Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
HOT IT SOFT SKILLS Internet of things (IoT) PYTHON PROJECT R - DATA SCIENCE - ML
BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB BIG DATA - HADOOP PROJECTS WEKA-Machine Learning
MACHINE LEARNING-ML(Data Scientist) PhD Projects JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18
ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP ANDROID APPS
IEEE PHP Projects 2017-18 IEEE PHP Projects PHP Application Projects ASP.NET MVC Framework
JAVA IEEE 2017-18 JAVA IEEE 2016-17 Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects
IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project Dot Net IEEE 2017-18
ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18 RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17
Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects
IEEE 2011-2012 Dotnet Projects Java Application Projects Dotnet Application Projects Dotnet Mini Projects
Struts Application Projects Java Mini Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS
HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS RESTful Web services
 
HOT IT SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
1. NLP - NATURAL LANGUAGE PROCESSING
2. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
3. Dengu Data Analysis Using R-program
4. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
5. Big Scholarly Data: A Survey
6. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
7. Big Data, Big Knowledge Big Data for Personalized Healthcare
8. Deduplication on Encrypted Big Data in Cloud
9. Secure Sensitive Data Sharing on a Big Data Platform
10. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
11. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
12. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
13. Self-Healing in Mobile Networks with Big Data
14. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
15. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
16. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
17. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
18. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
19. Developing Apps for visually imapired people: Lessons learned from social network
20. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
21. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
22. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
23. Design of secure location and message sharing system for android platform
24. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
25. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
26. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
27. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
28. Privacy Protection based Access Control Scheme in Cloud-based Services
29. Privacy-Preserving Selective Aggregation of Online User Behavior Data
30. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
31. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


Internet of things (IoT)
IoT Projects
32. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
33. Who Moved My Data? Privacy Protection in Smartphones
34. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
35. IOT Projects
36. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
37. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
38. FogRoute: DTN-based Data Dissemination Model in Fog Computing


PYTHON PROJECT
PYTHON TRAINING WITH PROJECT
39. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
40. NLP - NATURAL LANGUAGE PROCESSING
41. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
42. Image Based Appraisal of Real Estate Properties-IEEE 2017
43. FOOD WASTE ORGANIZER
44. PYTHON PROJECT FLOW
45. PYTHON PROGRAM EXECUTION
46. PYTHON INSTALLATION


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
47. R - ADVANCE IMAGE PROCESSING
48. Dengu Data Analysis Using R-program
49. Shopping Data set Analysis Using R Machine Learning
50. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
51. R PROGRAM TRAINING
52. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
53. COMAPRISON OF VARIOUS DOCKING SCORES
54. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
55. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
56. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
57. MICRO ARRAY GENE EXPRESSION ANALYSIS
58. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
59. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
60. Bucket Based Data Deduplication Technique for Big Data Storage System
61. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
62. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
63. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
64. Efficient Recommendation of De-identification Policies using MapReduce
65. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
66. Big Scholarly Data: A Survey
67. SocialQ&A: An Online Social Network Based Question and Answer System
68. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
69. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
70. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
71. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
72. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
73. User-Centric Similarity Search
74. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
75. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
76. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
77. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
78. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
79. Processing Incomplete k Nearest Neighbor Search
80. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
81. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
82. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
83. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
84. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
85. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
86. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
87. Deduplication on Encrypted Big Data in Cloud
88. Dynamic Resource Allocation for MapReduce with Partitioning Skew
89. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
90. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
91. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
92. Self-Healing in Mobile Networks with Big Data
93. Secure Sensitive Data Sharing on a Big Data Platform
94. Big Data, Big Knowledge: Big Data for Personalized Healthcare
95. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
96. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
97. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
98. Differentially Private Frequent Itemset Mining via Transaction Splitting
99. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
100. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
101. Fast Best-Effort Pattern Matching in Large Attributed Graphs


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
102. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
103. MRSIM: Mitigating Reducer Skew In MapReduce
104. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
105. HADOOP WITH HEALTHCARE DATA ANALYSYS
106. HADOOP WEBLOG DATA ANALYSES
107. BANK DATA ANALYTIC WITH HADOOP
108. HADOOP TRAINING


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
109. Diabetics Dataset
110. Excercise Dataset
111. MEDICAL DATA ANALYSES
112. WEKA PRIVACY DATA SET ANALYSES


MACHINE LEARNING-ML(Data Scientist)
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
113. Dengu Data Analysis Using R-program
114. Shopping Data set Analyse Using R Machine Learning
115. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
116. Polynomial Time Algorithm-PTA
117. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
118. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
119. K-Means For Clustering


PhD Projects
Developing PhD proposal
120. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
121. Diabetics Dataset
122. MEDICAL DATA ANALYSES
123. R IEEE PROJECTS
124. PhD Project Guidance
125. PhD Projects


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
126. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
127. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
128. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
129. Who Moved My Data? Privacy Protection in Smartphones
130. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
131. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
132. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
133. Privacy-Preserving Aggregate Queries for Optimal Location Selection
134. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
135. Efficient Clue-based Route Search on Road Networks
136. Privacy-Preserving Location-Proximity for Mobile Apps
137. Cooperative Query Answer Authentication
138. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
139. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
140. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
141. ZapDroid: Managing Infrequently Used Applications on Smartphones
142. Searching Trajectories by Regions of Interest
143. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
144. A Classroom Scheduling Service for Smart Classes
145. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
146. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
147. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
148. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
149. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
150. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
151. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
152. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
153. Authentication of Smartphone Users Using Behavioral Biometrics
154. An Exploration of Geographic Authentication Schemes
155. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
156. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
157. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
158. Distributed secret sharing approach with cheater prevention
159. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
160. Efficient privacy preserving location based query over outsourced encrypted data
161. Utilizing the Cloud to Store Hijacked Camera Images
162. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
163. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
164. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
165. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
166. Enabling privacy preserving location proof for mobile users.
167. Optimizing User Experience in Choosing Android Applications
168. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
169. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
170. FoodForCare: An Android Application for Self-Care with Healthy Food
171. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
172. Silence is Golden: Enhancing Privacy of Location-Based Services
173. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
174. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
175. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
176. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
177. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
178. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
179. Adapting to User Interest Drift for POI Recommendation
180. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
181. Developing Apps for visually imapired people: Lessons learned from social network
182. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
183. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
184. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
185. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
186. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
187. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
188. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
189. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
190. Mobile cloud support for semantic enriched speech recognition in social care
191. Distributing secret sharing approach with cheater prevention based on QR code
192. Design of Secure Location and Message Sharing System for Android Platform
193. The impact of cloud technology on the automation of businesses
194. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
195. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
196. Rescue Management System
197. Android Army - Military Apps
198. Android Beauty Parlor
199. Android E Municipality
200. ANDROID NURSE AID
201. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
202. Human Resource (HR)- APPS
203. GPS Employee Tracking System
OUR MODERN SOCITY
204. RECYCLE APP WASTE COLLECTION REUSE
205. Bikes Rental - APPS
206. Location Based Alarm - GPS
207. ANDROID APPS FOR INSURANCE SYSTEM
208. BUDGET HOME DESIGN -ANDROID APPS
209. Former To Former Apps
210. Pets Care
ONLINE CONSUMERS PROCESSING
211. House Hold Appliancies Warranty Management
212. GPS Transport Packers and Movers
Android Apps
213. MY LIBRARY
214. FACULTY RATING SYSTEM
215. App for self organizer
216. ONLINE DOCTOR APPOINTMENT
217. Conference Event Mobile Assistant
218. Mobile Prescription
219. Metastore Application
220. Android SmartCampus
221. Android Shopping Mall
222. TOLL GATE -Barcode Billing System --ANDROID
223. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
224. Taste Hunt For Restaurants
225. POLICE APPS
226. Android Blood Bank
227. Mobile Expense Claim System Android
228. Android Intelligent Time Tracking System TICK
229. Android Course and Attendance Management System
230. Android Event Reminder
231. Android Attendance Assessment
232. Android Advance Shopping
233. Android CAR POOLING
234. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
235. Android HOSPITAL
236. ATHLETE MEET GUIDE
237. Android Apps PARKING MANAGER
238. Love and Care
239. Food Waste Management System
240. Travel Guide
241. Android Provisional Store
242. Best Baby Care with Vaccines Remainder
243. Android Assist for Lecturer and Student
244. Android Personal Assistance (PA)
245. Android Application for College Management System
246. Tollgate Payment system in android
247. Intelligence Quotient (IQ) Test
248. GPS LOCATION ALARM SYSTEM
249. Location Based Intelligent Mobile Organizer
250. BANK ACCOUNT TRACKER FOR ANDROID
251. UNIT CONVERTER
252. Tips and Tax Calculator in Android
253. TEXT EDITOR FOR ANDROID
254. Student Attendance Tracking System
255. Smart Money With Daily Expenses
256. Simple And Secure Android TO DO List Application
257. Restaurant Table Order Management System
258. Online Shopping
259. Online Examination System For Android
260. ANDROID SHOPPING LOCATION IDENTIFIER
261. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
262. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
263. MICRO CREDIT BANKING ON SMARTPHONE
264. LOCATION BASED ALARM
265. Insurance in android
266. GOOGLE PLACE FINDER
267. Friend Mapper on Mobiles - Friend Locator
268. EXPENSE MANAGER
269. Employee Diractory
270. Online job search
271. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
272. ANDROID STUDENT RESULT ANALYZING SYSTEM
273. CloudMoV : Cloud-based Mobile Social TV
274. Bus Reservation
275. Budget Planner
276. Android SMS Systems
277. ANDROID LEAVE MANAGEMENT SYSTEM
278. ANDROID EVENT SCHEDULER/REMINDER
279. Android Grocery Shopping List
280. Android Attack Application
281. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
282. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
283. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
284. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
285. Optimizing Display Advertising Markets
286. Using Knowledge Libraries to Transfer Expert Knowledge
287. Semantic Retrieval of Trademarks Based on Conceptual Similarity
288. Understanding and Predicting Question Subjectivity in Social Question and Answering
289. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
290. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
291. Fast Top-K Path-based Relevance Query on Massive Graphs
292. Web Image Search Re-ranking with Click-based Similarity and Typicality
293. Automatically Mining Facets for Queries from Their Search Results
294. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
295. Statistical Entity Extraction from Web
296. Question Answering System for an Effective Collaborative Learning
297. Lost in Translation: Improving Decoy Documents via Automated Translation
298. Learn to Personalized Image Search from the Photo Sharing Websites
299. In Tags We Trust Trust modeling in social tagging of multimedia content
300. Efficient Anonymous Message Submission
301. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
302. Employment Knowledge Database
303. Organise Corporate Training For Client Project s
304. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
305. ONLINE VEHICLE SHOWROOM SYSTEMS
306. Online Voting
307. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
308. School Management System
309. Secure Online Course Automation
310. School Automation System
311. Online Aquarum
312. Web Direct Recruitment Analysis
PHP Apps
313. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
314. TRADE / INDUSTRY WEB PORTAL
315. Feeding the poor from the supermarket
316. Application for recording your goals and habits
317. VISUAL WAY TO RAISE AWARENESS
318. Municipal Corporation
319. Online Polling For Publishers And Brands
320. Avoid Food Wastage
321. Web Doctor
322. ONLINE FOOD ORDERING SYSTEM
323. E-Tendering
324. Improving Rural Communities
325. Green Planet Awarness
326. Development of an Online Course Portal for a campus
327. Auxon Test
328. WEB BASED LEARNING SYSTEM
329. Tagging in online social networks
330. Secured file Downloading system
331. Cryptonite : A Secure and Performant Data Repository on Public Clouds
332. searching a image from websites
333. Online University
334. Online product Opinion and Ranking System
335. MNC LEAVE MANAGEMENT SYSTEM
336. Home appliances online purchase
337. Freelancer Job
338. E-Tutor Online Jobs
339. Statistical Entity Extraction from Web
340. Effective Collaborative Learning
341. Development of an e-Post Office System
342. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
343. Towards Effective Bug Triage with Software Data Reduction Techniques
344. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
345. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
346. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
347. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
348. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
349. Proof of retrievability with public verifiability resilient against related-key attacks
350. Secure Anonymous Key Distribution Scheme for Smart Grid
351. Converses For Secret Key Agreement and Secure Computing
352. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


JAVA IEEE 2017-18
IEEE Transactions on Big Data
353. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
354. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
355. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
Services Computing
356. Resource renting for periodical cloud workflow applications
IEEE Transactions on Security Computing
357. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
358. QoS Recommendation in Cloud Services
359. Securing Aggregate Queries for DNA Databases
360. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
361. A robust reputation management mechanism in the federated cloud
362. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
363. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
364. BiRank: Towards Ranking on Bipartite Graphs
365. QoS Recommendation in Cloud Services
366. Public Interest Analysis Based on Implicit Feedback of IPTV Users
367. Search Rank Fraud and Malware Detection in Google Play
368. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
369. Influence Maximization in Trajectory Databases
370. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
371. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
372. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
373. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
374. Computing Semantic Similarity of Concepts in Knowledge Graphs
375. QDA: A Query-Driven Approach to Entity Resolution
376. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
377. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
378. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
379. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
380. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
381. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
382. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
383. Two-Factor Data Security Protection Mechanism for Cloud Storage System
384. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
385. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
386. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
387. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
388. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
389. Where You Are Is Who You Are User Identification by Matching Statistics
390. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
391. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
392. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
393. Online Subgraph Skyline Analysis Over Knowledge Graphs
394. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
395. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
396. ID2S Password-Authenticated Key Exchange Protocols
397. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
398. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
399. Classification model to predict the learners' academic performance using big data
400. Electronic Commerce Meets the Semantic Web
401. Mining High Utility Patterns in One Phase without Generating Candidates
402. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
403. Automatic Generation of Social Event Storyboard from Image Click-through Data
404. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
405. Understanding Deep Representations Learned in Modeling Users Likes
406. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
407. Topic-Oriented Exploratory Search Based on an Indexing Network
408. Relevance Feedback Algorithms Inspired By Quantum Detection
409. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
410. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
411. Efficiently Estimating Statistics of Points of Interests on Maps
412. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
413. Aspect-level Influence Discovery from Graphs
414. Sentiment Embeddings with Applications to Sentiment Analysis
415. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
416. Resolving Multi-party Privacy Conflicts in Social Media
417. Encrypted Data Management with Deduplication in Cloud Computing
418. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
419. Crawling Hidden Objects with kNN Queries
420. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
421. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
422. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
423. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
424. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
425. Nearest Keyword Set Search in Multi-dimensional Datasets
426. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
427. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
428. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
429. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
430. Immutable Authentication and Integrity Schemes for Outsourced Databases
431. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
432. Server-Aided Public Key Encryption with Keyword Search
433. Online Learning in Large-Scale Contextual Recommender Systems
434. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
435. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
436. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
437. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
438. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
439. Multi-Modal Event Topic Model for Social Event Analysis
440. Social friend recommendation on multiple network correlation
441. Tag Based Image Search by Social Re-ranking
442. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
443. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
444. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
445. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
446. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
447. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
448. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
449. Rank-Based Similarity Search: Reducing the Dimensional Dependence
450. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
451. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
452. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
453. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
454. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
455. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
456. On the Security of data access control for multiauthority cloud storage system
457. Trust-based Service Management for Social Internet of Things Systems
458. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
459. Formalization and Verification of Group Behavior Interactions
460. Group Key Agreement with Local Connectivity
461. Data Lineage in Malicious Environments
462. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
463. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
464. Enabling Cloud Storage Auditing with Key-Exposure Resistance
465. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
466. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
467. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
468. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
469. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
470. Quantitative Reasoning About Cloud Security Using Service Level Agreements
471. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
472. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
473. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
474. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
475. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
476. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
477. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
478. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
479. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
480. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
481. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
482. Enabling Cloud Storage Auditing with Key-Exposure Resistance
483. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
484. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
485. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
486. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
487. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
488. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
489. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
490. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
491. Secure Auditing and Deduplicating Data in Cloud
492. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
493. Towards reproducibility in online social network Research
494. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
495. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
496. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
497. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
498. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
499. Making Digital Artifacts on the Web Verifiable and Reliable
500. Anonymizing Collections of Tree-Structured Data
501. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
502. FOCS: Fast Overlapped Community Search
503. Sparsity Learning Formulations for Mining Time-Varying Data
504. The Impact of View Histories on Edit Recommendations
505. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
506. Discovery of Ranking Fraud for Mobile Apps
507. Towards Effective Bug Triage with Software Data Reduction Techniques
508. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
509. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
510. Auditing for Distributed Storage Systems
511. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
512. Uploader Intent for Online Video: Typology, Inference and Applications
513. YouTube Video Promotion by Cross-network
514. Semantic-Improved Color Imaging Applications: It Is All About Context
515. Geolocalized Modeling for Dish Recognition
516. Learning to Rank Image Tags with Limited Training Examples
517. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
518. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
519. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
520. Tracking Temporal Community Strength in Dynamic Networks
521. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
522. Towards Information Diffusion in Mobile Social Networks
523. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
524. An Efficient Privacy-Preserving Ranked Keyword Search Method
525. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
526. Dispersing Instant Social Video Service Across Multiple Clouds
527. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
528. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
529. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
530. A Computational Dynamic Trust Model for User Authorization
531. Secure Distributed Deduplication Systems with Improved Reliability
532. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
533. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
534. Leveraging the Tail Time for Saving Energy in Cellular Networks
535. Keylogging-resistant Visual Authentication Protocols
536. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
537. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
538. Preserving Location Privacy in Geo-Social Applications
539. Efficient Authentication for Mobile and Pervasive Computing
540. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
541. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
542. Typicality-Based Collaborative Filtering Recommendation
543. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
544. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
545. Keyword Search Over Probabilistic RDF Graphs
546. Efficient Prediction of Difficult Keyword Queries over Databases
547. Interpreting the Public Sentiment Variations on Twitter
548. An Efficient Recommendation Method for Improving Business Process Modeling
549. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
550. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
551. On the use of Side Information for Mining Text Data
552. Privacy Preserving and Content Protecting Location based Queries
553. Fast Nearest Neighbor Search with Keywords
554. Towards Differential Query Services in Cost-Efficient Clouds
555. Facilitating Document Annotation using Content and Querying Value
556. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
557. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
558. Secure Outsourced Attribute-Based Signatures
559. Supporting Privacy Protection in Personalized Web Search
560. Dealing With Concept Drifts in Process Mining
561. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
562. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
563. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
564. Active Learning of Constraints for Semi-Supervised Clustering
565. Best Keyword Cover Search
566. Personalized Recommendation Combining User Interest and Social Circle
567. Online Feature Selection and Its Applications
568. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
569. Incremental Affinity Propagation Clustering Based on Message Passing
570. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
571. Secure kNN Query Processing in Untrusted Cloud Environments
572. Malware Propagation in Large-Scale Networks
573. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
574. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
575. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
576. Efficient Ranking on Entity Graphs with Personalized Relationships
577. Task Trail: An Effective Segmentation of User Search Behavior
578. Privacy-Preserving Enhanced Collaborative Tagging
579. XSPath Navigation on XML Schemas Made Easy
580. Security Evaluation of Pattern Classifiers under Attack
581. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
582. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
583. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
584. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
585. Nothing is for Free: Security in Searching Shared and Encrypted Data
586. SocialTube: P2P-assisted Video Sharing in Online Social Networks
587. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
588. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
589. Behavioral Malware Detection in Delay Tolerant Networks
590. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
591. Private Searching on Streaming Data Based on Keyword Frequency
592. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
593. On the Security of Trustee-Based Social Authentications
594. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
595. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
596. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
597. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
598. A Two-stage Deanonymization Attack Against Anonymized Social Networks
599. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
600. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
601. Scalable architecture for multi-user encrypted SQL operations on cloud database services
602. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
603. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
604. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
605. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
606. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
607. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
608. Secure kNN Query Processing in Untrusted Cloud Environments
609. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
610. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
611. A Hybrid Cloud Approach for Secure Authorized Deduplication
612. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
613. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
614. A Novel Model for Competition and Cooperation Among Cloud Providers
615. CLOUDQUAL: A Quality Model for Cloud Services
616. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
617. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
618. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
619. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
620. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
621. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
622. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
623. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
624. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
625. Enhanced Security for Association Rule Mining to secure Transactional Databases
626. Operational Pattern Revealing Technique in Text Mining
627. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
628. Personalized web search using Browsing history and domain Knowledge
629. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
630. Data Security the Challenge of Cloud Computing
631. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
632. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
633. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
634. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
635. User Action Interpretation for Online Content Optimization
636. Spatial Query Integrity with Voronoi Neighbors
637. Spatial Approximate String Search
638. Sensitive Label Privacy Protection on Social Network Data
639. Secure Mining of Association Rules in Horizontally Distributed Databases
640. Secure Logging As a Service Delegating Log Management to the Cloud
641. Robust Module-based Data Management
642. Ranking on Data Manifold with Sink Points
643. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
644. Privacy-Enhanced Web Service Composition
645. Privacy against Aggregate Knowledge Attacks
646. Preventing Private Information Inference Attacks on Social Networks
647. PMSE: A Personalized Mobile Search Engine
648. Personalized QoS-Aware Web Service Recommendation and Visualization
649. Optimal Client-Server Assignment for Internet Distributed Systems
650. Online Search and Buying Behaviour in Consumer Markets
651. M-Privacy for Collaborative Data Publishing
652. Mining User Queries with Markov Chains: Application to Online Image Retrieval
653. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
654. Incentive Compatible Privacy-Preserving Data Analysis
655. Improving Security and Efficiency in Attribute-Based Data Sharing
656. FoCUS: Learning to Crawl Web Forums
657. Fast Nearest Neighbor Search with Keywords
658. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
659. Facilitating Effective User Navigation through Website Structure Improvement
660. Facilitating Document Annotation using Content and Querying Value
661. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
662. Efficient Evaluation of SUM Queries over Probabilistic Data*
663. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
664. Dynamic Query Forms for Database Queries
665. Dynamic Personalized Recommendation on Sparse Data
666. Distributed Strategies for Mining Outliers in Large Data Sets
667. Crowdsourcing Predictors of Behavioral Outcomes
668. Co-Occurrence-Based Diffusion for Expert Search on the Web
669. Comparable Entity Mining from Comparative Questions
670. CloudMoV: Cloud-based Mobile Social TV
671. Anomaly Detection via Online Oversampling Principal Component Analysis
672. Anomaly Detection Approach Using Hidden Markov Model
673. Annotating Search Results from Web Databases
674. A System to Filter Unwanted Messages from OSN User Walls
675. A Survey of XML Tree Patterns
676. A Probabilistic Approach to String Transformation
677. A New Algorithm for Inferring User Search Goals with Feedback Sessions
678. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
679. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
680. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
681. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
682. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
683. Towards Differential Query Services in Cost-Efficient Clouds
684. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
685. SocialTube: P2P-assisted Video Sharing in Online Social Networks
686. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
687. QoS Ranking Prediction for Cloud Services
688. Priority-Based Consolidation of Parallel Workloads in the Cloud
689. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
690. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
691. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
692. Load Rebalancing for Distributed File Systems in Clouds
693. Label-Embedding for Attribute-Based Classification
694. IP-Geolocation Mapping for Moderately Connected Internet Regions
695. Identity-Based Secure Distributed Data Storage Schemes
696. Hint-based Execution of Workloads in Clouds with Nefeli
697. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
698. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
699. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
700. Efficient Two-Server Password-Only Authenticated Key Exchange
701. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
702. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
703. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
704. Winds of Change: From Vendor Lock-In to the Meta Cloud
705. Supporting the Migration of Applications to the Cloud through a Decision Support System
706. Storing Shared Data on the Cloud via Security-Mediator
707. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
708. Privacy-Preserving Public Auditing for Secure Cloud Storage
709. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
710. Outsourcing Privacy-Preserving Social Networks to a Cloud
711. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
712. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
713. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
714. Efficient Security Solution for Privacy-Preserving Cloud Services
715. Collaboration in Multicloud Computing Environments: Framework and Security Issues
716. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
717. Cloud-based DDoS Attacks and Defenses
718. Cloud computing for mobile users can offloading compution save energy
719. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
720. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
721. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
722. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
723. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
724. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
725. Two tales of privacy in online social networks
726. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
727. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
728. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
729. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
730. Security and Privacy-Enhancing Multicloud Architectures
731. Security Using Colors and Armstrong Numbers
732. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
733. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
734. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
735. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
736. Privacy Preserving Data Analytics for Smart Homes
737. On Inference-Proof View Processing of XML Documents
738. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
739. Extracting Spread-Spectrum Hidden Data from Digital Media
740. Efficiently Outsourcing Multiparty Computation under Multiple Keys
741. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
742. Craigslist Scams and Community Composition: Investigating Online Fraud
743. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
744. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
745. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
746. Super-Resolution-based Inpainting
747. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
748. Image Authentication Using Stochastic Diffusion
749. Hierarchical Super-Resolution-Based Inpainting
750. Circular Reranking for Visual Search
751. Bootstrapping Visual Categorization With Relevant Negatives
752. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
753. An extended visual cryptography scheme without pixel expansion for halftone images
754. An Adaptive Cloud Downloading Service
NETWORKING
755. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
756. Topological Conditions for In-Network Stabilization of Dynamical Systems
757. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
758. Price Differentiation for Communication Networks
759. Participatory Privacy: Enabling Privacy in Participatory Sensing
760. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
761. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
762. On the Role of Mobility for Multi-message Gossip
763. Fully Anonymous Profile Matching in Mobile Social Networks
764. Fault Node Recovery Algorithm for a Wireless Sensor Network
765. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
766. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
767. Access Policy Consolidation for Event Processing Systems
768. A Fast Re-Route Method
SOFTWARE ENGINEERING
769. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
770. Vampire attacks: Draining life from wireless ad-hoc sensor networks
771. Towards a Statistical Framework for Source Anonymity in Sensor Networks
772. Search Me If You Can: Privacy-preserving Location Query Service
773. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
774. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
775. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
776. Distributed Cooperative Caching in Social Wireless Networks
777. Community-Aware Opportunistic Routing in Mobile Social Networks
778. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
779. The Devils Behind Web Application Vulnerabilities
780. Security Architecture for Cloud Networking
781. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
782. Secure Overlay Cloud Storage with Access Control and Assured Deletion
783. Risk-Aware Mitigation for MANET Routing Attacks
784. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
785. Privacy-preserving Enforcement of Spatially Aware RBAC
786. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
787. pCloud: A Distributed System for Practical PIR
788. Packet-Hiding Methods for Preventing Selective Jamming Attacks
789. Online Modeling of Proactive Moderation System for Auction Fraud Detection
790. Fast and accurate annotation of short texts with Wikipedia pages
791. FADE: Secure Overlay Cloud Storage with File Assured Deletion
792. Ensuring Distributed Accountability for Data Sharing in the Cloud
793. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
794. Direct and Indirect Discrimination Prevention Methods
795. Detecting Spam Zombies by Monitoring Outgoing Messages
796. Detecting Anomalous Insiders in Collaborative Information Systems
797. Data-Provenance Verification For Secure Hosts
798. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
799. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
800. Payments for Outsourced Computations
801. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
802. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
803. Toward Private Joins on Outsourced Data
804. Statistical Entity Extraction from Web
805. Slicing: A New Approach to Privacy Preserving Data Publishing
806. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
807. Resilient Identity Crime Detection
808. Ranking Model Adaptation for Domain-Specific Search
809. Organizing User Search Histories
810. On the Spectral Characterization and Scalable Mining of Network Communities
811. Multiparty Access Control for Online Social Networks: Model and Mechanisms
812. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
813. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
814. How do Facebookers use Friendlists
815. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
816. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
817. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
818. Enabling Multilevel Trust in Privacy Preserving Data Mining
819. Enabling cross-site interactions in social networks
820. Efficient Similarity Search over Encrypted Data
821. Efficient Extended Boolean Retrieval
822. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
823. Efficient Anonymous Message Submission
824. Effective Pattern Discovery for Text Mining
825. DDD: A New Ensemble Approach for Dealing with Concept Drift
826. Credibility Ranking of Tweets during High Impact Events
827. Creating Evolving User Behavior Profiles Automatically
828. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
829. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
830. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
831. Anomaly Detection for Discrete Sequences: A Survey
832. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
833. Advance Mining of Temporal High Utility Itemset
834. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
835. Reliable Re-encryption in Unreliable Clouds
836. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
837. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
838. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
839. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
840. Gossip-based Resource Management for Cloud Environments
841. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
842. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
843. Cloud Data Protection for the Masses
844. Cloud Computing Security: From Single to Multi-Clouds
845. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
846. In Tags We Trust Trust modeling in social tagging of multimedia content
847. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
848. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
849. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
850. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
851. Cut Detection in Wireless Sensor Networks
852. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
853. TrickleDNS: Bootstrapping DNS Security using Social Trust
854. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
855. Policy-by-Example for Online Social Networks
856. Packet Loss Control Using Tokens at the Network Edge
857. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
858. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
859. Independent Directed Acyclic Graphs for Resilient Multipath Routing
860. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
861. Game-Theoretic Pricing for Video Streaming in Mobile Networks
862. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
863. Auditing for Network Coding Storage
864. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
865. Privacy Preserving Cloud Data Access With Multi-Authorities
866. Movie Rating and Review Summarization in Mobile Environment
867. IDSaaS: Intrusion Detection System as a Service in Public Clouds
868. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
869. BibPro: A Citation Parser Based on Sequence Alignment Techniques
870. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
871. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
872. RITAS: Services for Randomized Intrusion Tolerance
873. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
874. Nymble: Blocking Misbehaving Users in Anonymizing Networks
875. Modeling and Detection of Camouflaging Worm
876. Coding for Cryptographic Security Enhancement using Stopping Sets
877. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
878. Wireless Sensor Network Security model using Zero Knowledge Protocol
879. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
880. Throughput Optimization in Mobile Backbone Networks
881. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
882. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
883. Fast Data Collection in Tree-Based Wireless Sensor Networks
884. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
885. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
886. SPAF: Stateless FSA-based Packet Filters
887. Selfish Overlay Network Creation and Maintenance
888. ProgME: Towards Programmable Network MEasurement
889. Locating Equivalent Servants over P2P Networks
890. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
891. Buffer Sizing for 802.11 Based Networks
892. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
893. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
894. Improving Utilization of Infrastructure Clouds
895. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
896. CloudTPS: Scalable Transactions for Web Applications in the Cloud
897. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
898. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
899. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
900. Ranking Spatial Data by Quality Preferences
901. Making Aggregation Work in Uncertain and Probabilistic Databases
902. Load Shedding in Mobile Systems with MobiQual
903. Group Enclosing Queries
904. Extended XML Tree Pattern Matching: Theories and Algorithms
905. Effective Navigation of Query Results Based on Concept Hierarchies
906. Discovering Conditional Functional Dependencies
907. Decision Trees for Uncertain Data
908. Data Leakage Detection
909. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
910. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
911. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
912. Privacy Protection based Access Control Scheme in Cloud-based Services
913. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
914. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
915. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
916. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
917. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
918. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
919. Explaining Missing Answers to Top-k SQL Queries
920. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
921. Continuous Top-k Monitoring on Document Streams
922. Generating Query Facets using Knowledge Bases
923. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
924. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
925. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
926. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
927. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
928. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
929. Generating Query Facets using Knowledge Bases
930. Private Over-threshold Aggregation Protocols over Distributed Datasets
931. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
932. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
933. Privacy Protection based Access Control Scheme in Cloud-based Services
934. Dynamic Facet Ordering for Faceted Product Search Engines
935. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
936. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
937. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
938. A Forecasting Methodology for Workload Forecasting in Cloud Systems
939. Optimal Shipping Strategy and Return Service Charge Under No-Reason
940. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
941. A Recommendation System to Facilitate Business Process Modeling
942. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
943. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
944. User Differentiated Verifiable File Search on the Cloud
945. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
946. Statistical Features Based Real-time Detection of Drifted Twitter Spam
947. Incremental Consolidation of Data-Intensive Multi-flows
948. Service Pattern: An Integrated Business Process Model for Modern Service Industry
949. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
950. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
951. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
952. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
953. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
954. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
955. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
956. TagBook: A Semantic Video Representation without Supervision for Event Detection
957. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
958. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
959. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
960. The Impact of Review Environment on Review Credibility
961. Private Over-threshold Aggregation Protocols over Distributed Datasets
962. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
963. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
964. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
965. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
966. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
967. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
968. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
969. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
970. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
971. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
972. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
973. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
974. What Is Happening in The Video Annotate Video by Sentence
975. Two level QR code for private message sharing and document authentication.
976. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
977. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
978. Mining Health Examination Records A Graph-based Approach
979. A Credibility Analysis System for Assessing Information on Twitter
980. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
981. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
982. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
983. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
984. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
985. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
986. Predicting Personalized Image Emotion Perceptions in Social Networks
987. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
988. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
989. Explaining Missing Answers to Top-k SQL Queries
990. Bilevel Feature Extraction Based Text Mining
991. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
992. Privacy-Preserving Outsourced Media Search
993. Modeling and Verification of Online Shopping Business Processes
994. User Preference Learning for Online Social Recommendation
995. Steganalysis Features for Content-Adaptive JPEG Steganography
996. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
997. PiCode: a New Picture-Embedding 2D Barcode
998. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
999. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1000. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1001. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1002. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1003. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1004. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1005. Cloud workflow scheduling with deadlines and time slot availability
1006. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1007. Path-Based Epidemic Spreading in Networks
1008. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1009. On the Resiliency of Static Forwarding Tables
1010. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1011. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1012. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1013. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1014. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1015. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1016. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1017. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1018. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1019. Hacking is not random: a case-control study of webser ver-compromise risk
1020. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1021. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1022. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1023. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1024. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1025. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1026. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1027. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1028. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1029. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1030. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1031. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1032. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1033. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1034. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1035. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1036. Cross-Domain Feature Learning in Multimedia
1037. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1038. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1039. Saliency-based color accessibility
1040. Contextual Online Learning for Multimedia Content Aggregation
1041. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1042. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1043. An Attribute-assisted Reranking Model for Web Image Search
1044. RRW - A Robust and Reversible Watermarking
1045. Steganography Using Reversible Texture Synthesis
1046. Single Image Super-Resolution Based on Gradient Profile Sharpness
1047. Detection and Rectification of Distorted Fingerprints
1048. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1049. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1050. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1051. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1052. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1053. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1054. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1055. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1056. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1057. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1058. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1059. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1060. Authenticated Key Exchange Protocols for Parallel Network File Systems
1061. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1062. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1063. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1064. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1065. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1066. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1067. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1068. Context-based Diversification for Keyword Queries over XML Data
1069. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1070. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1071. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1072. Tweet Segmentation and Its Application to Named Entity Recognition
1073. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1074. Automatic Group Happiness Intensity Analysis
1075. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1076. Query Aware Determinization of Uncertain Objects
1077. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1078. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1079. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1080. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1081. Efficient Community Formation for Web Services
1082. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1083. Secure Mining of Association Rules in Hor izontally Distributed Databases
1084. Dynamic Query Forms for Database Queries
1085. Secure kNN Query Processing in Untrusted Cloud Environments
1086. An Empirical Performance Evaluation of Relational Keyword Search Systems
1087. Keyword Query Routing
1088. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1089. Demand Bidding Program and Its Application in Hotel Energy Management
1090. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1091. Incremental Detection of Inconsistencies in Distributed Data
1092. A Cocktail Approach for Travel Package Recommendation
1093. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1094. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1095. Analysis of Field Data on Web Security Vulnerabilities
1096. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1097. A Reliability Improvement Method for SOA-Based Applications
1098. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1099. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1100. Web Service Recommendation via Exploiting Location and QoS Information
1101. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1102. Exploiting Rateless Codes in Cloud Storage Systems
1103. COMIC:Cost Optimization for Internet Content Multihoming
1104. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1105. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1106. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1107. Uniform Embedding for Efficient JPEG Steganography
1108. Secure Deduplication with Efficient and Reliable Convergent Key Management
1109. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1110. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1111. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1112. Location Aware Keyword Query Suggestion Based on Document Proximity
1113. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1114. A secure data self-destructing scheme in cloud computing
1115. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1116. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1117. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1118. Secure kNN Query Processing in Untrusted Cloud Environments
1119. Exploiting Rateless Codes in Cloud Storage Systems
1120. Fuzzy Authorization for Cloud Storage
1121. Planning vs. dynamic control Resource allocation in corporate clouds
1122. Automatic Scaling of Internet Applications for Cloud Computing Services
1123. Strategy-proof Pricing for Cloud Service Composition
1124. Privacy Preserving Delegated Access Control in Public Clouds
1125. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1126. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1127. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1128. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1129. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1130. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1131. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1132. A Scientometric Analysis of Cloud Computing Literature
1133. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1134. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1135. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1136. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1137. FeatureMatch: A General ANNF Estimation Technique and its Applications
1138. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1139. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1140. As-Projective-As-Possible Image Stitching with Moving DLT
1141. Sharing Visual Secrets in Single Image Random Dot Stereograms
1142. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1143. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1144. A New Iterative Triclass Thresholding Technique in Image Segmentation
1145. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1146. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1147. An Iranian License Plate Recognition System Based on Color Features
1148. Learning Layouts for Single-Page Graphic Designs
1149. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1150. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1151. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1152. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1153. Fingerprint Compression Based on Sparse Representation
1154. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1155. LBP-Based Edge-Texture Features for Object Recoginition
1156. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1157. Toward Experiential Mobile Media Processing
1158. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1159. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1160. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1161. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1162. Designing Truthful Spectrum Double Auctions with Local Markets
1163. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1164. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1165. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1166. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1167. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1168. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1169. A Study on Clinical Prediction Using Data Mining Techniques
1170. Online Payment System using Steganography and Visual Cryptography
1171. Efficient Instant-Fuzzy Search with Proximity Ranking
1172. Attribute Based Encryption with Privacy Preserving In Clouds
1173. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1174. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1175. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1176. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1177. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1178. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1179. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1180. The Target Tracking in Mobile Sensor Networks
1181. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1182. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1183. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1184. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1185. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1186. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1187. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1188. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1189. SUSIE: Search Using Services and Information Extraction
1190. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1191. Secure Mining of Association Rules in Horizontally Distributed Databases
1192. Sampling Online Social Networks
1193. Privacy Preserving Delegated Access Control in Public Clouds
1194. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1195. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1196. Ginix : Generalized Inverted Index for Keyword Search
1197. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1198. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1199. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1200. Dynamic Query Forms for Database Queries
1201. Cost-Based Optimization of Service Compositions
1202. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1203. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1204. Automatic Extraction of Top-k Lists from the Web
1205. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1206. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1207. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1208. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1209. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1210. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1211. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1212. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1213. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1214. Privacy Preserving Data Sharing With Anonymous ID Assignment
1215. Non-Cooperative Location Privacy
1216. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1217. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1218. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1219. Cloud based emails boundaries and vulnerabilities
1220. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1221. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1222. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1223. Optimal Content Downloading in Vehicular Networks
1224. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1225. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1226. View-invariant action recognition based on Artificial Neural Networks
1227. User-aware Image Tag Refinement via Ternary Semantic Analysis
1228. Separable Reversible Data Hiding in Encrypted Image
1229. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1230. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1231. Robust Face-Name Graph Matching for Movie Character Identification
1232. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1233. Improving Color Constancy by Photometric Edge Weighting
1234. Exploring the design space of social network-based Sybil defenses
1235. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1236. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1237. AnnoSearch: Image Auto-Annotation by Search
1238. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1239. Scalable Scheduling of Updates in Streaming Data Warehouses
1240. Scalable Learning of Collective Behavior
1241. Ranking Model Adaptation for Domain-Specific Search
1242. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1243. Outsourced Similarity Search on Metric Data Assets
1244. Organizing User Search Histories
1245. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1246. Mining Web Graphs for Recommendations
1247. Joint Top K Spatial Keyword Query Processing
1248. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1249. Identifying Content for Planned Events Across Social Media Sites
1250. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1251. Generative Models for Item Adoptions Using Social Correlation
1252. Efficient Data Mining for XML Queries Answering Support
1253. Efficient audit service outsourcing for data integrity in clouds
1254. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1255. Effective Pattern Discovery for Text Mining
1256. Combined Mining: Discovering Informative Knowledge in Complex Data
1257. Decentralized Probabilistic Text Clustering
1258. Computing Structural Statistics by Keywords in Databases
1259. Bridging Social and Data Networks
1260. Answering General Time-Sensitive Queries
1261. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1262. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1263. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1264. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1265. Resource-Aware Application State Monitoring
1266. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1267. Query Access Assurance in Outsourced Databases
1268. Linear and Differential Cryptanalysis
1269. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1270. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1271. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1272. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1273. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1274. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1275. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1276. ROAuth: Recommendation Based Open Authorization
1277. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1278. Recommendation Models for Open Authorization
1279. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1280. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1281. On Privacy of Encrypted Speech Communications
1282. OAuth Web Authorization Protocol
1283. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1284. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1285. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1286. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1287. Fast Matrix Embedding by Matrix Extending
1288. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1289. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1290. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1291. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1292. Measuring Code Quality to Improve Specification Mining
1293. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1294. Towards Secure and Dependable Storage Services in Cloud Computing
1295. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1296. Remote Display Solutions for Mobile Cloud Computing
1297. Privacy Preserving Delegated Access Control in Public Clouds
1298. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1299. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1300. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1301. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1302. Load-Balancing Multipath Switching System with Flow Slice
1303. Assessing the Veracity of Identity Assertions via OSNs
1304. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1305. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1306. A New Cell-Counting-Based Attack Against Tor
1307. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1308. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1309. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1310. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1311. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1312. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1313. Fast Release Capture Sampling in Large-Scale Sensor Networks
1314. Cooperative download in vehicular environments
1315. Cooperative Data Dissemination via Roadside WLANs
1316. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1317. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1318. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1319. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1320. Hiding Sensitive Association Rule for Privacy Preservation
1321. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1322. Development of Certificate Authority Services for Web Applications
1323. Detecting and Validating Sybil Groups in theWild
1324. Association Rule Extracting Knowledge Using Market Basket Analysis
1325. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1326. Valuable Detours: Least-Cost Anypath Routing
1327. Self-Reconfigurable Wireless Mesh Networks
1328. Reliability in Layered Networks with Random Link Failures
1329. NABS:Novel Approaches for Biometric Systems
1330. Live Streaming with Receiver-based Peer-division Multiplexing
1331. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1332. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1333. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1334. Virtualized Screen: A Third Element for CloudMobile Convergence
1335. Steganographic Embedding in JPEG Images with Visual Criterion
1336. On the Typical Statistic Features for Image Blind Steganalysis
1337. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1338. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1339. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1340. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1341. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1342. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1343. Vulnerability Analysis in SOA-Based Business Processes
1344. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1345. Service-Centric Framework for a Digital Government Application
1346. Server-Side Streaming Processing of WS-Security
1347. OWLPath: An OWL Ontology-Guided Query Editor
1348. Monitoring Service Systems from a Language-Action Perspective
1349. Extracting Product Features and Sentiments from Chinese Customer Reviews
1350. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1351. Automated Certification for Compliant Cloud-based Business Processes
1352. Addressing Dependability throughout the SOA Life Cycle
1353. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1354. The Geometric Efficient Matching Algorithm for Firewalls
1355. Secure Service-Oriented Architecture for Mobile Transactions
1356. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1357. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1358. Privacy-Preserving Updates to Anonymous and Confidential Databases
1359. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1360. IPAS: Implicit Password Authentication System
1361. Improving Security and Performance in the Tor Network through Tunable Path Selection
1362. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1363. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1364. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1365. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1366. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1367. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1368. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1369. Data Delivery Properties of Human Contact Networks
1370. Converge-Cast: On the Capacity and Delay Tradeoffs
1371. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1372. USHER: Improving Data Quality with Dynamic Forms
1373. The World in a Nutshell: Concise Range Queries
1374. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1375. Scalable Scheduling of Updates in Streaming Data Warehouses
1376. Scalable Learning of Collective Behavior
1377. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1378. Publishing Search Logs A Comparative Study of Privacy Guarantees
1379. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1380. Optimal Service Pricing for a Cloud Cache
1381. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1382. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1383. Mining Web Graphs for Recommendations
1384. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1385. Integration of Sound Signature Authentication System
1386. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1387. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1388. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1389. Exploring Application-Level Semantics for Data Compression
1390. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1391. Data Leakage Detection
1392. Cost-aware rank join with random and sorted access
1393. Collaborative Filtering with Personalized Skylines
1394. Bridging Socially-Enhanced Virtual Communities
1395. Automatic Discovery of Personal Name Aliases from the Web
1396. A Personalized Ontology Model for Web Information Gathering
1397. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1398. A Query Formulation Language for the Data Web
1399. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1400. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1401. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1402. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1403. Towards Secure and Dependable Storage Services in Cloud Computing
1404. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1405. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1406. Data Integrity Proofs in Cloud Storage
1407. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1408. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1409. Feature-level Sentiment Analysis for Chinese Product Reviews
1410. Equal-sized Cells Mean Equal-sized Packets in Tor?
1411. Customer Relationship Management Based on Data Mining Technique
1412. Authentication Schemes for Session Passwords using Color and Images
1413. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1414. Young Talent Tracker
1415. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1416. International Plant Import and Export
OUR MODERN SOCITY
1417. Trained Volunteers Create A Successful Social Campaign
1418. Finger thump Based Shopping Cart
1419. Finger Print E-Voting Systems
1420. Create a Successful Anti- Nuclear Campaign
1421. Crowding Funding Mobilization
1422. People Power of India
1423. Modern Finger Print Voting System
1424. Election Commission Management
1425. Online Painting Auction
1426. Reality Show Ticket Booking System
1427. Online Broadway Motel Food Ordering System
1428. Fashion Studio Model Management
1429. Women's Selfhelp Group
Advance Health Care System
1430. Organizing medical camp for public health development
1431. Homeopathy Health Record
1432. Consumer Legal Advicer
1433. Raw Requried Online Medicine
1434. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1435. I School
1436. Job fair section process
1437. Advertising in E-Book
1438. Students Skills With Modern Industries
1439. College Placement And College Event
1440. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1441. Cloud Storage Public Digital Certificate
ERP PROJECTS
1442. Customer Relationship Management
1443. Corporate Trouble Shooter
1444. Corporate Event Organisation
1445. Engnering Lab Maintenance
1446. Select Your Age(Business Motivation all age group)
1447. Software Requirements Analysis for Client Side
1448. ERP System (Enterprint Resource Plan
LATEST BANKING
1449. User Opinion For Indian Banking Service And Cashless Economy
1450. Advanced Banking System
1451. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1452. Economic Usage of Solar Energy
1453. Gps Consumers Complients
1454. Online Softskills Tracks
1455. Online Buy And Sale Software
1456. Budget Home Design
1457. Online Product Exchange
1458. Jewellery Management
1459. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1460. Moderate Robatics System with Public Opinion
Java Apps
1461. Online overview of skills really used in jobs
1462. Land Bank for Nursery
1463. Developing Rural Economy
1464. ECOPS - Electronics Police Record Management System
1465. Website Evaluation Using Opinion Mining
1466. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1467. INSURANCE MANAGEMENT SYSTEM
1468. e-Fraud Prevention based on the Self- Authentication of e-Documents
1469. Hope Center
1470. Exam crazy
1471. BUGS REPORTING SYSTEM
1472. LOCATION BASED CONSUMER COMPLAINT
1473. Speed Racing
1474. ROADSTER
1475. META CAFE
1476. ONLINE VIDEO LOCKER
1477. Management System in Metro Train
1478. Plant Shopping on Web
1479. Reporting Online Media News Systems
1480. Informative Content Extraction
1481. E-commerce Complaint Management System
1482. Modern Agriculture Development System
1483. Loan Online Application
1484. Rural Community Developement
1485. LOVE AND CARE
1486. GREEN PLANT
1487. Advance Couier Service
1488. Community Awarness
1489. E_Music
1490. Staff Management System
1491. E-TENDERING
1492. Hotel Management
1493. Crime File Management System
1494. Cloud Cyber Attack
1495. Cloud Cost Management for Customer Sensitive Data
1496. Advance Web based Multimedia Answer Generation
1497. Commaunity Awareness
1498. E-Commerce Complaints
1499. Modern Agriculture Development System
1500. Plant Shopping on Web
1501. ONLINE VIDEO LOCKER
1502. ONLINE VIDEO LOCKER
1503. Reporting Online Media News Systems
1504. Online Plant Shopping
1505. Community Awareness
1506. Loan Online Application
1507. Modern Agriculture Development System
1508. Online Digital Library
1509. Geo Base Services
1510. Civil Supplies and Consumer Protection Department
1511. Citizen Opinions vs Government Policies
1512. Protecting Used Data Privacy for Attackers
1513. Web Hospital Management
1514. Easy SQL Query for Non-IT Manager
1515. Online Shopping with Fraud detection
1516. Efficient Spatial Query Processing
1517. Cryptographic Key Exchange Authentication
1518. Online Global Information Service Center
1519. Contracts Business Events Management
1520. Online Secure image Social Networks
1521. Outsourcing of Online Image Reconstruction
1522. Trust based Profile Matching Secure Social Network
1523. Secure and Distance based Online Social Network (OSN)
1524. Efficient Online Image Retrieval System
1525. Data Sharing In Cloud Storage by Using Key-Aggregate
1526. Multicast Key Management for Cloud
1527. Face-to-face contact on Mobile Social Networks
1528. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1529. Dynamically Growing Online Survey for Behavioral Outcomes
1530. Advance Web based Multimedia Answer Generation
1531. College Result Analysis with Horizontally Distributed Databases
1532. Feedback Decision Support for mHealth monitoring
1533. Exchange Secrete Key for Data Producers and Consumers
1534. Efficient Information Retrieval Using Ranked Query (EIRQ)
1535. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1536. Web Hosting On Cloud
1537. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1538. Web Server Security with Web Client Management System
1539. Web Parser on Sequence Alignment Techniques
1540. Web Page re-Ranking System for Library
1541. Web Eye
1542. Voting System for Web Library
1543. VIRTUAL CLASSROOM SYSTEM
1544. Unique Web Resources Utilization Monitoring System
1545. Transport Management System
1546. Pre-paid Recharging System on Banking
1547. Tollgate Management
1548. Time To Time Stock Market Updater and Monitoring System
1549. Sql Tuner
1550. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1551. SMS Based Mobile Banking with Security
1552. Sms Topup
1553. Vendor Information System For Shipping
1554. Sequential Anomaly Detection from User Behaviour
1555. Secure SMS Transaction System on banking
1556. Secure Online Documents Management System in Cloud
1557. Secure File Uploading Server with Advance Protecting System
1558. Secure File Monitoring System on Cloud
1559. Relational Logic Search Engine On Healthcare
1560. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1561. Quick Customer decision support on Web Sales Portal
1562. Query Response System for File Management
1563. Quality Visualization on Web TV
1564. Project Work Tracking System
1565. Product Market Manipulations on Asian stock market
1566. Predicting Top Company Share Based on High Utility Data
1567. Automation of Analysis and Development Management
1568. Pharmacy Information System
1569. Personalize Your News on Web
1570. Online University
1571. Online tagging for multimedia content
1572. Online Search Ranking On Multiple Domain
1573. Online Rental House Web Portal
1574. Online Recruitment System
1575. Online Real Estate Property Management
1576. Online Multi Type Documents Search Engine
1577. ONLINE MOBILE BILLING SYSTEM
1578. Online Jewelry Management
1579. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1580. Online Examination System
1581. Online Ensemble Learning Approach
1582. Online Banking With Fraud Detecting
1583. Online Auction Bit
1584. ONLINE ADVERTISING SYSTEM
1585. Nutraceuticals Management System
1586. Nearest Shopping Location Identification Systems
1587. Multilevel Images Authentication Systems
1588. Multi New Product Survey Management
1589. Movie Recommender Systems via User- Item Subgroups
1590. Movie Rating and Recommendation on Mobile
1591. Modern Municipal Corporation
1592. Mobile TV Quality Management
1593. Mobile Banking WAP
1594. Manifold Entrust Scheme
1595. Management System in Train
1596. Secure Mailing System
1597. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1598. LEAVE MANAGEMENT SYSTEM FOR MNC
1599. Knowledge Based Decision Support System(KMS)
1600. Key Management for Content Integration
1601. Inter Bank Fund Transfer in Distributed Network
1602. Information and Knowledge Extracting from a large amount of data
1603. Industry Standard Authorization For Sensitive Resources
1604. Implementation and Validating Environmental and Health
1605. iKnoweb Extracting and Integrating Entity Information System
1606. HUMAN ASSURANCE ADMINISTRATION
1607. High_level network Security Using Packet Filtering
1608. High and Low Level SQL Query Executor
1609. GLOBAL COUNSELLING SYSTEM
1610. A Game Theory for Online Security
1611. Distributed Transaction Proxy
1612. Freelancer Job
1613. File Security With Multi Database System
1614. FILE SEARCH ENGINE
1615. Fertilizer Management System
1616. Fast Web Information Gathering with Alias Detection
1617. E-Tutor Online Jobs
1618. Enterprise Stock and Accounting System
1619. Ensuring Data Storage Security in Cloud Computing
1620. Encrypted IT Auditing on Cloud Computing
1621. Encrypted Data Storage Vs Data Against illegal Access
1622. Enabling Site Interaction In Social Community
1623. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1624. E-Music world
1625. Employee Resource Management
1626. Employee Management System
1627. E-Learning
1628. E Fraud Prevention based on the Self Authentication of e Documents
1629. Distribution System for Discount Sales
1630. Distributed Data Integration on Electricity Board
1631. Disease Information Hiding on Publishing Healthcare Data
1632. Digital Documents Attestation Systems
1633. Defending Against Web Application Vulnerabilities
1634. Defects Analysis Systems
1635. Data theft detection mobile cloud computing
1636. Data Base Fraud Detection Systems
1637. Customer Information Hiding for Data Mismanagement in Banking
1638. Company Security Reporting System(CSRS)
1639. E -Crime File Management System
1640. Credit Card Management System
1641. Corporate Requirement System
1642. Consumer Sales Online Fake Product Detection and Deletion
1643. Company Information Tracking System
1644. Cloud Policy-Based File Assure Deletion
1645. Cloud Data Theft Attacks
1646. Cloud Cyber Attacks against Social Networks
1647. Cloud Cost Management for Customer Sensitive Data
1648. Client Favorite Photo Search Engine on Web
1649. Citizen Card System
1650. Card Management System
1651. Design &Development of Car Parking and Automation Billing Systems
1652. Customer Care Service
1653. BPO Call Center
1654. Automation of IT Process Management
1655. Modeling and Automated Containment of Worms
1656. Attribute Key Based Data Security System
1657. As Needed Basis Accountability for Cloud Data Sharing
1658. Annotation of short texts With Wikipedia pages
1659. AIRLINE RESERVATION SYSTEM
1660. Advance User Management on Social Website
1661. A Semantic Web Based Scientific News Aggregator


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1662. Online Trends Management Service in It Industry
1663. Session Management System in It Industry
1664. Tools for Non IT Expert Developer
ERP PROJECTS
1665. New Company Policy Clearance System
1666. Recommend To Friend
1667. Consultanting About the Foreign Peoples
1668. Performance System Analysis In Industry
1669. Non It People Performance
MODERN AGRICULTURE
1670. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1671. Agriculture Marketing in Generation
1672. Agriculture Assist
1673. Sponsor For Agriculture
SPORTS
1674. Play Ground Booking
OUR MODERN SOCITY
1675. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1676. RAILWAY SEAT RESERVATION SYSTEM
1677. Railway Management Service
1678. It Park Media
1679. Automation Transport Maintance
1680. Yell Help For Children
1681. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1682. Apartment Maintenance
1683. Power Consumption Monitoring House Hold Electronic Device
1684. Direct Q Less Reservation System in train
Advance Health Care System
1685. MAC Sensing Protocol
1686. World Wide Cloud Inter Hospital Acess Health Care System
1687. Live Doctor
Dotnet Apps
1688. TELEVISION CHANNEL PROGRAM MANAGEMENT
1689. WIN THE TRUST OF AN INDIAN CONSUMER
1690. ONLINE ACCOUNT MANAGEMENT
1691. SMART CAB BOOKING SYSTEM
1692. ONLINE FAST FOOD ORDER
1693. Travel Mate Add Module
1694. Work Order System Call Centre
1695. SPORTS MANAGEMENT SYSTEM
1696. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1697. Pick-It Courier Service
1698. Online Taxi Booking
1699. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1700. INCOMETAX MAINTAINANCE SYSTEM
1701. Hotel Reservation
1702. ERP System
1703. Bug Tracking System
1704. Vendor Information System For Shiping
1705. Top-K ranking System
1706. Secure Medical Image Archive System
1707. Business Activity Coordination Using Web Services
1708. Management Portal
1709. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1710. Secure Data Filtering Recommendation System
1711. Online Resources Sharing via Social Networks
1712. Secure self-destructing in Cloud Computing
1713. Web Resourecs File Authorization Management
1714. Click based image re-ranking system
1715. Tree Structure Data Analiysis Mining
1716. Web Resource Allocation for CorPerate
1717. Web Vulnerabilities and Security
1718. Fuzzy Cloud Search Using XML
1719. Cloud Data Supporting Secure Query Search
1720. Tour Recommender Systems on Web
1721. Distributed Interactive Web Applications
1722. Secure Query Processing for Cloud
1723. Online Data Storage with less pricing
1724. Cost Based Web Content Managemnts
1725. Web Hospital Management
1726. Online Data storage with low price
1727. Secure Online Data Block Authorization
1728. Profitable Onlin web Server System
1729. Online Economies File Manager for Multi Keying
1730. Online Community Management
1731. Key based Online Data Managements
1732. Critical Workflow Management for Web Documents
1733. Secure Online Documents Managements for Group Sharing
1734. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1735. Online Marketing Automation System
1736. Internal organization change management System
1737. Secure confirmation of sensitive transaction data in modern Internet banking services
1738. Privacy security with TPA in cloud computing
1739. Company Information Tracking System
1740. Online Virtualized screen Processing
1741. Web Service for Airline Management
1742. Web Social Club
1743. Quantum Key Cryptography
1744. Patient Data Management Based On Hospital Location
1745. Online Software Developer Community
1746. Online Developed Software sales
1747. Avoid repeated measurements On Genetics Dataset
1748. College Lab Maintenance System
1749. Industrial Manpower Resource Organizer
1750. Web Query Construction and Search on Complex Data
1751. Hospital Emergency Data Management
1752. Data confidentiality On Health-care Information System
1753. Secure Online Trading
1754. Fast Real-Time Event Alert Using social Network
1755. Secure E-Mail Organizer
1756. Web User Service Management System
1757. Easy SQL Query for Non-IT Manager
1758. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1759. Customer Relationship Management (CRM) on Banking
1760. Online Company ERP System
1761. Constructing E-Tourism
1762. Web based Multi Service Ranking System
1763. Dynamic Customer Data Hiding in Banking
1764. Online Distributed Social Clubs
1765. Virtual Shopping with Negative Feedback Reputation Systems
1766. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1767. Web Service Oriented Query Authentication Technique
1768. Web Based Customer Favorite vehicle Search Engine
1769. Web Based Book Publishing System
1770. Virtual Energy- Based Encryption and Keying
1771. Video Fraud Detecting On social Network
1772. Video Compression with Data hiding & Data Extraction
1773. Vendor Information System for Shipping
1774. VALUE ADDED TAX (VAT)
1775. Universal Smart Card
1776. Ultimate Location Information Systems
1777. Top K Ranking System
1778. Techno Task Manager
1779. Supply Chain Management
1780. Substitution-Permutation cryptanalysis System
1781. Streaming Data Warehouse Updations
1782. Step by Step Monitoring for Product Purchasing System
1783. Steganography for Data Reading and Writing AVI files
1784. SQL TUNER
1785. SMS Transaction Security
1786. Session Authentication Passwords using Color
1787. Service Availability Guarantees on Virtual Economy
1788. Server Fraud Detection on Cloud
1789. Sentence Based Search on Cloud
1790. Semantic Web Search Engines
1791. Secured Image communicator
1792. Secure smart application on web application
1793. Secure Service-Oriented Smartcard systems
1794. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1795. Secure Location Identification System
1796. Secure and Cloud Based Patient Information Systems
1797. Reduce the Password Guessing Attacks using Click Point
1798. Recommendation System Based on Graph
1799. Quantum Key Cryptography
1800. Quality Controller
1801. Public Web Status Monitoring System
1802. Project Trade Pool
1803. Product Marketing Analysis On Public Opinion
1804. Predicting Users Behaviors Using Web Mining
1805. Personal Health Information on M-Healthcare Emergency
1806. Optimum Online Knowledge Base
1807. Online Training Program
1808. Online Time sensitive queries
1809. Online Tag Based Image Retrieval and Effective Management
1810. Online Social networks controls using cloud
1811. Online Rental System
1812. Online product Opinion and Ranking System
1813. Online Dynamic form creation for Non-IT Peoples
1814. Online Digital Contract Signing in Mistrusted Parities
1815. Online Aventure
1816. Online Shopping
1817. News Ticker Project
1818. Net Bank in Recharge
1819. Multi User Public Auditing System of Data Storage Security
1820. Multi Location Networked Mobile Auto Intimates
1821. Modern Distributed Business Applications for Supply Chain Management
1822. Market Intelligence Based Public Sentiment Analysis
1823. Leave Management System
1824. Joint processing of spatial keyword queries
1825. Intelligence Missing Items in Shopping Cart
1826. Information Leak Detection and Prevention
1827. Industrial Manpower Resource Organizer
1828. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1829. Human Expertise Search Engine
1830. Home appliances online Purchase
1831. High Secure Corporate Web Search Engine
1832. High Degree Patient Privacy on Secure Data Outsourcing
1833. Group Movement Pattern Discovery
1834. Graph Based Share Market Data Updating
1835. Generic Business Portal
1836. Flight Booking Portal
1837. Firewall using Packet Filtering
1838. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1839. Ethical and Social issues in File sharing system
1840. Enterprener Sales Report Management
1841. Encyclopedia for Computer Science
1842. Employee Based Performance Monitoring and Action Systems
1843. Emerging Patient Health Information Exchange System On Cloud
1844. Efficient Search on Outsourced data using Cloud
1845. Efficient and Secure Data Processing on Queries Similarity
1846. Distributed Database Optimization on HealthCare
1847. Digital Asset Management Systems (DAMS) Using Watermarking
1848. Detecting Fraud on Vehicle Insurance System
1849. Defeating Lazy Servers Database Vs Query Access Assurance
1850. Data Processing for Disease-Treatment Relations
1851. Data Mining Analysis on EB bill system
1852. Data confidential against untrusted servers using attribute-based encryption (ABE)
1853. Data Aggregation using SQL clustering
1854. Customer Sales Analysis System Based On Purchasing
1855. Cryptography on Personal confidential information
1856. Cost Based Secure Cloud Data Systems
1857. Market Based Analysis for consumer correct decision
1858. Construction Company Work Order System
1859. Complete Medical Transcription System(Mts)
1860. Company Security Reporting System(CSRS)
1861. College Result Analysis
1862. Cloud Economic Benefit On Scientific Computing
1863. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
1864. Centralized Event Planer across Social Media Sites
1865. Call Center Management
1866. A Reservation-Based Coordination Protocol for Web Services
1867. Building construction and cost estimation
1868. Budget Planner
1869. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
1870. Automatically identifying query groups on Web Search Engine
1871. Auditing Data integrity and data storage using cloud
1872. Application layer blocker for preventing on cyber security
1873. Advanced One-Click User Web Search Engine
1874. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
1875. VALUE ADDED TAX (VAT)
1876. User Oriented Network Attacks
1877. Secure Back Up
1878. Screen Capture And Mouse I/O
1879. Sales Bill Printing System using Excel
1880. Password Security
1881. Online User Mobile Rating
1882. Online Sensex Graph System
1883. Online Book Publishing
1884. NEWS TICKER PROJECT
1885. Multi Storage file
1886. Message Chating
1887. Medical Equipment in WAP
1888. Login Authentication Scheme
1889. Information Alert System
1890. Image Encryption And Decryption
1891. Generic Business Portal
1892. Flight Booking Portal
1893. File Transfer using Cryptography Techniques
1894. File Splitting
1895. Excel Format in Report
1896. EB Management System
1897. Dynamic Web Form Creation
1898. Android Image Search


Struts Application Projects
Struts Apps
1899. Public Sentiment Analysis with Online Shopping Using Struts
1900. Modern distributed business for supply-chain management
1901. High Confidential Personal Disease Reporting System
1902. Distributor Sensitive Data Management Using Struts
1903. Development of Certificate Authority Services for Web Applications
1904. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1905. Website Tracking System
1906. Website Ranking System
1907. Treasure Warehouse
1908. Student Information System
1909. Storage security
1910. PRISON MANAGEMENT SYSTEM
1911. E-Licence Investigation System
1912. Online Secure File Transfer System
1913. Online Medicine Purchase
1914. ONLINE EDUCATION
1915. Online Agriculture System
1916. Mobile Survey
1917. ISSUE TRACKING SYSYTEM
1918. HOSPITAL MANAGEMENT SYSYTEMS
1919. HealthCare Management System
1920. Global Employee Acclaimer
1921. E-VOTING FOR ASSOCIATION
1922. Encrypted Register Form
1923. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1924. E INSURANCE
1925. Courier Tracking Systems
1926. corporate Transportation
1927. Collectorate Communication Systems
1928. Budget Approval System
1929. BLOOD BANK MANAGEMENT SYSTEMS
1930. ATTENDANCE MANAGEMENT SYSTEM
1931. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1932. Sponsor For Agriculture
1933. Agriculture Assist
1934. Agriculture Marketing in Generation
1935. International Plant Import and Export
MODERN EDUCATION SYSTEM
1936. Old In Gold
1937. I School
1938. College Placement And Events
1939. Rural Area Educational Trouble Shooter
1940. Web Direct Recruitment Analysis
1941. Online Aquarum
1942. School Automation System
1943. Secure Online Course Automation
1944. Session Management System in It Industry
1945. Tools for Non IT Expert Developer
1946. Students Skills With Modern Industries
MODERN TECHNOLOGY
1947. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1948. Customer Favarate Greeting Card Design
1949. GPS Transport Packers and Movers
1950. House Hold Appliancies Warranty Management
1951. Direct Q Less Reservation System in train
1952. Power Consumption Monitoring House Hold Electronic Device
1953. Apartment Maintenance
1954. Budget Home Design
1955. Online Buy And Sale Software
1956. Online Softskills Tracks
1957. Gps Consumers Complients
1958. Economic Usage of Solar Energy
Advance Health Care System
1959. Organizing medical camp for public health development
1960. LIVE WEB DOCTOR CONSULTATION
1961. World Wide Cloud Inter Hospital Acess Health Care System
1962. MAC Sensing Protocol
1963. Medical Record Authentication
1964. Raw Requried Online Medicine
1965. Consumer Legal Advicer
1966. Homeopathy Health Record
SPORTS
1967. Play Ground Booking
1968. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1969. Cloud Storage Public Digital Certificate
ERP PROJECTS
1970. Corporate Trouble Shooter
1971. Entrepreneur Fault Analysis
1972. Organise Corporate Training For Client Projects
1973. Employment Knowledge Database
1974. GPS Employee Tracking System
1975. Non It People Performance
1976. Performance System Analysis In Industry
1977. Consultanting About the Foreign Peoples
1978. Recommend To Friend
1979. New Company Policy Clearance System
1980. ERP System (Enterprint Resource Plan
1981. Software Requirements Analysis for Client Side
1982. Select Your Age(Business Motivation all age group)
1983. Engnering Lab Maintenance
1984. Corporate Event Organisation
LATEST BANKING
1985. EyeBank Management System
1986. Advanced Banking System
OUR MODERN SOCIETY
1987. Trained Volunteers Create A Successful Social Campaign
1988. Finger thump Based Shopping Cart
1989. Railway Management Service
1990. Create a Successful Anti- Nuclear Campaign
1991. Crowding Funding Mobilization
1992. People Power of India
1993. Pets Care
1994. Feature in Best Potitical Leader in India
1995. Yell Help For Children
1996. Automation Transport Maintance
1997. It Park Media
1998. Online Painting Auction
1999. Election Commission Management
2000. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2001. ANDROID APPS FOR INSURANCE SYSTEM
2002. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2003. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2004. ANDROID APPS FOR DOCTOR APPOINTMENT
2005. LIVE WEB DOCTOR CONSULTATION
2006. ANDROID APPS ON DOCTOR WITH NURSE
2007. HOSPITAL ANDROID APPS
2008. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2009. Fertilizer Management System -Java, JSP, MySQL
2010. Land Bank for Nursery -Java, JSP, MySQL
2011. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2012. FORMER APPS - ANDROID
2013. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2014. Online Banking with Fraud Detecting- Java JSP, MySQL
2015. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2016. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2017. Big Scholarly Data: A Survey
2018. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved