging the Tail Time for Saving Energy in Cellular Networks
349. Keylogging-resistant Visual Authentication Protocols
350. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
351. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
352. Preserving Location Privacy in Geo-Social Applications
353. Efficient Authentication for Mobile and Pervasive Computing
354. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
355. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
356. Typicality-Based Collaborative Filtering Recommendation
357. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
358. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
359. Keyword Search Over Probabilistic RDF Graphs
360. Efficient Prediction of Difficult Keyword Queries over Databases
361. Interpreting the Public Sentiment Variations on Twitter
362. An Efficient Recommendation Method for Improving Business Process Modeling
363. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
364. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
365. On the use of Side Information for Mining Text Data
366. Privacy Preserving and Content Protecting Location based Queries
367. Fast Nearest Neighbor Search with Keywords
368. Towards Differential Query Services in Cost-Efficient Clouds
369. Facilitating Document Annotation using Content and Querying Value
370. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
371. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
372. Secure Outsourced Attribute-Based Signatures
373. Supporting Privacy Protection in Personalized Web Search
374. Dealing With Concept Drifts in Process Mining
375. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
376. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
377. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
378. Active Learning of Constraints for Semi-Supervised Clustering
379. Best Keyword Cover Search
380. Personalized Recommendation Combining User Interest and Social Circle
381. Online Feature Selection and Its Applications
382. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
383. Incremental Affinity Propagation Clustering Based on Message Passing
384. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
385. Secure kNN Query Processing in Untrusted Cloud Environments
386. Malware Propagation in Large-Scale Networks
387. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
388. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
389. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
390. Efficient Ranking on Entity Graphs with Personalized Relationships
391. Task Trail: An Effective Segmentation of User Search Behavior
392. Privacy-Preserving Enhanced Collaborative Tagging
393. XSPath Navigation on XML Schemas Made Easy
394. Security Evaluation of Pattern Classifiers under Attack
395. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
396. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
397. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
398. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
399. Nothing is for Free: Security in Searching Shared and Encrypted Data
400. SocialTube: P2P-assisted Video Sharing in Online Social Networks
401. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
402. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
403. Behavioral Malware Detection in Delay Tolerant Networks
404. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
405. Private Searching on Streaming Data Based on Keyword Frequency
406. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
407. On the Security of Trustee-Based Social Authentications
408. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
409. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
410. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
411. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
412. A Two-stage Deanonymization Attack Against Anonymized Social Networks
413. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
414. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
415. Scalable architecture for multi-user encrypted SQL operations on cloud database services
416. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
417. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
418. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
419. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
420. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
421. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
422. Secure kNN Query Processing in Untrusted Cloud Environments
423. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
424. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
425. A Hybrid Cloud Approach for Secure Authorized Deduplication
426. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
427. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
428. A Novel Model for Competition and Cooperation Among Cloud Providers
429. CLOUDQUAL: A Quality Model for Cloud Services
430. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
431. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
432. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
433. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
434. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
435. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
436. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
437. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
438. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
439. Enhanced Security for Association Rule Mining to secure Transactional Databases
440. Operational Pattern Revealing Technique in Text Mining
441. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
442. Personalized web search using Browsing history and domain Knowledge
443. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
444. Data Security the Challenge of Cloud Computing
445. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
446. A Cloud Enviroment for Backup and Data Storage


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
447. Rank-Based Similarity Search: Reducing the Dimensional Dependence
448. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
449. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
450. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
451. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
452. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
453. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
454. On the Security of data access control for multiauthority cloud storage system
455. Trust-based Service Management for Social Internet of Things Systems
456. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
457. Formalization and Verification of Group Behavior Interactions
458. Group Key Agreement with Local Connectivity
459. Data Lineage in Malicious Environments
460. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
461. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
462. Enabling Cloud Storage Auditing with Key-Exposure Resistance
463. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
464. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
465. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
466. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
467. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
468. Quantitative Reasoning About Cloud Security Using Service Level Agreements
469. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
470. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
471. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
472. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
473. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
474. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
475. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
476. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
477. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
478. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
479. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
480. Enabling Cloud Storage Auditing with Key-Exposure Resistance
481. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
482. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
483. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
484. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
485. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
486. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
487. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
488. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
489. Secure Auditing and Deduplicating Data in Cloud
490. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
491. Towards reproducibility in online social network Research
492. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
493. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
494. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
495. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
496. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
497. Making Digital Artifacts on the Web Verifiable and Reliable
498. Anonymizing Collections of Tree-Structured Data
499. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
500. FOCS: Fast Overlapped Community Search
501. Sparsity Learning Formulations for Mining Time-Varying Data
502. The Impact of View Histories on Edit Recommendations
503. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
504. Discovery of Ranking Fraud for Mobile Apps
505. Towards Effective Bug Triage with Software Data Reduction Techniques
506. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
507. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
508. Auditing for Distributed Storage Systems
509. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
510. Uploader Intent for Online Video: Typology, Inference and Applications
511. YouTube Video Promotion by Cross-network
512. Semantic-Improved Color Imaging Applications: It Is All About Context
513. Geolocalized Modeling for Dish Recognition
514. Learning to Rank Image Tags with Limited Training Examples
515. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
516. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
517. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
518. Tracking Temporal Community Strength in Dynamic Networks
519. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
520. Towards Information Diffusion in Mobile Social Networks
521. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
522. An Efficient Privacy-Preserving Ranked Keyword Search Method
523. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
524. Dispersing Instant Social Video Service Across Multiple Clouds
525. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
526. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
527. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
528. A Computational Dynamic Trust Model for User Authorization
529. Secure Distributed Deduplication Systems with Improved Reliability
530. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
531. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
532. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
533. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
534. User Action Interpretation for Online Content Optimization
535. Spatial Query Integrity with Voronoi Neighbors
536. Spatial Approximate String Search
537. Sensitive Label Privacy Protection on Social Network Data
538. Secure Mining of Association Rules in Horizontally Distributed Databases
539. Secure Logging As a Service Delegating Log Management to the Cloud
540. Robust Module-based Data Management
541. Ranking on Data Manifold with Sink Points
542. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
543. Privacy-Enhanced Web Service Composition
544. Privacy against Aggregate Knowledge Attacks
545. Preventing Private Information Inference Attacks on Social Networks
546. PMSE: A Personalized Mobile Search Engine
547. Personalized QoS-Aware Web Service Recommendation and Visualization
548. Optimal Client-Server Assignment for Internet Distributed Systems
549. Online Search and Buying Behaviour in Consumer Markets
550. M-Privacy for Collaborative Data Publishing
551. Mining User Queries with Markov Chains: Application to Online Image Retrieval
552. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
553. Incentive Compatible Privacy-Preserving Data Analysis
554. Improving Security and Efficiency in Attribute-Based Data Sharing
555. FoCUS: Learning to Crawl Web Forums
556. Fast Nearest Neighbor Search with Keywords
557. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
558. Facilitating Effective User Navigation through Website Structure Improvement
559. Facilitating Document Annotation using Content and Querying Value
560. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
561. Efficient Evaluation of SUM Queries over Probabilistic Data*
562. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
563. Dynamic Query Forms for Database Queries
564. Dynamic Personalized Recommendation on Sparse Data
565. Distributed Strategies for Mining Outliers in Large Data Sets
566. Crowdsourcing Predictors of Behavioral Outcomes
567. Co-Occurrence-Based Diffusion for Expert Search on the Web
568. Comparable Entity Mining from Comparative Questions
569. CloudMoV: Cloud-based Mobile Social TV
570. Anomaly Detection via Online Oversampling Principal Component Analysis
571. Anomaly Detection Approach Using Hidden Markov Model
572. Annotating Search Results from Web Databases
573. A System to Filter Unwanted Messages from OSN User Walls
574. A Survey of XML Tree Patterns
575. A Probabilistic Approach to String Transformation
576. A New Algorithm for Inferring User Search Goals with Feedback Sessions
577. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
578. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
579. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
580. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
581. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
582. Towards Differential Query Services in Cost-Efficient Clouds
583. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
584. SocialTube: P2P-assisted Video Sharing in Online Social Networks
585. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
586. QoS Ranking Prediction for Cloud Services
587. Priority-Based Consolidation of Parallel Workloads in the Cloud
588. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
589. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
590. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
591. Load Rebalancing for Distributed File Systems in Clouds
592. Label-Embedding for Attribute-Based Classification
593. IP-Geolocation Mapping for Moderately Connected Internet Regions
594. Identity-Based Secure Distributed Data Storage Schemes
595. Hint-based Execution of Workloads in Clouds with Nefeli
596. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
597. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
598. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
599. Efficient Two-Server Password-Only Authenticated Key Exchange
600. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
601. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
602. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
603. Winds of Change: From Vendor Lock-In to the Meta Cloud
604. Supporting the Migration of Applications to the Cloud through a Decision Support System
605. Storing Shared Data on the Cloud via Security-Mediator
606. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
607. Privacy-Preserving Public Auditing for Secure Cloud Storage
608. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
609. Outsourcing Privacy-Preserving Social Networks to a Cloud
610. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
611. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
612. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
613. Efficient Security Solution for Privacy-Preserving Cloud Services
614. Collaboration in Multicloud Computing Environments: Framework and Security Issues
615. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
616. Cloud-based DDoS Attacks and Defenses
617. Cloud computing for mobile users can offloading compution save energy
618. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
619. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
620. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
621. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
622. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
623. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
624. Two tales of privacy in online social networks
625. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
626. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
627. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
628. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
629. Security and Privacy-Enhancing Multicloud Architectures
630. Security Using Colors and Armstrong Numbers
631. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
632. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
633. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
634. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
635. Privacy Preserving Data Analytics for Smart Homes
636. On Inference-Proof View Processing of XML Documents
637. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
638. Extracting Spread-Spectrum Hidden Data from Digital Media
639. Efficiently Outsourcing Multiparty Computation under Multiple Keys
640. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
641. Craigslist Scams and Community Composition: Investigating Online Fraud
642. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
643. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
644. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
645. Super-Resolution-based Inpainting
646. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
647. Image Authentication Using Stochastic Diffusion
648. Hierarchical Super-Resolution-Based Inpainting
649. Circular Reranking for Visual Search
650. Bootstrapping Visual Categorization With Relevant Negatives
651. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
652. An extended visual cryptography scheme without pixel expansion for halftone images
653. An Adaptive Cloud Downloading Service
NETWORKING
654. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
655. Topological Conditions for In-Network Stabilization of Dynamical Systems
656. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
657. Price Differentiation for Communication Networks
658. Participatory Privacy: Enabling Privacy in Participatory Sensing
659. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
660. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
661. On the Role of Mobility for Multi-message Gossip
662. Fully Anonymous Profile Matching in Mobile Social Networks
663. Fault Node Recovery Algorithm for a Wireless Sensor Network
664. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
665. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
666. Access Policy Consolidation for Event Processing Systems
667. A Fast Re-Route Method
SOFTWARE ENGINEERING
668. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
669. Vampire attacks: Draining life from wireless ad-hoc sensor networks
670. Towards a Statistical Framework for Source Anonymity in Sensor Networks
671. Search Me If You Can: Privacy-preserving Location Query Service
672. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
673. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
674. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
675. Distributed Cooperative Caching in Social Wireless Networks
676. Community-Aware Opportunistic Routing in Mobile Social Networks
677. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
678. The Devils Behind Web Application Vulnerabilities
679. Security Architecture for Cloud Networking
680. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
681. Secure Overlay Cloud Storage with Access Control and Assured Deletion
682. Risk-Aware Mitigation for MANET Routing Attacks
683. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
684. Privacy-preserving Enforcement of Spatially Aware RBAC
685. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
686. pCloud: A Distributed System for Practical PIR
687. Packet-Hiding Methods for Preventing Selective Jamming Attacks
688. Online Modeling of Proactive Moderation System for Auction Fraud Detection
689. Fast and accurate annotation of short texts with Wikipedia pages
690. FADE: Secure Overlay Cloud Storage with File Assured Deletion
691. Ensuring Distributed Accountability for Data Sharing in the Cloud
692. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
693. Direct and Indirect Discrimination Prevention Methods
694. Detecting Spam Zombies by Monitoring Outgoing Messages
695. Detecting Anomalous Insiders in Collaborative Information Systems
696. Data-Provenance Verification For Secure Hosts
697. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
698. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
699. Payments for Outsourced Computations
700. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
701. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
702. Toward Private Joins on Outsourced Data
703. Statistical Entity Extraction from Web
704. Slicing: A New Approach to Privacy Preserving Data Publishing
705. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
706. Resilient Identity Crime Detection
707. Ranking Model Adaptation for Domain-Specific Search
708. Organizing User Search Histories
709. On the Spectral Characterization and Scalable Mining of Network Communities
710. Multiparty Access Control for Online Social Networks: Model and Mechanisms
711. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
712. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
713. How do Facebookers use Friendlists
714. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
715. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
716. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
717. Enabling Multilevel Trust in Privacy Preserving Data Mining
718. Enabling cross-site interactions in social networks
719. Efficient Similarity Search over Encrypted Data
720. Efficient Extended Boolean Retrieval
721. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
722. Efficient Anonymous Message Submission
723. Effective Pattern Discovery for Text Mining
724. DDD: A New Ensemble Approach for Dealing with Concept Drift
725. Credibility Ranking of Tweets during High Impact Events
726. Creating Evolving User Behavior Profiles Automatically
727. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
728. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
729. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
730. Anomaly Detection for Discrete Sequences: A Survey
731. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
732. Advance Mining of Temporal High Utility Itemset
733. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
734. Reliable Re-encryption in Unreliable Clouds
735. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
736. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
737. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
738. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
739. Gossip-based Resource Management for Cloud Environments
740. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
741. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
742. Cloud Data Protection for the Masses
743. Cloud Computing Security: From Single to Multi-Clouds
744. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
745. In Tags We Trust Trust modeling in social tagging of multimedia content
746. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
747. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
748. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
749. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
750. Cut Detection in Wireless Sensor Networks
751. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
752. TrickleDNS: Bootstrapping DNS Security using Social Trust
753. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
754. Policy-by-Example for Online Social Networks
755. Packet Loss Control Using Tokens at the Network Edge
756. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
757. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
758. Independent Directed Acyclic Graphs for Resilient Multipath Routing
759. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
760. Game-Theoretic Pricing for Video Streaming in Mobile Networks
761. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
762. Auditing for Network Coding Storage
763. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
764. Privacy Preserving Cloud Data Access With Multi-Authorities
765. Movie Rating and Review Summarization in Mobile Environment
766. IDSaaS: Intrusion Detection System as a Service in Public Clouds
767. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
768. BibPro: A Citation Parser Based on Sequence Alignment Techniques
769. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
770. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
771. RITAS: Services for Randomized Intrusion Tolerance
772. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
773. Nymble: Blocking Misbehaving Users in Anonymizing Networks
774. Modeling and Detection of Camouflaging Worm
775. Coding for Cryptographic Security Enhancement using Stopping Sets
776. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
777. Wireless Sensor Network Security model using Zero Knowledge Protocol
778. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
779. Throughput Optimization in Mobile Backbone Networks
780. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
781. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
782. Fast Data Collection in Tree-Based Wireless Sensor Networks
783. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
784. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
785. SPAF: Stateless FSA-based Packet Filters
786. Selfish Overlay Network Creation and Maintenance
787. ProgME: Towards Programmable Network MEasurement
788. Locating Equivalent Servants over P2P Networks
789. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
790. Buffer Sizing for 802.11 Based Networks
791. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
792. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
793. Improving Utilization of Infrastructure Clouds
794. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
795. CloudTPS: Scalable Transactions for Web Applications in the Cloud
796. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
797. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
798. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
799. Ranking Spatial Data by Quality Preferences
800. Making Aggregation Work in Uncertain and Probabilistic Databases
801. Load Shedding in Mobile Systems with MobiQual
802. Group Enclosing Queries
803. Extended XML Tree Pattern Matching: Theories and Algorithms
804. Effective Navigation of Query Results Based on Concept Hierarchies
805. Discovering Conditional Functional Dependencies
806. Decision Trees for Uncertain Data
807. Data Leakage Detection
808. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
809. Young Talent Tracker
810. Cricket Stadium Seat Booking
MODERN AGRICULTRE
811. i VILLAGE
812. International Plant Import and Export
OUR MODERN SOCITY
813. Helping Hands
814. SMART TAXI BOOKING
815. Metro Rail Corporation
816. Trained Volunteers Create A Successful Social Campaign
817. Finger thump Based Shopping Cart
818. Finger Print E-Voting Systems
819. Create a Successful Anti- Nuclear Campaign
820. Crowding Funding Mobilization
821. People Power of India
822. Modern Finger Print Voting System
823. Election Commission Management
824. Online Painting Auction
825. Reality Show Ticket Booking System
826. Online Broadway Motel Food Ordering System
827. Fashion Studio Model Management
828. Women's Selfhelp Group
Advance Health Care System
829. Gracelife - Charity one click away
830. Medical Reporting System
831. Organizing medical camp for public health development
832. Homeopathy Health Record
833. Consumer Legal Advicer
834. Raw Requried Online Medicine
835. Medical Record Authentication
MORDERN EDUCATION SYSTEM
836. I School
837. Job fair section process
838. Advertising in E-Book
839. Students Skills With Modern Industries
840. College Placement And College Event
841. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
842. Cloud Storage Public Digital Certificate
ERP PROJECTS
843. Customer Relationship Management
844. Corporate Trouble Shooter
845. Corporate Event Organisation
846. Engnering Lab Maintenance
847. Select Your Age(Business Motivation all age group)
848. Software Requirements Analysis for Client Side
849. ERP System (Enterprint Resource Plan
LATEST BANKING
850. User Opinion For Indian Banking Service And Cashless Economy
851. Advanced Banking System
852. EyeBank Management System
ONLINE CONSUMERS PROCESSING
853. Economic Usage of Solar Energy
854. Gps Consumers Complients
855. Online Softskills Tracks
856. Online Buy And Sale Software
857. Budget Home Design
858. Online Product Exchange
859. Jewellery Management
860. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
861. E TENDERING -JAVA
862. Moderate Robatics System with Public Opinion
Java Apps
863. Online overview of skills really used in jobs
864. Land Bank for Nursery
865. Developing Rural Economy
866. ECOPS - Electronics Police Record Management System
867. Website Evaluation Using Opinion Mining
868. Monitoring Suspicious Discussions on Online Forums Using Data Mining
869. INSURANCE MANAGEMENT SYSTEM
870. e-Fraud Prevention based on the Self- Authentication of e-Documents
871. Hope Center
872. Exam crazy
873. BUGS REPORTING SYSTEM
874. LOCATION BASED CONSUMER COMPLAINT
875. Speed Racing
876. ROADSTER
877. META CAFE
878. ONLINE VIDEO LOCKER
879. Management System in Metro Train
880. Plant Shopping on Web
881. Reporting Online Media News Systems
882. Informative Content Extraction
883. E-commerce Complaint Management System
884. Modern Agriculture Development System
885. Loan Online Application
886. Rural Community Developement
887. LOVE AND CARE
888. GREEN PLANT
889. Advance Couier Service
890. Community Awarness
891. E_Music
892. Staff Management System
893. E-TENDERING
894. Hotel Management
895. Crime File Management System
896. Cloud Cyber Attack
897. Cloud Cost Management for Customer Sensitive Data
898. Advance Web based Multimedia Answer Generation
899. Commaunity Awareness
900. E-Commerce Complaints
901. Modern Agriculture Development System
902. Plant Shopping on Web
903. ONLINE VIDEO LOCKER
904. ONLINE VIDEO LOCKER
905. Reporting Online Media News Systems
906. Online Plant Shopping
907. Community Awareness
908. Loan Online Application
909. Modern Agriculture Development System
910. Online Digital Library
911. Geo Base Services
912. Civil Supplies and Consumer Protection Department
913. Citizen Opinions vs Government Policies
914. Protecting Used Data Privacy for Attackers
915. Web Hospital Management
916. Easy SQL Query for Non-IT Manager
917. Online Shopping with Fraud detection
918. Efficient Spatial Query Processing
919. Cryptographic Key Exchange Authentication
920. Online Global Information Service Center
921. Contracts Business Events Management
922. Online Secure image Social Networks
923. Outsourcing of Online Image Reconstruction
924. Trust based Profile Matching Secure Social Network
925. Secure and Distance based Online Social Network (OSN)
926. Efficient Online Image Retrieval System
927. Data Sharing In Cloud Storage by Using Key-Aggregate
928. Multicast Key Management for Cloud
929. Face-to-face contact on Mobile Social Networks
930. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
931. Dynamically Growing Online Survey for Behavioral Outcomes
932. Advance Web based Multimedia Answer Generation
933. College Result Analysis with Horizontally Distributed Databases
934. Feedback Decision Support for mHealth monitoring
935. Exchange Secrete Key for Data Producers and Consumers
936. Efficient Information Retrieval Using Ranked Query (EIRQ)
937. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
938. Web Hosting On Cloud
939. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
940. Web Server Security with Web Client Management System
941. Web Parser on Sequence Alignment Techniques
942. Web Page re-Ranking System for Library
943. Web Eye
944. Voting System for Web Library
945. VIRTUAL CLASSROOM SYSTEM
946. Unique Web Resources Utilization Monitoring System
947. Transport Management System
948. Pre-paid Recharging System on Banking
949. Tollgate Management
950. Time To Time Stock Market Updater and Monitoring System
951. Sql Tuner
952. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
953. SMS Based Mobile Banking with Security
954. Sms Topup
955. Vendor Information System For Shipping
956. Sequential Anomaly Detection from User Behaviour
957. Secure SMS Transaction System on banking
958. Secure Online Documents Management System in Cloud
959. Secure File Uploading Server with Advance Protecting System
960. Secure File Monitoring System on Cloud
961. Relational Logic Search Engine On Healthcare
962. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
963. Quick Customer decision support on Web Sales Portal
964. Query Response System for File Management
965. Quality Visualization on Web TV
966. Project Work Tracking System
967. Product Market Manipulations on Asian stock market
968. Predicting Top Company Share Based on High Utility Data
969. Automation of Analysis and Development Management
970. Pharmacy Information System
971. Personalize Your News on Web
972. Online University
973. Online tagging for multimedia content
974. Online Search Ranking On Multiple Domain
975. Online Rental House Web Portal
976. Online Recruitment System
977. Online Real Estate Property Management
978. Online Multi Type Documents Search Engine
979. ONLINE MOBILE BILLING SYSTEM
980. Online Jewelry Management
981. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
982. Online Examination System
983. Online Ensemble Learning Approach
984. Online Banking With Fraud Detecting
985. Online Auction Bit
986. ONLINE ADVERTISING SYSTEM
987. Nutraceuticals Management System
988. Nearest Shopping Location Identification Systems
989. Multilevel Images Authentication Systems
990. Multi New Product Survey Management
991. Movie Recommender Systems via User- Item Subgroups
992. Movie Rating and Recommendation on Mobile
993. Modern Municipal Corporation
994. Mobile TV Quality Management
995. Mobile Banking WAP
996. Manifold Entrust Scheme
997. Management System in Train
998. Secure Mailing System
999. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1000. LEAVE MANAGEMENT SYSTEM FOR MNC
1001. Knowledge Based Decision Support System(KMS)
1002. Key Management for Content Integration
1003. Inter Bank Fund Transfer in Distributed Network
1004. Information and Knowledge Extracting from a large amount of data
1005. Industry Standard Authorization For Sensitive Resources
1006. Implementation and Validating Environmental and Health
1007. iKnoweb Extracting and Integrating Entity Information System
1008. HUMAN ASSURANCE ADMINISTRATION
1009. High_level network Security Using Packet Filtering
1010. High and Low Level SQL Query Executor
1011. GLOBAL COUNSELLING SYSTEM
1012. A Game Theory for Online Security
1013. Distributed Transaction Proxy
1014. Freelancer Job
1015. File Security With Multi Database System
1016. FILE SEARCH ENGINE
1017. Fertilizer Management System
1018. Fast Web Information Gathering with Alias Detection
1019. E-Tutor Online Jobs
1020. Enterprise Stock and Accounting System
1021. Ensuring Data Storage Security in Cloud Computing
1022. Encrypted IT Auditing on Cloud Computing
1023. Encrypted Data Storage Vs Data Against illegal Access
1024. Enabling Site Interaction In Social Community
1025. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1026. E-Music world
1027. Employee Resource Management
1028. Employee Management System
1029. E-Learning
1030. E Fraud Prevention based on the Self Authentication of e Documents
1031. Distribution System for Discount Sales
1032. Distributed Data Integration on Electricity Board
1033. Disease Information Hiding on Publishing Healthcare Data
1034. Digital Documents Attestation Systems
1035. Defending Against Web Application Vulnerabilities
1036. Defects Analysis Systems
1037. Data theft detection mobile cloud computing
1038. Data Base Fraud Detection Systems
1039. Customer Information Hiding for Data Mismanagement in Banking
1040. Company Security Reporting System(CSRS)
1041. E -Crime File Management System
1042. Credit Card Management System
1043. Corporate Requirement System
1044. Consumer Sales Online Fake Product Detection and Deletion
1045. Company Information Tracking System
1046. Cloud Policy-Based File Assure Deletion
1047. Cloud Data Theft Attacks
1048. Cloud Cyber Attacks against Social Networks
1049. Cloud Cost Management for Customer Sensitive Data
1050. Client Favorite Photo Search Engine on Web
1051. Citizen Card System
1052. Card Management System
1053. Design &Development of Car Parking and Automation Billing Systems
1054. Customer Care Service
1055. BPO Call Center
1056. Automation of IT Process Management
1057. Modeling and Automated Containment of Worms
1058. Attribute Key Based Data Security System
1059. As Needed Basis Accountability for Cloud Data Sharing
1060. Annotation of short texts With Wikipedia pages
1061. AIRLINE RESERVATION SYSTEM
1062. Advance User Management on Social Website
1063. A Semantic Web Based Scientific News Aggregator


Java Mini Projects
Mini Projects
1064. Website Tracking System
1065. Website Ranking System
1066. Treasure Warehouse
1067. Student Information System
1068. Storage security
1069. PRISON MANAGEMENT SYSTEM
1070. E-Licence Investigation System
1071. Online Secure File Transfer System
1072. Online Medicine Purchase
1073. ONLINE EDUCATION
1074. Online Agriculture System
1075. Mobile Survey
1076. ISSUE TRACKING SYSYTEM
1077. HOSPITAL MANAGEMENT SYSYTEMS
1078. HealthCare Management System
1079. Global Employee Acclaimer
1080. E-VOTING FOR ASSOCIATION
1081. Encrypted Register Form
1082. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1083. E INSURANCE
1084. Courier Tracking Systems
1085. corporate Transportation
1086. Collectorate Communication Systems
1087. Budget Approval System
1088. BLOOD BANK MANAGEMENT SYSTEMS
1089. ATTENDANCE MANAGEMENT SYSTEM
1090. Activity management


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
1091. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
1092. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
1093. NAIVE BAYES CLASSIFIER
1094. K - MEANS CLUSTERING
1095. LINEAR REGRESSION - PYTHON
1096. LATENT DIRICHLET ALLOCATION
1097. DIGITAL IMAGE PROCESSING - PYTHON
1098. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
1099. MACHINE LEARNING-ML ALGORITHM
1100. WHAT IS MACHINE LEARNING - AI
1101. NATURAL LANGAUAGE PROCESSING - NLP
1102. VISION - Visual Data


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
1103. R - ADVANCE IMAGE PROCESSING
1104. Dengu Data Analysis Using R-program
1105. Shopping Data set Analysis Using R Machine Learning
1106. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
1107. R PROGRAM TRAINING
1108. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
1109. COMAPRISON OF VARIOUS DOCKING SCORES
1110. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
1111. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
1112. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
1113. MICRO ARRAY GENE EXPRESSION ANALYSIS
1114. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
1115. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
1116. Diabetics Dataset
1117. Excercise Dataset
1118. MEDICAL DATA ANALYSES
1119. WEKA PRIVACY DATA SET ANALYSES


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
1120. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
1121. MRSIM: Mitigating Reducer Skew In MapReduce
1122. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
1123. HADOOP WITH HEALTHCARE DATA ANALYSYS
1124. HADOOP WEBLOG DATA ANALYSES
1125. BANK DATA ANALYTIC WITH HADOOP
1126. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1127. Bucket Based Data Deduplication Technique for Big Data Storage System
1128. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
1129. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
1130. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
1131. Efficient Recommendation of De-identification Policies using MapReduce
1132. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
1133. Big Scholarly Data: A Survey
1134. SocialQ&A: An Online Social Network Based Question and Answer System
1135. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1136. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1137. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
1138. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1139. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
1140. User-Centric Similarity Search
1141. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
1142. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
1143. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
1144. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
1145. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
1146. Processing Incomplete k Nearest Neighbor Search
1147. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
1148. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
1149. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
1150. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
1151. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
1152. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
1153. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
1154. Deduplication on Encrypted Big Data in Cloud
1155. Dynamic Resource Allocation for MapReduce with Partitioning Skew
1156. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
1157. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
1158. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
1159. Self-Healing in Mobile Networks with Big Data
1160. Secure Sensitive Data Sharing on a Big Data Platform
1161. Big Data, Big Knowledge: Big Data for Personalized Healthcare
1162. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
1163. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
1164. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1165. Differentially Private Frequent Itemset Mining via Transaction Splitting
1166. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
1167. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
1168. Fast Best-Effort Pattern Matching in Large Attributed Graphs


ANDROID APPS IEEE
IEEE TRANSACTIONS ON BIG DATA
1169. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
1170. BusTracking
1171. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
1172. Who Moved My Data? Privacy Protection in Smartphones
1173. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
1174. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
1175. Android User Privacy Preserving through Crowdsourcing
1176. DroidFusion: A Novel Multilevel Classifier Fusion Approach for Android Malware Detection
1177. Verbal Authentication for Personal Digital Assistants
1178. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
1179. Privacy-Preserving Aggregate Queries for Optimal Location Selection
1180. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
1181. 5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds
1182. Mobile Attendance using Near Field Communication And One-Time Password
1183. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
1184. Efficient Clue-based Route Search on Road Networks
1185. Privacy-Preserving Location-Proximity for Mobile Apps
1186. Cooperative Query Answer Authentication
1187. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
1188. Blood Bank APPS
1189. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
1190. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
1191. ZapDroid: Managing Infrequently Used Applications on Smartphones
1192. Searching Trajectories by Regions of Interest
1193. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
1194. A Classroom Scheduling Service for Smart Classes
1195. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
1196. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
1197. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
1198. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
1199. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1200. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
1201. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1202. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
1203. Authentication of Smartphone Users Using Behavioral Biometrics
1204. An Exploration of Geographic Authentication Schemes
1205. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
1206. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
1207. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
1208. Distributed secret sharing approach with cheater prevention
1209. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
1210. Efficient privacy preserving location based query over outsourced encrypted data
1211. Utilizing the Cloud to Store Hijacked Camera Images
1212. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
1213. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
1214. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
1215. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
1216. Enabling privacy preserving location proof for mobile users.
1217. Optimizing User Experience in Choosing Android Applications
1218. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
1219. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
1220. FoodForCare: An Android Application for Self-Care with Healthy Food
1221. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
1222. Silence is Golden: Enhancing Privacy of Location-Based Services
1223. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
1224. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
1225. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
1226. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
1227. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
1228. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
1229. Adapting to User Interest Drift for POI Recommendation
1230. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
1231. Developing Apps for visually imapired people: Lessons learned from social network
1232. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
1233. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
1234. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
1235. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
1236. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
1237. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
1238. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
1239. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1240. Mobile cloud support for semantic enriched speech recognition in social care
1241. Distributing secret sharing approach with cheater prevention based on QR code
1242. Design of Secure Location and Message Sharing System for Android Platform
1243. The impact of cloud technology on the automation of businesses
1244. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
1245. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
1246. Rescue Management System
1247. Android Army - Military Apps
1248. Android Beauty Parlor
1249. Android E Municipality
1250. ANDROID NURSE AID
1251. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
1252. Human Resource (HR)- APPS
1253. GPS Employee Tracking System
OUR MODERN SOCITY
1254. GENERIC MEDICINE
1255. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
1256. RECYCLE APP WASTE COLLECTION REUSE
1257. Bikes Rental - APPS
1258. Location Based Alarm - GPS
1259. ANDROID APPS FOR INSURANCE SYSTEM
1260. BUDGET HOME DESIGN -ANDROID APPS
1261. Former To Former Apps
1262. Pets Care
ONLINE CONSUMERS PROCESSING
1263. House Hold Appliancies Warranty Management
1264. GPS Transport Packers and Movers
Android Apps
1265. MY LIBRARY
1266. FACULTY RATING SYSTEM
1267. App for self organizer
1268. ONLINE DOCTOR APPOINTMENT
1269. Conference Event Mobile Assistant
1270. Mobile Prescription
1271. Metastore Application
1272. Android SmartCampus
1273. Android Shopping Mall
1274. TOLL GATE -Barcode Billing System --ANDROID
1275. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1276. Taste Hunt For Restaurants
1277. POLICE APPS
1278. Android Blood Bank
1279. Mobile Expense Claim System – Android
1280. Android Intelligent Time Tracking System TICK
1281. Android Course and Attendance Management System
1282. Android Event Reminder
1283. Android Attendance Assessment
1284. Android Advance Shopping
1285. Android CAR POOLING
1286. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1287. Android HOSPITAL
1288. ATHLETE MEET GUIDE
1289. Android Apps PARKING MANAGER
1290. Love and Care
1291. Food Waste Management System
1292. Travel Guide
1293. Android Provisional Store
1294. Best Baby Care with Vaccines Remainder
1295. Android Assist for Lecturer and Student
1296. Android Personal Assistance (PA)
1297. Android Application for College Management System
1298. Tollgate Payment system in android
1299. Intelligence Quotient (IQ) Test
1300. GPS LOCATION ALARM SYSTEM
1301. Location Based Intelligent Mobile Organizer
1302. BANK ACCOUNT TRACKER FOR ANDROID
1303. UNIT CONVERTER
1304. Tips and Tax Calculator in Android
1305. TEXT EDITOR FOR ANDROID
1306. Student Attendance Tracking System
1307. Smart Money With Daily Expenses
1308. Simple And Secure Android TO DO List Application
1309. Restaurant Table Order Management System
1310. Online Shopping
1311. Online Examination System For Android
1312. ANDROID SHOPPING LOCATION IDENTIFIER
1313. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1314. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1315. MICRO CREDIT BANKING ON SMARTPHONE
1316. LOCATION BASED ALARM
1317. Insurance in android
1318. GOOGLE PLACE FINDER
1319. Friend Mapper on Mobiles - Friend Locator
1320. EXPENSE MANAGER
1321. Employee Diractory
1322. Online job search
1323. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1324. ANDROID STUDENT RESULT ANALYZING SYSTEM
1325. CloudMoV : Cloud-based Mobile Social TV
1326. Bus Reservation
1327. Budget Planner
1328. Android SMS Systems
1329. ANDROID LEAVE MANAGEMENT SYSTEM
1330. ANDROID EVENT SCHEDULER/REMINDER
1331. Android Grocery Shopping List
1332. Android Attack Application
1333. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1334. A Mobile Phone Based Medicine In-take Reminder and Monitor


COLLEGE MINI PROJECTS
DOT NET MINI PROJECTS
PHP - MINI PROJECTS
JAVA -MINI PROJECT
PYTHON
1335. HOTEL MANAGEMENT
1336. GYM MANAGEMENT APPLICATION
1337. ONLINE BOOK STORE


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1338. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1339. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
1340. Optimizing Display Advertising Markets
1341. Using Knowledge Libraries to Transfer Expert Knowledge
1342. Semantic Retrieval of Trademarks Based on Conceptual Similarity
1343. Understanding and Predicting Question Subjectivity in Social Question and Answering
1344. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
1345. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
1346. Fast Top-K Path-based Relevance Query on Massive Graphs
1347. Web Image Search Re-ranking with Click-based Similarity and Typicality
1348. Automatically Mining Facets for Queries from Their Search Results
1349. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
1350. Statistical Entity Extraction from Web
1351. Question Answering System for an Effective Collaborative Learning
1352. Lost in Translation: Improving Decoy Documents via Automated Translation
1353. Learn to Personalized Image Search from the Photo Sharing Websites
1354. In Tags We Trust Trust modeling in social tagging of multimedia content
1355. Efficient Anonymous Message Submission
1356. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
1357. Employment Knowledge Database
1358. Organise Corporate Training For Client Project s
1359. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1360. ONLINE VEHICLE SHOWROOM SYSTEMS
1361. Online Voting
1362. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1363. School Management System
1364. Secure Online Course Automation
1365. School Automation System
1366. Online Aquarum
1367. Web Direct Recruitment Analysis
PHP Apps
1368. Project Approval System
1369. Movie Ticket Booking
1370. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1371. TRADE / INDUSTRY WEB PORTAL
1372. Feeding the poor from the supermarket
1373. Application for recording your goals and habits
1374. VISUAL WAY TO RAISE AWARENESS
1375. Municipal Corporation
1376. Online Polling For Publishers And Brands
1377. Avoid Food Wastage
1378. Web Doctor
1379. ONLINE FOOD ORDERING SYSTEM
1380. E-Tendering
1381. Improving Rural Communities
1382. Green Planet Awarness
1383. Development of an Online Course Portal for a campus
1384. Auxon Test
1385. WEB BASED LEARNING SYSTEM
1386. Tagging in online social networks
1387. Secured file Downloading system
1388. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1389. searching a image from websites
1390. Online University
1391. Online product Opinion and Ranking System
1392. MNC LEAVE MANAGEMENT SYSTEM
1393. Home appliances online purchase
1394. Freelancer Job
1395. E-Tutor Online Jobs
1396. Statistical Entity Extraction from Web
1397. Effective Collaborative Learning
1398. Development of an e-Post Office System
1399. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
1400. Towards Effective Bug Triage with Software Data Reduction Techniques
1401. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
1402. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
1403. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
1404. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
1405. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
1406. Proof of retrievability with public verifiability resilient against related-key attacks
1407. Secure Anonymous Key Distribution Scheme for Smart Grid
1408. Converses For Secret Key Agreement and Secure Computing
1409. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
1410. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
1411. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1412. Privacy Protection based Access Control Scheme in Cloud-based Services
1413. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
1414. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
1415. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1416. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1417. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1418. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1419. Explaining Missing Answers to Top-k SQL Queries
1420. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1421. Continuous Top-k Monitoring on Document Streams
1422. Generating Query Facets using Knowledge Bases
1423. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1424. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1425. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1426. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1427. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1428. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1429. Generating Query Facets using Knowledge Bases
1430. Private Over-threshold Aggregation Protocols over Distributed Datasets
1431. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1432. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1433. Privacy Protection based Access Control Scheme in Cloud-based Services
1434. Dynamic Facet Ordering for Faceted Product Search Engines
1435. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1436. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1437. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1438. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1439. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1440. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1441. A Recommendation System to Facilitate Business Process Modeling
1442. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1443. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1444. User Differentiated Verifiable File Search on the Cloud
1445. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1446. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1447. Incremental Consolidation of Data-Intensive Multi-flows
1448. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1449. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1450. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1451. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1452. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1453. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1454. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1455. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1456. TagBook: A Semantic Video Representation without Supervision for Event Detection
1457. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1458. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1459. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1460. The Impact of Review Environment on Review Credibility
1461. Private Over-threshold Aggregation Protocols over Distributed Datasets
1462. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1463. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1464. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1465. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1466. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1467. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1468. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1469. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1470. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1471. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1472. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1473. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1474. What Is Happening in The Video Annotate Video by Sentence
1475. Two level QR code for private message sharing and document authentication.
1476. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1477. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1478. Mining Health Examination Records A Graph-based Approach
1479. A Credibility Analysis System for Assessing Information on Twitter
1480. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1481. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1482. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1483. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1484. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1485. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1486. Predicting Personalized Image Emotion Perceptions in Social Networks
1487. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1488. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1489. Explaining Missing Answers to Top-k SQL Queries
1490. Bilevel Feature Extraction Based Text Mining
1491. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1492. Privacy-Preserving Outsourced Media Search
1493. Modeling and Verification of Online Shopping Business Processes
1494. User Preference Learning for Online Social Recommendation
1495. Steganalysis Features for Content-Adaptive JPEG Steganography
1496. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1497. PiCode: a New Picture-Embedding 2D Barcode
1498. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1499. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1500. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1501. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1502. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1503. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1504. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1505. Cloud workflow scheduling with deadlines and time slot availability
1506. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1507. Path-Based Epidemic Spreading in Networks
1508. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1509. On the Resiliency of Static Forwarding Tables
1510. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1511. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1512. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1513. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1514. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1515. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1516. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1517. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1518. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1519. Hacking is not random: a case-control study of webser ver-compromise risk
1520. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1521. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1522. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1523. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1524. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1525. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1526. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1527. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1528. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1529. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1530. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1531. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1532. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1533. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1534. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1535. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1536. Cross-Domain Feature Learning in Multimedia
1537. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1538. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1539. Saliency-based color accessibility
1540. Contextual Online Learning for Multimedia Content Aggregation
1541. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1542. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1543. An Attribute-assisted Reranking Model for Web Image Search
1544. RRW - A Robust and Reversible Watermarking
1545. Steganography Using Reversible Texture Synthesis
1546. Single Image Super-Resolution Based on Gradient Profile Sharpness
1547. Detection and Rectification of Distorted Fingerprints
1548. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1549. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1550. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1551. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1552. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1553. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1554. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1555. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1556. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1557. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1558. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1559. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1560. Authenticated Key Exchange Protocols for Parallel Network File Systems
1561. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1562. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1563. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1564. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1565. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1566. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1567. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1568. Context-based Diversification for Keyword Queries over XML Data
1569. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1570. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1571. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1572. Tweet Segmentation and Its Application to Named Entity Recognition
1573. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1574. Automatic Group Happiness Intensity Analysis
1575. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1576. Query Aware Determinization of Uncertain Objects
1577. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1578. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1579. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1580. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1581. Efficient Community Formation for Web Services
1582. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1583. Secure Mining of Association Rules in Hor izontally Distributed Databases
1584. Dynamic Query Forms for Database Queries
1585. Secure kNN Query Processing in Untrusted Cloud Environments
1586. An Empirical Performance Evaluation of Relational Keyword Search Systems
1587. Keyword Query Routing
1588. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1589. Demand Bidding Program and Its Application in Hotel Energy Management
1590. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1591. Incremental Detection of Inconsistencies in Distributed Data
1592. A Cocktail Approach for Travel Package Recommendation
1593. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1594. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1595. Analysis of Field Data on Web Security Vulnerabilities
1596. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1597. A Reliability Improvement Method for SOA-Based Applications
1598. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1599. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1600. Web Service Recommendation via Exploiting Location and QoS Information
1601. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1602. Exploiting Rateless Codes in Cloud Storage Systems
1603. COMIC:Cost Optimization for Internet Content Multihoming
1604. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1605. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1606. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1607. Uniform Embedding for Efficient JPEG Steganography
1608. Secure Deduplication with Efficient and Reliable Convergent Key Management
1609. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1610. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1611. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1612. Location Aware Keyword Query Suggestion Based on Document Proximity
1613. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1614. A secure data self-destructing scheme in cloud computing
1615. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1616. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1617. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1618. Secure kNN Query Processing in Untrusted Cloud Environments
1619. Exploiting Rateless Codes in Cloud Storage Systems
1620. Fuzzy Authorization for Cloud Storage
1621. Planning vs. dynamic control Resource allocation in corporate clouds
1622. Automatic Scaling of Internet Applications for Cloud Computing Services
1623. Strategy-proof Pricing for Cloud Service Composition
1624. Privacy Preserving Delegated Access Control in Public Clouds
1625. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1626. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1627. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1628. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1629. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1630. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1631. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1632. A Scientometric Analysis of Cloud Computing Literature
1633. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1634. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1635. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1636. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1637. FeatureMatch: A General ANNF Estimation Technique and its Applications
1638. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1639. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1640. As-Projective-As-Possible Image Stitching with Moving DLT
1641. Sharing Visual Secrets in Single Image Random Dot Stereograms
1642. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1643. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1644. A New Iterative Triclass Thresholding Technique in Image Segmentation
1645. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1646. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1647. An Iranian License Plate Recognition System Based on Color Features
1648. Learning Layouts for Single-Page Graphic Designs
1649. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1650. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1651. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1652. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1653. Fingerprint Compression Based on Sparse Representation
1654. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1655. LBP-Based Edge-Texture Features for Object Recoginition
1656. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1657. Toward Experiential Mobile Media Processing
1658. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1659. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1660. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1661. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1662. Designing Truthful Spectrum Double Auctions with Local Markets
1663. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1664. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1665. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1666. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1667. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1668. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1669. A Study on Clinical Prediction Using Data Mining Techniques
1670. Online Payment System using Steganography and Visual Cryptography
1671. Efficient Instant-Fuzzy Search with Proximity Ranking
1672. Attribute Based Encryption with Privacy Preserving In Clouds
1673. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1674. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1675. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1676. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1677. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1678. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1679. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1680. The Target Tracking in Mobile Sensor Networks
1681. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1682. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1683. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1684. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1685. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1686. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1687. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1688. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1689. SUSIE: Search Using Services and Information Extraction
1690. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1691. Secure Mining of Association Rules in Horizontally Distributed Databases
1692. Sampling Online Social Networks
1693. Privacy Preserving Delegated Access Control in Public Clouds
1694. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1695. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1696. Ginix : Generalized Inverted Index for Keyword Search
1697. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1698. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1699. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1700. Dynamic Query Forms for Database Queries
1701. Cost-Based Optimization of Service Compositions
1702. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1703. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1704. Automatic Extraction of Top-k Lists from the Web
1705. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1706. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1707. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1708. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1709. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1710. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1711. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1712. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1713. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1714. Privacy Preserving Data Sharing With Anonymous ID Assignment
1715. Non-Cooperative Location Privacy
1716. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1717. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1718. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1719. Cloud based emails boundaries and vulnerabilities
1720. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1721. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1722. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1723. Optimal Content Downloading in Vehicular Networks
1724. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1725. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1726. View-invariant action recognition based on Artificial Neural Networks
1727. User-aware Image Tag Refinement via Ternary Semantic Analysis
1728. Separable Reversible Data Hiding in Encrypted Image
1729. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1730. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1731. Robust Face-Name Graph Matching for Movie Character Identification
1732. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1733. Improving Color Constancy by Photometric Edge Weighting
1734. Exploring the design space of social network-based Sybil defenses
1735. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1736. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1737. AnnoSearch: Image Auto-Annotation by Search
1738. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1739. Scalable Scheduling of Updates in Streaming Data Warehouses
1740. Scalable Learning of Collective Behavior
1741. Ranking Model Adaptation for Domain-Specific Search
1742. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1743. Outsourced Similarity Search on Metric Data Assets
1744. Organizing User Search Histories
1745. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1746. Mining Web Graphs for Recommendations
1747. Joint Top K Spatial Keyword Query Processing
1748. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1749. Identifying Content for Planned Events Across Social Media Sites
1750. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1751. Generative Models for Item Adoptions Using Social Correlation
1752. Efficient Data Mining for XML Queries Answering Support
1753. Efficient audit service outsourcing for data integrity in clouds
1754. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1755. Effective Pattern Discovery for Text Mining
1756. Combined Mining: Discovering Informative Knowledge in Complex Data
1757. Decentralized Probabilistic Text Clustering
1758. Computing Structural Statistics by Keywords in Databases
1759. Bridging Social and Data Networks
1760. Answering General Time-Sensitive Queries
1761. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1762. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1763. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1764. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1765. Resource-Aware Application State Monitoring
1766. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1767. Query Access Assurance in Outsourced Databases
1768. Linear and Differential Cryptanalysis
1769. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1770. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1771. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1772. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1773. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1774. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1775. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1776. ROAuth: Recommendation Based Open Authorization
1777. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1778. Recommendation Models for Open Authorization
1779. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1780. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1781. On Privacy of Encrypted Speech Communications
1782. OAuth Web Authorization Protocol
1783. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1784. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1785. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1786. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1787. Fast Matrix Embedding by Matrix Extending
1788. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1789. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1790. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1791. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1792. Measuring Code Quality to Improve Specification Mining
1793. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1794. Towards Secure and Dependable Storage Services in Cloud Computing
1795. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1796. Remote Display Solutions for Mobile Cloud Computing
1797. Privacy Preserving Delegated Access Control in Public Clouds
1798. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1799. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1800. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1801. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1802. Load-Balancing Multipath Switching System with Flow Slice
1803. Assessing the Veracity of Identity Assertions via OSNs
1804. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1805. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1806. A New Cell-Counting-Based Attack Against Tor
1807. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1808. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1809. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1810. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1811. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1812. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1813. Fast Release Capture Sampling in Large-Scale Sensor Networks
1814. Cooperative download in vehicular environments
1815. Cooperative Data Dissemination via Roadside WLANs
1816. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1817. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1818. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1819. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1820. Hiding Sensitive Association Rule for Privacy Preservation
1821. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1822. Development of Certificate Authority Services for Web Applications
1823. Detecting and Validating Sybil Groups in theWild
1824. Association Rule Extracting Knowledge Using Market Basket Analysis
1825. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1826. Valuable Detours: Least-Cost Anypath Routing
1827. Self-Reconfigurable Wireless Mesh Networks
1828. Reliability in Layered Networks with Random Link Failures
1829. NABS:Novel Approaches for Biometric Systems
1830. Live Streaming with Receiver-based Peer-division Multiplexing
1831. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1832. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1833. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1834. Virtualized Screen: A Third Element for CloudMobile Convergence
1835. Steganographic Embedding in JPEG Images with Visual Criterion
1836. On the Typical Statistic Features for Image Blind Steganalysis
1837. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1838. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1839. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1840. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1841. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1842. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1843. Vulnerability Analysis in SOA-Based Business Processes
1844. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1845. Service-Centric Framework for a Digital Government Application
1846. Server-Side Streaming Processing of WS-Security
1847. OWLPath: An OWL Ontology-Guided Query Editor
1848. Monitoring Service Systems from a Language-Action Perspective
1849. Extracting Product Features and Sentiments from Chinese Customer Reviews
1850. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1851. Automated Certification for Compliant Cloud-based Business Processes
1852. Addressing Dependability throughout the SOA Life Cycle
1853. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1854. The Geometric Efficient Matching Algorithm for Firewalls
1855. Secure Service-Oriented Architecture for Mobile Transactions
1856. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1857. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1858. Privacy-Preserving Updates to Anonymous and Confidential Databases
1859. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1860. IPAS: Implicit Password Authentication System
1861. Improving Security and Performance in the Tor Network through Tunable Path Selection
1862. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1863. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1864. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1865. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1866. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1867. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1868. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1869. Data Delivery Properties of Human Contact Networks
1870. Converge-Cast: On the Capacity and Delay Tradeoffs
1871. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1872. USHER: Improving Data Quality with Dynamic Forms
1873. The World in a Nutshell: Concise Range Queries
1874. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1875. Scalable Scheduling of Updates in Streaming Data Warehouses
1876. Scalable Learning of Collective Behavior
1877. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1878. Publishing Search Logs A Comparative Study of Privacy Guarantees
1879. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1880. Optimal Service Pricing for a Cloud Cache
1881. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1882. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1883. Mining Web Graphs for Recommendations
1884. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1885. Integration of Sound Signature Authentication System
1886. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1887. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1888. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1889. Exploring Application-Level Semantics for Data Compression
1890. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1891. Data Leakage Detection
1892. Cost-aware rank join with random and sorted access
1893. Collaborative Filtering with Personalized Skylines
1894. Bridging Socially-Enhanced Virtual Communities
1895. Automatic Discovery of Personal Name Aliases from the Web
1896. A Personalized Ontology Model for Web Information Gathering
1897. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1898. A Query Formulation Language for the Data Web
1899. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1900. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1901. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1902. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1903. Towards Secure and Dependable Storage Services in Cloud Computing
1904. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1905. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1906. Data Integrity Proofs in Cloud Storage
1907. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1908. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1909. Feature-level Sentiment Analysis for Chinese Product Reviews
1910. Equal-sized Cells Mean Equal-sized Packets in Tor?
1911. Customer Relationship Management Based on Data Mining Technique
1912. Authentication Schemes for Session Passwords using Color and Images
1913. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1914. Online Trends Management Service in It Industry
1915. Session Management System in It Industry
1916. Tools for Non IT Expert Developer
ERP PROJECTS
1917. New Company Policy Clearance System
1918. Recommend To Friend
1919. Consultanting About the Foreign Peoples
1920. Performance System Analysis In Industry
1921. Non It People Performance
MODERN AGRICULTURE
1922. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1923. Agriculture Marketing in Generation
1924. Agriculture Assist
1925. Sponsor For Agriculture
SPORTS
1926. Play Ground Booking
OUR MODERN SOCITY
1927. ADHAR VOTING SYSTEM
1928. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1929. RAILWAY SEAT RESERVATION SYSTEM
1930. Railway Management Service
1931. It Park Media
1932. Automation Transport Maintance
1933. Yell Help For Children
1934. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1935. Apartment Maintenance
1936. Power Consumption Monitoring House Hold Electronic Device
1937. Direct Q Less Reservation System in train
Advance Health Care System
1938. MAC Sensing Protocol
1939. World Wide Cloud Inter Hospital Acess Health Care System
1940. Live Doctor
Dotnet Apps
1941. TELEVISION CHANNEL PROGRAM MANAGEMENT
1942. WIN THE TRUST OF AN INDIAN CONSUMER
1943. ONLINE ACCOUNT MANAGEMENT
1944. SMART CAB BOOKING SYSTEM
1945. ONLINE FAST FOOD ORDER
1946. Travel Mate Add Module
1947. Work Order System Call Centre
1948. SPORTS MANAGEMENT SYSTEM
1949. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1950. Pick-It Courier Service
1951. Online Taxi Booking
1952. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1953. INCOMETAX MAINTAINANCE SYSTEM
1954. Hotel Reservation
1955. ERP System
1956. Bug Tracking System
1957. Vendor Information System For Shiping
1958. Top-K ranking System
1959. Secure Medical Image Archive System
1960. Business Activity Coordination Using Web Services
1961. Management Portal
1962. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1963. Secure Data Filtering Recommendation System
1964. Online Resources Sharing via Social Networks
1965. Secure self-destructing in Cloud Computing
1966. Web Resourecs File Authorization Management
1967. Click based image re-ranking system
1968. Tree Structure Data Analiysis Mining
1969. Web Resource Allocation for CorPerate
1970. Web Vulnerabilities and Security
1971. Fuzzy Cloud Search Using XML
1972. Cloud Data Supporting Secure Query Search
1973. Tour Recommender Systems on Web
1974. Distributed Interactive Web Applications
1975. Secure Query Processing for Cloud
1976. Online Data Storage with less pricing
1977. Cost Based Web Content Managemnts
1978. Web Hospital Management
1979. Online Data storage with low price
1980. Secure Online Data Block Authorization
1981. Profitable Onlin web Server System
1982. Online Economies File Manager for Multi Keying
1983. Online Community Management
1984. Key based Online Data Managements
1985. Critical Workflow Management for Web Documents
1986. Secure Online Documents Managements for Group Sharing
1987. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1988. Online Marketing Automation System
1989. Internal organization change management System
1990. Secure confirmation of sensitive transaction data in modern Internet banking services
1991. Privacy security with TPA in cloud computing
1992. Company Information Tracking System
1993. Online Virtualized screen Processing
1994. Web Service for Airline Management
1995. Web Social Club
1996. Quantum Key Cryptography
1997. Patient Data Management Based On Hospital Location
1998. Online Software Developer Community
1999. Online Developed Software sales
2000. Avoid repeated measurements On Genetics Dataset
2001. College Lab Maintenance System
2002. Industrial Manpower Resource Organizer
2003. Web Query Construction and Search on Complex Data
2004. Hospital Emergency Data Management
2005. Data confidentiality On Health-care Information System
2006. Secure Online Trading
2007. Fast Real-Time Event Alert Using social Network
2008. Secure E-Mail Organizer
2009. Web User Service Management System
2010. Easy SQL Query for Non-IT Manager
2011. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
2012. Customer Relationship Management (CRM) on Banking
2013. Online Company ERP System
2014. Constructing E-Tourism
2015. Web based Multi Service Ranking System
2016. Dynamic Customer Data Hiding in Banking
2017. Online Distributed Social Clubs
2018. Virtual Shopping with Negative Feedback Reputation Systems
2019. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
2020. Web Service Oriented Query Authentication Technique
2021. Web Based Customer Favorite vehicle Search Engine
2022. Web Based Book Publishing System
2023. Virtual Energy- Based Encryption and Keying
2024. Video Fraud Detecting On social Network
2025. Video Compression with Data hiding & Data Extraction
2026. Vendor Information System for Shipping
2027. VALUE ADDED TAX (VAT)
2028. Universal Smart Card
2029. Ultimate Location Information Systems
2030. Top K Ranking System
2031. Techno Task Manager
2032. Supply Chain Management
2033. Substitution-Permutation cryptanalysis System
2034. Streaming Data Warehouse Updations
2035. Step by Step Monitoring for Product Purchasing System
2036. Steganography for Data Reading and Writing AVI files
2037. SQL TUNER
2038. SMS Transaction Security
2039. Session Authentication Passwords using Color
2040. Service Availability Guarantees on Virtual Economy
2041. Server Fraud Detection on Cloud
2042. Sentence Based Search on Cloud
2043. Semantic Web Search Engines
2044. Secured Image communicator
2045. Secure smart application on web application
2046. Secure Service-Oriented Smartcard systems
2047. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
2048. Secure Location Identification System
2049. Secure and Cloud Based Patient Information Systems
2050. Reduce the Password Guessing Attacks using Click Point
2051. Recommendation System Based on Graph
2052. Quantum Key Cryptography
2053. Quality Controller
2054. Public Web Status Monitoring System
2055. Project Trade Pool
2056. Product Marketing Analysis On Public Opinion
2057. Predicting Users Behaviors Using Web Mining
2058. Personal Health Information on M-Healthcare Emergency
2059. Optimum Online Knowledge Base
2060. Online Training Program
2061. Online Time sensitive queries
2062. Online Tag Based Image Retrieval and Effective Management
2063. Online Social networks controls using cloud
2064. Online Rental System
2065. Online product Opinion and Ranking System
2066. Online Dynamic form creation for Non-IT Peoples
2067. Online Digital Contract Signing in Mistrusted Parities
2068. Online Aventure
2069. Online Shopping
2070. News Ticker Project
2071. Net Bank in Recharge
2072. Multi User Public Auditing System of Data Storage Security
2073. Multi Location Networked Mobile Auto Intimates
2074. Modern Distributed Business Applications for Supply Chain Management
2075. Market Intelligence Based Public Sentiment Analysis
2076. Leave Management System
2077. Joint processing of spatial keyword queries
2078. Intelligence Missing Items in Shopping Cart
2079. Information Leak Detection and Prevention
2080. Industrial Manpower Resource Organizer
2081. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
2082. Human Expertise Search Engine
2083. Home appliances online Purchase
2084. High Secure Corporate Web Search Engine
2085. High Degree Patient Privacy on Secure Data Outsourcing
2086. Group Movement Pattern Discovery
2087. Graph Based Share Market Data Updating
2088. Generic Business Portal
2089. Flight Booking Portal
2090. Firewall using Packet Filtering
2091. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
2092. Ethical and Social issues in File sharing system
2093. Enterprener Sales Report Management
2094. Encyclopedia for Computer Science
2095. Employee Based Performance Monitoring and Action Systems
2096. Emerging Patient Health Information Exchange System On Cloud
2097. Efficient Search on Outsourced data using Cloud
2098. Efficient and Secure Data Processing on Queries Similarity
2099. Distributed Database Optimization on HealthCare
2100. Digital Asset Management Systems (DAMS) Using Watermarking
2101. Detecting Fraud on Vehicle Insurance System
2102. Defeating Lazy Servers Database Vs Query Access Assurance
2103. Data Processing for Disease-Treatment Relations
2104. Data Mining Analysis on EB bill system
2105. Data confidential against untrusted servers using attribute-based encryption (ABE)
2106. Data Aggregation using SQL clustering
2107. Customer Sales Analysis System Based On Purchasing
2108. Cryptography on Personal confidential information
2109. Cost Based Secure Cloud Data Systems
2110. Market Based Analysis for consumer correct decision
2111. Construction Company Work Order System
2112. Complete Medical Transcription System(Mts)
2113. Company Security Reporting System(CSRS)
2114. College Result Analysis
2115. Cloud Economic Benefit On Scientific Computing
2116. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
2117. Centralized Event Planer across Social Media Sites
2118. Call Center Management
2119. A Reservation-Based Coordination Protocol for Web Services
2120. Building construction and cost estimation
2121. Budget Planner
2122. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
2123. Automatically identifying query groups on Web Search Engine
2124. Auditing Data integrity and data storage using cloud
2125. Application layer blocker for preventing on cyber security
2126. Advanced One-Click User Web Search Engine
2127. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
2128. VALUE ADDED TAX (VAT)
2129. User Oriented Network Attacks
2130. Secure Back Up
2131. Screen Capture And Mouse I/O
2132. Sales Bill Printing System using Excel
2133. Password Security
2134. Online User Mobile Rating
2135. Online Sensex Graph System
2136. Online Book Publishing
2137. NEWS TICKER PROJECT
2138. Multi Storage file
2139. Message Chating
2140. Medical Equipment in WAP
2141. Login Authentication Scheme
2142. Information Alert System
2143. Image Encryption And Decryption
2144. Generic Business Portal
2145. Flight Booking Portal
2146. File Transfer using Cryptography Techniques
2147. File Splitting
2148. Excel Format in Report
2149. EB Management System
2150. Dynamic Web Form Creation
2151. Android Image Search


Struts Application Projects
Struts Apps
2152. Public Sentiment Analysis with Online Shopping Using Struts
2153. Modern distributed business for supply-chain management
2154. High Confidential Personal Disease Reporting System
2155. Distributor Sensitive Data Management Using Struts
2156. Development of Certificate Authority Services for Web Applications
2157. Access Control on User-To-User Interactions in Social Networks


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2158. Sponsor For Agriculture
2159. Agriculture Assist
2160. Agriculture Marketing in Generation
2161. International Plant Import and Export
MODERN EDUCATION SYSTEM
2162. Old In Gold
2163. I School
2164. College Placement And Events
2165. Rural Area Educational Trouble Shooter
2166. Web Direct Recruitment Analysis
2167. Online Aquarum
2168. School Automation System
2169. Secure Online Course Automation
2170. Session Management System in It Industry
2171. Tools for Non IT Expert Developer
2172. Students Skills With Modern Industries
MODERN TECHNOLOGY
2173. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2174. Customer Favarate Greeting Card Design
2175. GPS Transport Packers and Movers
2176. House Hold Appliancies Warranty Management
2177. Direct Q Less Reservation System in train
2178. Power Consumption Monitoring House Hold Electronic Device
2179. Apartment Maintenance
2180. Budget Home Design
2181. Online Buy And Sale Software
2182. Online Softskills Tracks
2183. Gps Consumers Complients
2184. Economic Usage of Solar Energy
Advance Health Care System
2185. Organizing medical camp for public health development
2186. LIVE WEB DOCTOR CONSULTATION
2187. World Wide Cloud Inter Hospital Acess Health Care System
2188. MAC Sensing Protocol
2189. Medical Record Authentication
2190. Raw Requried Online Medicine
2191. Consumer Legal Advicer
2192. Homeopathy Health Record
SPORTS
2193. Play Ground Booking
2194. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2195. Cloud Storage Public Digital Certificate
ERP PROJECTS
2196. Corporate Trouble Shooter
2197. Entrepreneur Fault Analysis
2198. Organise Corporate Training For Client Projects
2199. Employment Knowledge Database
2200. GPS Employee Tracking System
2201. Non It People Performance
2202. Performance System Analysis In Industry
2203. Consultanting About the Foreign Peoples
2204. Recommend To Friend
2205. New Company Policy Clearance System
2206. ERP System (Enterprint Resource Plan
2207. Software Requirements Analysis for Client Side
2208. Select Your Age(Business Motivation all age group)
2209. Engnering Lab Maintenance
2210. Corporate Event Organisation
LATEST BANKING
2211. EyeBank Management System
2212. Advanced Banking System
OUR MODERN SOCIETY
2213. Trained Volunteers Create A Successful Social Campaign
2214. Finger thump Based Shopping Cart
2215. Railway Management Service
2216. Create a Successful Anti- Nuclear Campaign
2217. Crowding Funding Mobilization
2218. People Power of India
2219. Pets Care
2220. Feature in Best Potitical Leader in India
2221. Yell Help For Children
2222. Automation Transport Maintance
2223. It Park Media
2224. Online Painting Auction
2225. Election Commission Management
2226. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2227. ANDROID APPS FOR INSURANCE SYSTEM
2228. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2229. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2230. ANDROID APPS FOR DOCTOR APPOINTMENT
2231. LIVE WEB DOCTOR CONSULTATION
2232. ANDROID APPS ON DOCTOR WITH NURSE
2233. HOSPITAL ANDROID APPS
2234. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2235. Fertilizer Management System -Java, JSP, MySQL
2236. Land Bank for Nursery -Java, JSP, MySQL
2237. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2238. FORMER APPS - ANDROID
2239. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2240. Online Banking with Fraud Detecting- Java JSP, MySQL
2241. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2242. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2243. Big Scholarly Data: A Survey
2244. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Whatsapp : 09566137117
Support : 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved
o