Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
LATEST PROJECTS UPDATES PhD Guidance COLLEGE MINI PROJECTS JAVA IEEE LATEST
JAVA SPRING AND HIBERNATE JAVA IEEE 2016-17 Latest IEEE 2015-2016 Java Projects IEEE 2014-2015 Java Projects
IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project Java Application Projects
Java Mini Projects PYTHON PROJECT - IEEE MACHINE LEARNING-ML(Data Scientist) NEW TECHNOLOGY-HELP VIDEO
BLOCK CHAIN TECH - BITCOIN R - DATA SCIENCE - ML WEKA-Machine Learning Internet of things (IoT)
BIG DATA - HADOOP PROJECTS BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB JOBS CONSULTANCY - SOFT SKILLS
ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID ANDOROID JSON PHP
ANDROID APPS IEEE PHP Projects 2017-18 IEEE PHP Projects PHP Application Projects
ASP.NET MVC Framework Dot Net IEEE 2017-18 ANGULAR JS , RAZOR MVC 4 ASP.NET 2017-18
RAZOR MVC 4 ASP.NET Dot Net IEEE 2016-17 Latest IEEE 2015-2016 Dotnet Projects IEEE 2014-2015 Dotnet Projects
IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects Dotnet Application Projects
Dotnet Mini Projects Struts Application Projects SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS
HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS BANKING PROJECTS RESTful Web services
 
LATEST PROJECTS UPDATES
BIG DATA JAVA - NOSQL- MONGODB
1. Blockchain for AI
PYTHON - AI
2. Iris Recognition
3. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
4. Object Detection
5. Rainfall Rate Prediction
6. Drug Usage in Social Media
7. SUBWAY PASSENGER FLOW FORECASTING


PhD Guidance
Cyber Security and Privacy
8. Design and Development of IoT Based Smart Aquaculture System in a Cloud Environment
9. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
10. Blockchain for AI
Developing PhD proposal
11. Review of Standard Ontologies for the Web of Things
12. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
13. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
14. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
15. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
16. Approximate Data Aggregation in Sensor Equipped IoT Networks
17. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
18. Diabetics Dataset
19. MEDICAL DATA ANALYSES
20. R IEEE PROJECTS
21. PhD Project Guidance
22. PhD Projects


COLLEGE MINI PROJECTS
DOT NET MINI PROJECTS
PHP - MINI PROJECTS
JAVA -MINI PROJECT
PYTHON
23. HOTEL MANAGEMENT
24. GYM MANAGEMENT APPLICATION
25. ONLINE BOOK STORE


JAVA IEEE LATEST
IEEE Transactions on Big Data
26. Improving Instance Selection Methods for Big Data Classification
27. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks
28. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE Transactions on Cloud Computing
29. A Web Service Discovery Approach Based on Common Topic Groups Extraction
30. Dynamic Facet Ordering for Faceted Product Search Engines
31. Design And Application Of Intelligent Dynamic Crawler For Web Data Mining
32. Flexible Wildcard Searchable Encryption System
33. QoS Recommendation in Cloud Services
34. Securing Aggregate Queries for DNA Databases
35. Facilitating Secure and Efficient Spatial Query Processing on the Cloud
36. A robust reputation management mechanism in the federated cloud
37. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
38. Securing Cloud Data under Key Exposure
Transactions on Knowledge and Data Engineering
39. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers
40. Discovering Canonical Correlations between Topical and Topological Information in Document Networks
41. The Impact of Raw Materials Price Volatility on Cost of Goods Sold (COGS) for Product Manufacturing
42. E-CONTENT WITH RELATED LINK PREDICTION USING DATA MINING
43. On Minimizing Energy Cost in Internet-scale Systems with Dynamic Data
44. Energy-efficient Query Processing in Web Search Engines
45. Audience Behavior Mining: Integrating TV Ratings with Multimedia Content
46. Finding Related Forum Posts through Content Similarity over Intention-based Segmentation
47. BiRank: Towards Ranking on Bipartite Graphs
48. QoS Recommendation in Cloud Services
49. Public Interest Analysis Based on Implicit Feedback of IPTV Users
50. Search Rank Fraud and Malware Detection in Google Play
51. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
52. Influence Maximization in Trajectory Databases
53. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
54. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
55. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
56. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
57. Computing Semantic Similarity of Concepts in Knowledge Graphs
58. QDA: A Query-Driven Approach to Entity Resolution
59. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
60. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Services Computing
61. HYBRID APPROACH AUTOMATIC SPAM DETECTION ON TWITTER
62. CONTENT BASED IMAGE RETRIEVAL
63. Identifying At Risk Students for Early Interventions A Time Series Clustering
64. Two Layer Clustering model for Mobile Customer Analysis
65. Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
66. Consumer oriented web services ranking and classification
67. Resource renting for periodical cloud workflow applications
IEEE/ACM TRANSACTIONS ON NETWORKING
68. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
IEEE Transactions on Security Computing
69. OpinionAspect Relations in Cognizing Customer Feelings via Reviews
70. Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
71. A System for Profiling and Monitoring Database Access Patterns - SE
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Computers
Transactions on Parallel and Distributed Systems
72. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
73. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
74. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
75. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
76. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
77. FISHING DISASTER MANAGEMENT SYSTEM
78. SPRING AND HIBERNATE


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
79. Two-Factor Data Security Protection Mechanism for Cloud Storage System
80. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
81. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
82. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
83. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
84. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
85. Where You Are Is Who You Are User Identification by Matching Statistics
86. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
87. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
88. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
89. Online Subgraph Skyline Analysis Over Knowledge Graphs
90. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
91. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
92. ID2S Password-Authenticated Key Exchange Protocols
93. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
94. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
95. Classification model to predict the learners' academic performance using big data
96. Electronic Commerce Meets the Semantic Web
97. Mining High Utility Patterns in One Phase without Generating Candidates
98. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
99. Automatic Generation of Social Event Storyboard from Image Click-through Data
100. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
101. Understanding Deep Representations Learned in Modeling Users Likes
102. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
103. Topic-Oriented Exploratory Search Based on an Indexing Network
104. Relevance Feedback Algorithms Inspired By Quantum Detection
105. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
106. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
107. Efficiently Estimating Statistics of Points of Interests on Maps
108. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
109. Aspect-level Influence Discovery from Graphs
110. Sentiment Embeddings with Applications to Sentiment Analysis
111. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
112. Resolving Multi-party Privacy Conflicts in Social Media
113. Encrypted Data Management with Deduplication in Cloud Computing
114. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
115. Crawling Hidden Objects with kNN Queries
116. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
117. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
118. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
119. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
120. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
121. Nearest Keyword Set Search in Multi-dimensional Datasets
122. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
123. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
124. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
125. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
126. Immutable Authentication and Integrity Schemes for Outsourced Databases
127. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
128. Server-Aided Public Key Encryption with Keyword Search
129. Online Learning in Large-Scale Contextual Recommender Systems
130. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
131. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
132. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
133. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
134. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
135. Multi-Modal Event Topic Model for Social Event Analysis
136. Social friend recommendation on multiple network correlation
137. Tag Based Image Search by Social Re-ranking
138. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
139. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
140. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
141. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
142. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
143. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
144. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
145. Rank-Based Similarity Search: Reducing the Dimensional Dependence
146. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
147. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
148. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
149. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
150. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
151. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
152. On the Security of data access control for multiauthority cloud storage system
153. Trust-based Service Management for Social Internet of Things Systems
154. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
155. Formalization and Verification of Group Behavior Interactions
156. Group Key Agreement with Local Connectivity
157. Data Lineage in Malicious Environments
158. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
159. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
160. Enabling Cloud Storage Auditing with Key-Exposure Resistance
161. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
162. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
163. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
164. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
165. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
166. Quantitative Reasoning About Cloud Security Using Service Level Agreements
167. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
168. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
169. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
170. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
171. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
172. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
173. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
174. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
175. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
176. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
177. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
178. Enabling Cloud Storage Auditing with Key-Exposure Resistance
179. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
180. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
181. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
182. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
183. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
184. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
185. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
186. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
187. Secure Auditing and Deduplicating Data in Cloud
188. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
189. Towards reproducibility in online social network Research
190. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
191. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
192. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
193. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
194. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
195. Making Digital Artifacts on the Web Verifiable and Reliable
196. Anonymizing Collections of Tree-Structured Data
197. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
198. FOCS: Fast Overlapped Community Search
199. Sparsity Learning Formulations for Mining Time-Varying Data
200. The Impact of View Histories on Edit Recommendations
201. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
202. Discovery of Ranking Fraud for Mobile Apps
203. Towards Effective Bug Triage with Software Data Reduction Techniques
204. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
205. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
206. Auditing for Distributed Storage Systems
207. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
208. Uploader Intent for Online Video: Typology, Inference and Applications
209. YouTube Video Promotion by Cross-network
210. Semantic-Improved Color Imaging Applications: It Is All About Context
211. Geolocalized Modeling for Dish Recognition
212. Learning to Rank Image Tags with Limited Training Examples
213. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
214. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
215. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
216. Tracking Temporal Community Strength in Dynamic Networks
217. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
218. Towards Information Diffusion in Mobile Social Networks
219. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
220. An Efficient Privacy-Preserving Ranked Keyword Search Method
221. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
222. Dispersing Instant Social Video Service Across Multiple Clouds
223. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
224. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
225. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
226. A Computational Dynamic Trust Model for User Authorization
227. Secure Distributed Deduplication Systems with Improved Reliability
228. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
229. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
230. Leveraging the Tail Time for Saving Energy in Cellular Networks
231. Keylogging-resistant Visual Authentication Protocols
232. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
233. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
234. Preserving Location Privacy in Geo-Social Applications
235. Efficient Authentication for Mobile and Pervasive Computing
236. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
237. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
238. Typicality-Based Collaborative Filtering Recommendation
239. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
240. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
241. Keyword Search Over Probabilistic RDF Graphs
242. Efficient Prediction of Difficult Keyword Queries over Databases
243. Interpreting the Public Sentiment Variations on Twitter
244. An Efficient Recommendation Method for Improving Business Process Modeling
245. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
246. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
247. On the use of Side Information for Mining Text Data
248. Privacy Preserving and Content Protecting Location based Queries
249. Fast Nearest Neighbor Search with Keywords
250. Towards Differential Query Services in Cost-Efficient Clouds
251. Facilitating Document Annotation using Content and Querying Value
252. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
253. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
254. Secure Outsourced Attribute-Based Signatures
255. Supporting Privacy Protection in Personalized Web Search
256. Dealing With Concept Drifts in Process Mining
257. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
258. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
259. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
260. Active Learning of Constraints for Semi-Supervised Clustering
261. Best Keyword Cover Search
262. Personalized Recommendation Combining User Interest and Social Circle
263. Online Feature Selection and Its Applications
264. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
265. Incremental Affinity Propagation Clustering Based on Message Passing
266. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
267. Secure kNN Query Processing in Untrusted Cloud Environments
268. Malware Propagation in Large-Scale Networks
269. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
270. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
271. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
272. Efficient Ranking on Entity Graphs with Personalized Relationships
273. Task Trail: An Effective Segmentation of User Search Behavior
274. Privacy-Preserving Enhanced Collaborative Tagging
275. XSPath Navigation on XML Schemas Made Easy
276. Security Evaluation of Pattern Classifiers under Attack
277. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
278. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
279. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
280. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
281. Nothing is for Free: Security in Searching Shared and Encrypted Data
282. SocialTube: P2P-assisted Video Sharing in Online Social Networks
283. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
284. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
285. Behavioral Malware Detection in Delay Tolerant Networks
286. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
287. Private Searching on Streaming Data Based on Keyword Frequency
288. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
289. On the Security of Trustee-Based Social Authentications
290. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
291. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
292. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
293. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
294. A Two-stage Deanonymization Attack Against Anonymized Social Networks
295. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
296. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
297. Scalable architecture for multi-user encrypted SQL operations on cloud database services
298. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
299. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
300. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
301. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
302. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
303. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
304. Secure kNN Query Processing in Untrusted Cloud Environments
305. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
306. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
307. A Hybrid Cloud Approach for Secure Authorized Deduplication
308. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
309. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
310. A Novel Model for Competition and Cooperation Among Cloud Providers
311. CLOUDQUAL: A Quality Model for Cloud Services
312. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
313. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
314. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
315. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
316. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
317. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
318. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
319. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
320. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
321. Enhanced Security for Association Rule Mining to secure Transactional Databases
322. Operational Pattern Revealing Technique in Text Mining
323. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
324. Personalized web search using Browsing history and domain Knowledge
325. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
326. Data Security the Challenge of Cloud Computing
327. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
328. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
329. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
330. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
331. User Action Interpretation for Online Content Optimization
332. Spatial Query Integrity with Voronoi Neighbors
333. Spatial Approximate String Search
334. Sensitive Label Privacy Protection on Social Network Data
335. Secure Mining of Association Rules in Horizontally Distributed Databases
336. Secure Logging As a Service Delegating Log Management to the Cloud
337. Robust Module-based Data Management
338. Ranking on Data Manifold with Sink Points
339. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
340. Privacy-Enhanced Web Service Composition
341. Privacy against Aggregate Knowledge Attacks
342. Preventing Private Information Inference Attacks on Social Networks
343. PMSE: A Personalized Mobile Search Engine
344. Personalized QoS-Aware Web Service Recommendation and Visualization
345. Optimal Client-Server Assignment for Internet Distributed Systems
346. Online Search and Buying Behaviour in Consumer Markets
347. M-Privacy for Collaborative Data Publishing
348. Mining User Queries with Markov Chains: Application to Online Image Retrieval
349. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
350. Incentive Compatible Privacy-Preserving Data Analysis
351. Improving Security and Efficiency in Attribute-Based Data Sharing
352. FoCUS: Learning to Crawl Web Forums
353. Fast Nearest Neighbor Search with Keywords
354. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
355. Facilitating Effective User Navigation through Website Structure Improvement
356. Facilitating Document Annotation using Content and Querying Value
357. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
358. Efficient Evaluation of SUM Queries over Probabilistic Data*
359. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
360. Dynamic Query Forms for Database Queries
361. Dynamic Personalized Recommendation on Sparse Data
362. Distributed Strategies for Mining Outliers in Large Data Sets
363. Crowdsourcing Predictors of Behavioral Outcomes
364. Co-Occurrence-Based Diffusion for Expert Search on the Web
365. Comparable Entity Mining from Comparative Questions
366. CloudMoV: Cloud-based Mobile Social TV
367. Anomaly Detection via Online Oversampling Principal Component Analysis
368. Anomaly Detection Approach Using Hidden Markov Model
369. Annotating Search Results from Web Databases
370. A System to Filter Unwanted Messages from OSN User Walls
371. A Survey of XML Tree Patterns
372. A Probabilistic Approach to String Transformation
373. A New Algorithm for Inferring User Search Goals with Feedback Sessions
374. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
375. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
376. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
377. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
378. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
379. Towards Differential Query Services in Cost-Efficient Clouds
380. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
381. SocialTube: P2P-assisted Video Sharing in Online Social Networks
382. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
383. QoS Ranking Prediction for Cloud Services
384. Priority-Based Consolidation of Parallel Workloads in the Cloud
385. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
386. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
387. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
388. Load Rebalancing for Distributed File Systems in Clouds
389. Label-Embedding for Attribute-Based Classification
390. IP-Geolocation Mapping for Moderately Connected Internet Regions
391. Identity-Based Secure Distributed Data Storage Schemes
392. Hint-based Execution of Workloads in Clouds with Nefeli
393. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
394. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
395. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
396. Efficient Two-Server Password-Only Authenticated Key Exchange
397. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
398. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
399. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
400. Winds of Change: From Vendor Lock-In to the Meta Cloud
401. Supporting the Migration of Applications to the Cloud through a Decision Support System
402. Storing Shared Data on the Cloud via Security-Mediator
403. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
404. Privacy-Preserving Public Auditing for Secure Cloud Storage
405. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
406. Outsourcing Privacy-Preserving Social Networks to a Cloud
407. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
408. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
409. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
410. Efficient Security Solution for Privacy-Preserving Cloud Services
411. Collaboration in Multicloud Computing Environments: Framework and Security Issues
412. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
413. Cloud-based DDoS Attacks and Defenses
414. Cloud computing for mobile users can offloading compution save energy
415. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
416. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
417. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
418. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
419. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
420. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
421. Two tales of privacy in online social networks
422. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
423. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
424. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
425. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
426. Security and Privacy-Enhancing Multicloud Architectures
427. Security Using Colors and Armstrong Numbers
428. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
429. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
430. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
431. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
432. Privacy Preserving Data Analytics for Smart Homes
433. On Inference-Proof View Processing of XML Documents
434. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
435. Extracting Spread-Spectrum Hidden Data from Digital Media
436. Efficiently Outsourcing Multiparty Computation under Multiple Keys
437. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
438. Craigslist Scams and Community Composition: Investigating Online Fraud
439. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
440. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
441. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
442. Super-Resolution-based Inpainting
443. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
444. Image Authentication Using Stochastic Diffusion
445. Hierarchical Super-Resolution-Based Inpainting
446. Circular Reranking for Visual Search
447. Bootstrapping Visual Categorization With Relevant Negatives
448. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
449. An extended visual cryptography scheme without pixel expansion for halftone images
450. An Adaptive Cloud Downloading Service
NETWORKING
451. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
452. Topological Conditions for In-Network Stabilization of Dynamical Systems
453. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
454. Price Differentiation for Communication Networks
455. Participatory Privacy: Enabling Privacy in Participatory Sensing
456. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
457. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
458. On the Role of Mobility for Multi-message Gossip
459. Fully Anonymous Profile Matching in Mobile Social Networks
460. Fault Node Recovery Algorithm for a Wireless Sensor Network
461. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
462. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
463. Access Policy Consolidation for Event Processing Systems
464. A Fast Re-Route Method
SOFTWARE ENGINEERING
465. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
466. Vampire attacks: Draining life from wireless ad-hoc sensor networks
467. Towards a Statistical Framework for Source Anonymity in Sensor Networks
468. Search Me If You Can: Privacy-preserving Location Query Service
469. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
470. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
471. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
472. Distributed Cooperative Caching in Social Wireless Networks
473. Community-Aware Opportunistic Routing in Mobile Social Networks
474. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
475. The Devils Behind Web Application Vulnerabilities
476. Security Architecture for Cloud Networking
477. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
478. Secure Overlay Cloud Storage with Access Control and Assured Deletion
479. Risk-Aware Mitigation for MANET Routing Attacks
480. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
481. Privacy-preserving Enforcement of Spatially Aware RBAC
482. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
483. pCloud: A Distributed System for Practical PIR
484. Packet-Hiding Methods for Preventing Selective Jamming Attacks
485. Online Modeling of Proactive Moderation System for Auction Fraud Detection
486. Fast and accurate annotation of short texts with Wikipedia pages
487. FADE: Secure Overlay Cloud Storage with File Assured Deletion
488. Ensuring Distributed Accountability for Data Sharing in the Cloud
489. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
490. Direct and Indirect Discrimination Prevention Methods
491. Detecting Spam Zombies by Monitoring Outgoing Messages
492. Detecting Anomalous Insiders in Collaborative Information Systems
493. Data-Provenance Verification For Secure Hosts
494. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
495. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
496. Payments for Outsourced Computations
497. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
498. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
499. Toward Private Joins on Outsourced Data
500. Statistical Entity Extraction from Web
501. Slicing: A New Approach to Privacy Preserving Data Publishing
502. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
503. Resilient Identity Crime Detection
504. Ranking Model Adaptation for Domain-Specific Search
505. Organizing User Search Histories
506. On the Spectral Characterization and Scalable Mining of Network Communities
507. Multiparty Access Control for Online Social Networks: Model and Mechanisms
508. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
509. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
510. How do Facebookers use Friendlists
511. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
512. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
513. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
514. Enabling Multilevel Trust in Privacy Preserving Data Mining
515. Enabling cross-site interactions in social networks
516. Efficient Similarity Search over Encrypted Data
517. Efficient Extended Boolean Retrieval
518. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
519. Efficient Anonymous Message Submission
520. Effective Pattern Discovery for Text Mining
521. DDD: A New Ensemble Approach for Dealing with Concept Drift
522. Credibility Ranking of Tweets during High Impact Events
523. Creating Evolving User Behavior Profiles Automatically
524. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
525. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
526. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
527. Anomaly Detection for Discrete Sequences: A Survey
528. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
529. Advance Mining of Temporal High Utility Itemset
530. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
531. Reliable Re-encryption in Unreliable Clouds
532. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
533. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
534. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
535. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
536. Gossip-based Resource Management for Cloud Environments
537. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
538. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
539. Cloud Data Protection for the Masses
540. Cloud Computing Security: From Single to Multi-Clouds
541. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
542. In Tags We Trust Trust modeling in social tagging of multimedia content
543. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
544. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
545. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
546. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
547. Cut Detection in Wireless Sensor Networks
548. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
549. TrickleDNS: Bootstrapping DNS Security using Social Trust
550. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
551. Policy-by-Example for Online Social Networks
552. Packet Loss Control Using Tokens at the Network Edge
553. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
554. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
555. Independent Directed Acyclic Graphs for Resilient Multipath Routing
556. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
557. Game-Theoretic Pricing for Video Streaming in Mobile Networks
558. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
559. Auditing for Network Coding Storage
560. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
561. Privacy Preserving Cloud Data Access With Multi-Authorities
562. Movie Rating and Review Summarization in Mobile Environment
563. IDSaaS: Intrusion Detection System as a Service in Public Clouds
564. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
565. BibPro: A Citation Parser Based on Sequence Alignment Techniques
566. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
567. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
568. RITAS: Services for Randomized Intrusion Tolerance
569. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
570. Nymble: Blocking Misbehaving Users in Anonymizing Networks
571. Modeling and Detection of Camouflaging Worm
572. Coding for Cryptographic Security Enhancement using Stopping Sets
573. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
574. Wireless Sensor Network Security model using Zero Knowledge Protocol
575. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
576. Throughput Optimization in Mobile Backbone Networks
577. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
578. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
579. Fast Data Collection in Tree-Based Wireless Sensor Networks
580. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
581. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
582. SPAF: Stateless FSA-based Packet Filters
583. Selfish Overlay Network Creation and Maintenance
584. ProgME: Towards Programmable Network MEasurement
585. Locating Equivalent Servants over P2P Networks
586. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
587. Buffer Sizing for 802.11 Based Networks
588. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
589. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
590. Improving Utilization of Infrastructure Clouds
591. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
592. CloudTPS: Scalable Transactions for Web Applications in the Cloud
593. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
594. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
595. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
596. Ranking Spatial Data by Quality Preferences
597. Making Aggregation Work in Uncertain and Probabilistic Databases
598. Load Shedding in Mobile Systems with MobiQual
599. Group Enclosing Queries
600. Extended XML Tree Pattern Matching: Theories and Algorithms
601. Effective Navigation of Query Results Based on Concept Hierarchies
602. Discovering Conditional Functional Dependencies
603. Decision Trees for Uncertain Data
604. Data Leakage Detection
605. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
606. Young Talent Tracker
607. Cricket Stadium Seat Booking
MODERN AGRICULTRE
608. i VILLAGE
609. International Plant Import and Export
OUR MODERN SOCITY
610. Metro Rail Corporation
611. Trained Volunteers Create A Successful Social Campaign
612. Finger thump Based Shopping Cart
613. Finger Print E-Voting Systems
614. Create a Successful Anti- Nuclear Campaign
615. Crowding Funding Mobilization
616. People Power of India
617. Modern Finger Print Voting System
618. Election Commission Management
619. Online Painting Auction
620. Reality Show Ticket Booking System
621. Online Broadway Motel Food Ordering System
622. Fashion Studio Model Management
623. Women's Selfhelp Group
Advance Health Care System
624. Gracelife - Charity one click away
625. Medical Reporting System
626. Organizing medical camp for public health development
627. Homeopathy Health Record
628. Consumer Legal Advicer
629. Raw Requried Online Medicine
630. Medical Record Authentication
MORDERN EDUCATION SYSTEM
631. I School
632. Job fair section process
633. Advertising in E-Book
634. Students Skills With Modern Industries
635. College Placement And College Event
636. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
637. Cloud Storage Public Digital Certificate
ERP PROJECTS
638. Customer Relationship Management
639. Corporate Trouble Shooter
640. Corporate Event Organisation
641. Engnering Lab Maintenance
642. Select Your Age(Business Motivation all age group)
643. Software Requirements Analysis for Client Side
644. ERP System (Enterprint Resource Plan
LATEST BANKING
645. User Opinion For Indian Banking Service And Cashless Economy
646. Advanced Banking System
647. EyeBank Management System
ONLINE CONSUMERS PROCESSING
648. Economic Usage of Solar Energy
649. Gps Consumers Complients
650. Online Softskills Tracks
651. Online Buy And Sale Software
652. Budget Home Design
653. Online Product Exchange
654. Jewellery Management
655. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
656. E TENDERING -JAVA
657. Moderate Robatics System with Public Opinion
Java Apps
658. Online overview of skills really used in jobs
659. Land Bank for Nursery
660. Developing Rural Economy
661. ECOPS - Electronics Police Record Management System
662. Website Evaluation Using Opinion Mining
663. Monitoring Suspicious Discussions on Online Forums Using Data Mining
664. INSURANCE MANAGEMENT SYSTEM
665. e-Fraud Prevention based on the Self- Authentication of e-Documents
666. Hope Center
667. Exam crazy
668. BUGS REPORTING SYSTEM
669. LOCATION BASED CONSUMER COMPLAINT
670. Speed Racing
671. ROADSTER
672. META CAFE
673. ONLINE VIDEO LOCKER
674. Management System in Metro Train
675. Plant Shopping on Web
676. Reporting Online Media News Systems
677. Informative Content Extraction
678. E-commerce Complaint Management System
679. Modern Agriculture Development System
680. Loan Online Application
681. Rural Community Developement
682. LOVE AND CARE
683. GREEN PLANT
684. Advance Couier Service
685. Community Awarness
686. E_Music
687. Staff Management System
688. E-TENDERING
689. Hotel Management
690. Crime File Management System
691. Cloud Cyber Attack
692. Cloud Cost Management for Customer Sensitive Data
693. Advance Web based Multimedia Answer Generation
694. Commaunity Awareness
695. E-Commerce Complaints
696. Modern Agriculture Development System
697. Plant Shopping on Web
698. ONLINE VIDEO LOCKER
699. ONLINE VIDEO LOCKER
700. Reporting Online Media News Systems
701. Online Plant Shopping
702. Community Awareness
703. Loan Online Application
704. Modern Agriculture Development System
705. Online Digital Library
706. Geo Base Services
707. Civil Supplies and Consumer Protection Department
708. Citizen Opinions vs Government Policies
709. Protecting Used Data Privacy for Attackers
710. Web Hospital Management
711. Easy SQL Query for Non-IT Manager
712. Online Shopping with Fraud detection
713. Efficient Spatial Query Processing
714. Cryptographic Key Exchange Authentication
715. Online Global Information Service Center
716. Contracts Business Events Management
717. Online Secure image Social Networks
718. Outsourcing of Online Image Reconstruction
719. Trust based Profile Matching Secure Social Network
720. Secure and Distance based Online Social Network (OSN)
721. Efficient Online Image Retrieval System
722. Data Sharing In Cloud Storage by Using Key-Aggregate
723. Multicast Key Management for Cloud
724. Face-to-face contact on Mobile Social Networks
725. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
726. Dynamically Growing Online Survey for Behavioral Outcomes
727. Advance Web based Multimedia Answer Generation
728. College Result Analysis with Horizontally Distributed Databases
729. Feedback Decision Support for mHealth monitoring
730. Exchange Secrete Key for Data Producers and Consumers
731. Efficient Information Retrieval Using Ranked Query (EIRQ)
732. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
733. Web Hosting On Cloud
734. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
735. Web Server Security with Web Client Management System
736. Web Parser on Sequence Alignment Techniques
737. Web Page re-Ranking System for Library
738. Web Eye
739. Voting System for Web Library
740. VIRTUAL CLASSROOM SYSTEM
741. Unique Web Resources Utilization Monitoring System
742. Transport Management System
743. Pre-paid Recharging System on Banking
744. Tollgate Management
745. Time To Time Stock Market Updater and Monitoring System
746. Sql Tuner
747. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
748. SMS Based Mobile Banking with Security
749. Sms Topup
750. Vendor Information System For Shipping
751. Sequential Anomaly Detection from User Behaviour
752. Secure SMS Transaction System on banking
753. Secure Online Documents Management System in Cloud
754. Secure File Uploading Server with Advance Protecting System
755. Secure File Monitoring System on Cloud
756. Relational Logic Search Engine On Healthcare
757. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
758. Quick Customer decision support on Web Sales Portal
759. Query Response System for File Management
760. Quality Visualization on Web TV
761. Project Work Tracking System
762. Product Market Manipulations on Asian stock market
763. Predicting Top Company Share Based on High Utility Data
764. Automation of Analysis and Development Management
765. Pharmacy Information System
766. Personalize Your News on Web
767. Online University
768. Online tagging for multimedia content
769. Online Search Ranking On Multiple Domain
770. Online Rental House Web Portal
771. Online Recruitment System
772. Online Real Estate Property Management
773. Online Multi Type Documents Search Engine
774. ONLINE MOBILE BILLING SYSTEM
775. Online Jewelry Management
776. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
777. Online Examination System
778. Online Ensemble Learning Approach
779. Online Banking With Fraud Detecting
780. Online Auction Bit
781. ONLINE ADVERTISING SYSTEM
782. Nutraceuticals Management System
783. Nearest Shopping Location Identification Systems
784. Multilevel Images Authentication Systems
785. Multi New Product Survey Management
786. Movie Recommender Systems via User- Item Subgroups
787. Movie Rating and Recommendation on Mobile
788. Modern Municipal Corporation
789. Mobile TV Quality Management
790. Mobile Banking WAP
791. Manifold Entrust Scheme
792. Management System in Train
793. Secure Mailing System
794. Location-Based Spatial Query Processing in Wireless Broadcast Environments
795. LEAVE MANAGEMENT SYSTEM FOR MNC
796. Knowledge Based Decision Support System(KMS)
797. Key Management for Content Integration
798. Inter Bank Fund Transfer in Distributed Network
799. Information and Knowledge Extracting from a large amount of data
800. Industry Standard Authorization For Sensitive Resources
801. Implementation and Validating Environmental and Health
802. iKnoweb Extracting and Integrating Entity Information System
803. HUMAN ASSURANCE ADMINISTRATION
804. High_level network Security Using Packet Filtering
805. High and Low Level SQL Query Executor
806. GLOBAL COUNSELLING SYSTEM
807. A Game Theory for Online Security
808. Distributed Transaction Proxy
809. Freelancer Job
810. File Security With Multi Database System
811. FILE SEARCH ENGINE
812. Fertilizer Management System
813. Fast Web Information Gathering with Alias Detection
814. E-Tutor Online Jobs
815. Enterprise Stock and Accounting System
816. Ensuring Data Storage Security in Cloud Computing
817. Encrypted IT Auditing on Cloud Computing
818. Encrypted Data Storage Vs Data Against illegal Access
819. Enabling Site Interaction In Social Community
820. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
821. E-Music world
822. Employee Resource Management
823. Employee Management System
824. E-Learning
825. E Fraud Prevention based on the Self Authentication of e Documents
826. Distribution System for Discount Sales
827. Distributed Data Integration on Electricity Board
828. Disease Information Hiding on Publishing Healthcare Data
829. Digital Documents Attestation Systems
830. Defending Against Web Application Vulnerabilities
831. Defects Analysis Systems
832. Data theft detection mobile cloud computing
833. Data Base Fraud Detection Systems
834. Customer Information Hiding for Data Mismanagement in Banking
835. Company Security Reporting System(CSRS)
836. E -Crime File Management System
837. Credit Card Management System
838. Corporate Requirement System
839. Consumer Sales Online Fake Product Detection and Deletion
840. Company Information Tracking System
841. Cloud Policy-Based File Assure Deletion
842. Cloud Data Theft Attacks
843. Cloud Cyber Attacks against Social Networks
844. Cloud Cost Management for Customer Sensitive Data
845. Client Favorite Photo Search Engine on Web
846. Citizen Card System
847. Card Management System
848. Design &Development of Car Parking and Automation Billing Systems
849. Customer Care Service
850. BPO Call Center
851. Automation of IT Process Management
852. Modeling and Automated Containment of Worms
853. Attribute Key Based Data Security System
854. As Needed Basis Accountability for Cloud Data Sharing
855. Annotation of short texts With Wikipedia pages
856. AIRLINE RESERVATION SYSTEM
857. Advance User Management on Social Website
858. A Semantic Web Based Scientific News Aggregator


Java Mini Projects
Mini Projects
859. Website Tracking System
860. Website Ranking System
861. Treasure Warehouse
862. Student Information System
863. Storage security
864. PRISON MANAGEMENT SYSTEM
865. E-Licence Investigation System
866. Online Secure File Transfer System
867. Online Medicine Purchase
868. ONLINE EDUCATION
869. Online Agriculture System
870. Mobile Survey
871. ISSUE TRACKING SYSYTEM
872. HOSPITAL MANAGEMENT SYSYTEMS
873. HealthCare Management System
874. Global Employee Acclaimer
875. E-VOTING FOR ASSOCIATION
876. Encrypted Register Form
877. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
878. E INSURANCE
879. Courier Tracking Systems
880. corporate Transportation
881. Collectorate Communication Systems
882. Budget Approval System
883. BLOOD BANK MANAGEMENT SYSTEMS
884. ATTENDANCE MANAGEMENT SYSTEM
885. Activity management


PYTHON PROJECT - IEEE
MORE PYTHON IEEE
886. Phishing Email Detection Using Improved RCNN Model with Multilevel Vectors and Attention Mechanism
887. Sentiment Lexicon
888. SUBWAY PASSENGER FLOW FORECASTING WITH MULTI-STATION AND EXTERNAL FACTORS
889. Personalized Recommendation of Social Images by Constructing a User Interest
890. Rainfall Rate Prediction based on Artificial Neural Networks For Rain Fade Mitigation over Earth-Satellite link
891. Opinion Mining using Ontological Spam Detection
892. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
893. Phishing Web Sites Features Classification
894. using data mining to predict hospital admissions from the emergency department
895. Correlated Matrix Factorization for Recommendation with Implicit Feedback
896. Designing Cyber Insurance Policies: The Role of Pre-Screening and Security Interdependence
IMAGE PROCESSING
897. Iris Recognition
898. Currency Recognition System
PYTHON TRAINING WITH PROJECT
899. Privacy Characterization and Quantification in Data Publishing
900. Rainfall Rate Prediction based on Artificial Neural Networks For Rain
901. Opinion Mining using Ontological Spam Detection
902. Predicting the top-N popular videos via cross-domain hybrid model
903. Fraquent itemsets mining with differential privacy over large scale data
904. Phishing Web Sites Features Classification
905. Dynamic Facet Ordering for Faceted Product Search Engines
906. DATA-DRIVEN DESIGN OF FOG COMPUTING AIDED PROCESS MONITORING SYSTEM
907. Machine Learning and Deep Learning Methods for Cybersecurity
908. Linear Regression Algorithm Predict the volution of Community in Future
909. A User-Centric Machine Learning Framework for Cyber Security Operations Center
910. Linear Regression Algorithm
911. A Machine Learning Approach to Routing
912. MULTIFACTOR OPINION MINING AND INTENTION ANALYSIS FOR BUSINESS INTELLIGENCE
913. ENTREPRENRURANALYZES IMPERFECT INFORMATION FOR BESINESS OPPORTUNITY EVALUATION
914. DOCUMENT CLUSTERING USING IMPROVED K-MEANS ALGORITHM
915. CYBER SECURITY
916. Automatic Sentiment Detection in Naturalistic Audio
917. Review of the Use of AI Techniques in Serious Games: Decision-Making and Machine Learning
918. Student Performance Analysis - PYTHON
919. E-assessment using image processing in ∞Exams
920. Weakly-supervised Deep Embedding for Product Review Sentiment Analysis - IEEE 2018
921. NLP - NATURAL LANGUAGE PROCESSING
922. Bag-of-Discriminative-Words (BoDW) Representation via Topic Modeling
923. Image Based Appraisal of Real Estate Properties-IEEE 2017
924. FOOD WASTE ORGANIZER
925. PYTHON PROJECT FLOW
926. PYTHON PROGRAM EXECUTION
927. PYTHON INSTALLATION
PYTHON APPLICATION
928. Consumer Attitudes towards Insurance Products
929. Organic Food
930. BOOK RECOMMENDATION SYSTEM PYTHON
931. Web Scraping Using PYTHON
932. MULTIMEDIA CONTENT PROTECTION
933. Student Performance Analysis - PYTHON
934. HOTEL MANAGEMENT
935. DATA MINING ON SOCIAL MEDIA SENTIMENT


MACHINE LEARNING-ML(Data Scientist)
Reinforcement Learning
Unsupervised Learning
Supervised Learning
Supervised Learning, Unsupervised Learning, and Reinforcement Learning
936. Privacy Data Mess-apps
937. Speech Recognition in Social Care - NLP
938. Text-to-Speech (TTS)- NLP
939. Voice Scheduler - NLP
940. VOICE SEARCH ENGINE - NLP
941. LINEAR REGRESSION - PYTHON
942. LATENT DIRICHLET ALLOCATION
943. DIGITAL IMAGE PROCESSING - PYTHON
944. DECISION TREE LEARNING - ALGORITHM
945. NAIVE BAYES CLASSIFIER
946. K - MEANS CLUSTERING
947. Dengu Data Analysis Using R-program
948. Shopping Data set Analyse Using R Machine Learning
949. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
950. Polynomial Time Algorithm-PTA
951. (Transaction Splitting, Smart Splitting) Infrequent Weighted Item set Miner Algorithm
952. k-Nearest Neighbor Classification over Secure Encrypted Relational Data
953. K-Means For Clustering


NEW TECHNOLOGY-HELP VIDEO
JAVA - SPRING HIBERNATE
954. FISHING DISASTER MANAGEMENT SYSTEM
IEEE PROJECT LIST
955. LATEST IEEE 2018-19 TOPIC
ALGORITHM - ML-NLP-AI
956. NAIVE BAYES CLASSIFIER
957. K - MEANS CLUSTERING
958. LINEAR REGRESSION - PYTHON
959. LATENT DIRICHLET ALLOCATION
960. DIGITAL IMAGE PROCESSING - PYTHON
961. DECISION TREE LEARNING - ALGORITHM
Artificial Intelligence-ML,NLP
962. MACHINE LEARNING-ML ALGORITHM
963. WHAT IS MACHINE LEARNING - AI
964. NATURAL LANGAUAGE PROCESSING - NLP
965. VISION - Visual Data


BLOCK CHAIN TECH - BITCOIN
BLOCKCHAIN TECHNOLOGY
966. Blockchain for AI
967. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


R - DATA SCIENCE - ML
R PROGRAMMING WITH TRAINING
968. R - ADVANCE IMAGE PROCESSING
969. Dengu Data Analysis Using R-program
970. Shopping Data set Analysis Using R Machine Learning
971. To Identify Disease Treatment Relationship in Short Text Using Machine Learning & Natural Language Processing
972. R PROGRAM TRAINING
973. R IEEE PROJECTS
Bioinformatics Using R Programming Machine Learning
974. COMAPRISON OF VARIOUS DOCKING SCORES
975. MOLECULAR MODELING STUDIES OF VARIOUS DRUGS
976. INTEGRATION STUDY OF ALL BIOINFORMATICS TOOLS
977. DISEASE TARGET VALIDATION FOR ALL CANCER DISEASES
978. MICRO ARRAY GENE EXPRESSION ANALYSIS
979. STRUCTURAL ANALYSIS OF PROTEIN TARGETS
980. SEQUENCE ANALYSIS FOR HUMAN DISEASE TARGETS


WEKA-Machine Learning
DATA SET ANALYSES - WEKA
981. Diabetics Dataset
982. Excercise Dataset
983. MEDICAL DATA ANALYSES
984. WEKA PRIVACY DATA SET ANALYSES


Internet of things (IoT)
IOT Under Developing - Topic
985. Object-level Trajectories based Fine-Grained Action Recognition in Visual IoT Applications
986. Maximizing Sleeping Capacity Based on QoS Provision for Information-Centric Internet of Things
987. Deep Reinforcement Learning for Online Computation Offloading in Wireless Powered Mobile-Edge Computing Networks
988. Application of Internet of Things and Blockchain Technologies to Improve Accounting Information Quality
989. Review of Standard Ontologies for the Web of Things
IoT Projects
990. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
991. Who Moved My Data? Privacy Protection in Smartphones
992. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
993. IOT Projects
994. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
995. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
996. FogRoute: DTN-based Data Dissemination Model in Fog Computing


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
997. iShuffle: Improving Hadoop Performance with Shuffle-on-Write
998. MRSIM: Mitigating Reducer Skew In MapReduce
999. Content-aware Partial Compression for Textual Big Data Analysis in Hadoop
1000. HADOOP WITH HEALTHCARE DATA ANALYSYS
1001. HADOOP WEBLOG DATA ANALYSES
1002. BANK DATA ANALYTIC WITH HADOOP
1003. HADOOP TRAINING


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
1004. Bucket Based Data Deduplication Technique for Big Data Storage System
1005. A Semisupervised Approach to the Detection and Characterization of Outliers in Categorical Data
1006. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
1007. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
1008. Efficient Recommendation of De-identification Policies using MapReduce
1009. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
1010. Big Scholarly Data: A Survey
1011. SocialQ&A: An Online Social Network Based Question and Answer System
1012. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1013. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1014. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
1015. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
1016. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
1017. User-Centric Similarity Search
1018. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
1019. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
1020. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
1021. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
1022. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
1023. Processing Incomplete k Nearest Neighbor Search
1024. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
1025. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
1026. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
1027. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
1028. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
1029. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
1030. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
1031. Deduplication on Encrypted Big Data in Cloud
1032. Dynamic Resource Allocation for MapReduce with Partitioning Skew
1033. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
1034. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
1035. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
1036. Self-Healing in Mobile Networks with Big Data
1037. Secure Sensitive Data Sharing on a Big Data Platform
1038. Big Data, Big Knowledge: Big Data for Personalized Healthcare
1039. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
1040. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
1041. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
1042. Differentially Private Frequent Itemset Mining via Transaction Splitting
1043. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
1044. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
1045. Fast Best-Effort Pattern Matching in Large Attributed Graphs


JOBS CONSULTANCY - SOFT SKILLS
PYTHON PROJECT WITH PLACEMENT TRAINING
1046. E-assessment using image processing in ∞Exams
1047. NLP - NATURAL LANGUAGE PROCESSING
1048. PYTHON PROJECT
R PROGRAMMING WITH PLACEMENT TRAINING
1049. Dengu Data Analysis Using R-program
1050. To Identify Disease Treatment Relationship in Short Text Using Machine Learning
MEAN: MongoDB, Ember, AngularJS and nodeJS
1051. Big Scholarly Data: A Survey
1052. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
1053. Big Data, Big Knowledge Big Data for Personalized Healthcare
1054. Deduplication on Encrypted Big Data in Cloud
1055. Secure Sensitive Data Sharing on a Big Data Platform
1056. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
1057. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
1058. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
1059. Self-Healing in Mobile Networks with Big Data
1060. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
1061. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
1062. Child Monitoring - ANDROID APPS
1063. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
1064. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
1065. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
1066. Developing Apps for visually imapired people: Lessons learned from social network
1067. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
1068. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
1069. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
1070. Design of secure location and message sharing system for android platform
1071. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
1072. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
1073. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
1074. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
1075. Privacy Protection based Access Control Scheme in Cloud-based Services
1076. Privacy-Preserving Selective Aggregation of Online User Behavior Data
1077. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
1078. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


ANDROID IEEE 2017 -18
IEEE TRANSACTIONS ON BIG DATA
1079. MULTI-MODAL DESCRIPTION OF PUBLIC SAFETYEVENTS USINGSURVEILLANCE AND SOCIAL MEDIA
IEEE Internet of Things (IoT)
1080. A Verifiable and Flexible Data Sharing Mechanism for Information-Centric IoT
1081. Who Moved My Data? Privacy Protection in Smartphones
1082. Robot Assistant in Management of Diabetes in Children Based on the Internet of Things
1083. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
1084. Monet: A User-oriented Behavior-based Malware Variants Detection System for Android
1085. Privacy-Preserving Aggregate Queries for Optimal Location Selection
1086. Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
1087. PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
1088. Efficient Clue-based Route Search on Road Networks
1089. Privacy-Preserving Location-Proximity for Mobile Apps
1090. Cooperative Query Answer Authentication
1091. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
1092. Constructing a User-Friendly and Smart Ubiquitous Personalized Learning Environment by Using a Context-Aware Mechanism
1093. A Multi-Agent Advanced Traveler Information System for Optimal Trip Planning in a Co-Modal Framework
1094. ZapDroid: Managing Infrequently Used Applications on Smartphones
1095. Searching Trajectories by Regions of Interest
1096. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
1097. A Classroom Scheduling Service for Smart Classes
1098. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
1099. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
1100. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
1101. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
1102. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1103. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
1104. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1105. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
1106. Authentication of Smartphone Users Using Behavioral Biometrics
1107. An Exploration of Geographic Authentication Schemes
1108. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
1109. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
1110. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
1111. Distributed secret sharing approach with cheater prevention
1112. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
1113. Efficient privacy preserving location based query over outsourced encrypted data
1114. Utilizing the Cloud to Store Hijacked Camera Images
1115. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
1116. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
1117. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
1118. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
1119. Enabling privacy preserving location proof for mobile users.
1120. Optimizing User Experience in Choosing Android Applications
1121. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
1122. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
1123. FoodForCare: An Android Application for Self-Care with Healthy Food
1124. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
1125. Silence is Golden: Enhancing Privacy of Location-Based Services
1126. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
1127. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
1128. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
1129. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
1130. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
1131. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
1132. Adapting to User Interest Drift for POI Recommendation
1133. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
1134. Developing Apps for visually imapired people: Lessons learned from social network
1135. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
1136. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
1137. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
1138. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
1139. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
1140. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
1141. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
1142. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
1143. Mobile cloud support for semantic enriched speech recognition in social care
1144. Distributing secret sharing approach with cheater prevention based on QR code
1145. Design of Secure Location and Message Sharing System for Android Platform
1146. The impact of cloud technology on the automation of businesses
1147. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
1148. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
1149. Rescue Management System
1150. Android Army - Military Apps
1151. Android Beauty Parlor
1152. Android E Municipality
1153. ANDROID NURSE AID
1154. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
1155. Human Resource (HR)- APPS
1156. GPS Employee Tracking System
OUR MODERN SOCITY
1157. GENERIC MEDICINE
1158. ANDROID APPS - ALL IN ONE APPS FOR HOUSE MANAGER
1159. RECYCLE APP WASTE COLLECTION REUSE
1160. Bikes Rental - APPS
1161. Location Based Alarm - GPS
1162. ANDROID APPS FOR INSURANCE SYSTEM
1163. BUDGET HOME DESIGN -ANDROID APPS
1164. Former To Former Apps
1165. Pets Care
ONLINE CONSUMERS PROCESSING
1166. House Hold Appliancies Warranty Management
1167. GPS Transport Packers and Movers
Android Apps
1168. MY LIBRARY
1169. FACULTY RATING SYSTEM
1170. App for self organizer
1171. ONLINE DOCTOR APPOINTMENT
1172. Conference Event Mobile Assistant
1173. Mobile Prescription
1174. Metastore Application
1175. Android SmartCampus
1176. Android Shopping Mall
1177. TOLL GATE -Barcode Billing System --ANDROID
1178. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
1179. Taste Hunt For Restaurants
1180. POLICE APPS
1181. Android Blood Bank
1182. Mobile Expense Claim System Android
1183. Android Intelligent Time Tracking System TICK
1184. Android Course and Attendance Management System
1185. Android Event Reminder
1186. Android Attendance Assessment
1187. Android Advance Shopping
1188. Android CAR POOLING
1189. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
1190. Android HOSPITAL
1191. ATHLETE MEET GUIDE
1192. Android Apps PARKING MANAGER
1193. Love and Care
1194. Food Waste Management System
1195. Travel Guide
1196. Android Provisional Store
1197. Best Baby Care with Vaccines Remainder
1198. Android Assist for Lecturer and Student
1199. Android Personal Assistance (PA)
1200. Android Application for College Management System
1201. Tollgate Payment system in android
1202. Intelligence Quotient (IQ) Test
1203. GPS LOCATION ALARM SYSTEM
1204. Location Based Intelligent Mobile Organizer
1205. BANK ACCOUNT TRACKER FOR ANDROID
1206. UNIT CONVERTER
1207. Tips and Tax Calculator in Android
1208. TEXT EDITOR FOR ANDROID
1209. Student Attendance Tracking System
1210. Smart Money With Daily Expenses
1211. Simple And Secure Android TO DO List Application
1212. Restaurant Table Order Management System
1213. Online Shopping
1214. Online Examination System For Android
1215. ANDROID SHOPPING LOCATION IDENTIFIER
1216. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
1217. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
1218. MICRO CREDIT BANKING ON SMARTPHONE
1219. LOCATION BASED ALARM
1220. Insurance in android
1221. GOOGLE PLACE FINDER
1222. Friend Mapper on Mobiles - Friend Locator
1223. EXPENSE MANAGER
1224. Employee Diractory
1225. Online job search
1226. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
1227. ANDROID STUDENT RESULT ANALYZING SYSTEM
1228. CloudMoV : Cloud-based Mobile Social TV
1229. Bus Reservation
1230. Budget Planner
1231. Android SMS Systems
1232. ANDROID LEAVE MANAGEMENT SYSTEM
1233. ANDROID EVENT SCHEDULER/REMINDER
1234. Android Grocery Shopping List
1235. Android Attack Application
1236. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
1237. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
1238. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
1239. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
1240. Optimizing Display Advertising Markets
1241. Using Knowledge Libraries to Transfer Expert Knowledge
1242. Semantic Retrieval of Trademarks Based on Conceptual Similarity
1243. Understanding and Predicting Question Subjectivity in Social Question and Answering
1244. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
1245. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
1246. Fast Top-K Path-based Relevance Query on Massive Graphs
1247. Web Image Search Re-ranking with Click-based Similarity and Typicality
1248. Automatically Mining Facets for Queries from Their Search Results
1249. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
1250. Statistical Entity Extraction from Web
1251. Question Answering System for an Effective Collaborative Learning
1252. Lost in Translation: Improving Decoy Documents via Automated Translation
1253. Learn to Personalized Image Search from the Photo Sharing Websites
1254. In Tags We Trust Trust modeling in social tagging of multimedia content
1255. Efficient Anonymous Message Submission
1256. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
1257. Employment Knowledge Database
1258. Organise Corporate Training For Client Project s
1259. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
1260. ONLINE VEHICLE SHOWROOM SYSTEMS
1261. Online Voting
1262. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
1263. School Management System
1264. Secure Online Course Automation
1265. School Automation System
1266. Online Aquarum
1267. Web Direct Recruitment Analysis
PHP Apps
1268. Project Approval System
1269. Movie Ticket Booking
1270. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
1271. TRADE / INDUSTRY WEB PORTAL
1272. Feeding the poor from the supermarket
1273. Application for recording your goals and habits
1274. VISUAL WAY TO RAISE AWARENESS
1275. Municipal Corporation
1276. Online Polling For Publishers And Brands
1277. Avoid Food Wastage
1278. Web Doctor
1279. ONLINE FOOD ORDERING SYSTEM
1280. E-Tendering
1281. Improving Rural Communities
1282. Green Planet Awarness
1283. Development of an Online Course Portal for a campus
1284. Auxon Test
1285. WEB BASED LEARNING SYSTEM
1286. Tagging in online social networks
1287. Secured file Downloading system
1288. Cryptonite : A Secure and Performant Data Repository on Public Clouds
1289. searching a image from websites
1290. Online University
1291. Online product Opinion and Ranking System
1292. MNC LEAVE MANAGEMENT SYSTEM
1293. Home appliances online purchase
1294. Freelancer Job
1295. E-Tutor Online Jobs
1296. Statistical Entity Extraction from Web
1297. Effective Collaborative Learning
1298. Development of an e-Post Office System
1299. Question Answering System for an Effective Collaborative Learning


ASP.NET MVC Framework
ASP.NET MVC Framework Project
1300. Towards Effective Bug Triage with Software Data Reduction Techniques
1301. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
1302. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
1303. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
1304. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
1305. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
1306. Proof of retrievability with public verifiability resilient against related-key attacks
1307. Secure Anonymous Key Distribution Scheme for Smart Grid
1308. Converses For Secret Key Agreement and Secure Computing
1309. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
1310. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
1311. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1312. Privacy Protection based Access Control Scheme in Cloud-based Services
1313. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
1314. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
1315. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
1316. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
1317. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
1318. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
1319. Explaining Missing Answers to Top-k SQL Queries
1320. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
1321. Continuous Top-k Monitoring on Document Streams
1322. Generating Query Facets using Knowledge Bases
1323. Query Reorganization Algorithms for Efficient Boolean Information Filtering


ANGULAR JS ,
ANGULAR JS
1324. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
1325. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
1326. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1327. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
1328. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1329. Generating Query Facets using Knowledge Bases
1330. Private Over-threshold Aggregation Protocols over Distributed Datasets
1331. Private Over-threshold Aggregation Protocols over Distributed Datasets


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
1332. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
1333. Privacy Protection based Access Control Scheme in Cloud-based Services
1334. Dynamic Facet Ordering for Faceted Product Search Engines
1335. Continuous Top-k Monitoring on Document Streams


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
1336. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1337. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
1338. A Forecasting Methodology for Workload Forecasting in Cloud Systems
1339. Optimal Shipping Strategy and Return Service Charge Under No-Reason
1340. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
1341. A Recommendation System to Facilitate Business Process Modeling
1342. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
1343. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
1344. User Differentiated Verifiable File Search on the Cloud
1345. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
1346. Statistical Features Based Real-time Detection of Drifted Twitter Spam
1347. Incremental Consolidation of Data-Intensive Multi-flows
1348. Service Pattern: An Integrated Business Process Model for Modern Service Industry
1349. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
1350. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
1351. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
1352. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
1353. Democratic Diffusion Aggregation for Image Retrieval


Dot Net IEEE 2016-17
IEEE Transactions on Computers
1354. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
1355. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
1356. TagBook: A Semantic Video Representation without Supervision for Event Detection
1357. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
1358. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
1359. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
1360. The Impact of Review Environment on Review Credibility
1361. Private Over-threshold Aggregation Protocols over Distributed Datasets
1362. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
1363. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
1364. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
1365. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
1366. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
1367. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
1368. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
1369. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
1370. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
1371. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
1372. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
1373. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
1374. What Is Happening in The Video Annotate Video by Sentence
1375. Two level QR code for private message sharing and document authentication.
1376. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1377. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
1378. Mining Health Examination Records A Graph-based Approach
1379. A Credibility Analysis System for Assessing Information on Twitter
1380. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
1381. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
1382. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
1383. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
1384. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1385. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
1386. Predicting Personalized Image Emotion Perceptions in Social Networks
1387. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
1388. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
1389. Explaining Missing Answers to Top-k SQL Queries
1390. Bilevel Feature Extraction Based Text Mining
1391. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
1392. Privacy-Preserving Outsourced Media Search
1393. Modeling and Verification of Online Shopping Business Processes
1394. User Preference Learning for Online Social Recommendation
1395. Steganalysis Features for Content-Adaptive JPEG Steganography
1396. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
1397. PiCode: a New Picture-Embedding 2D Barcode
1398. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
1399. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
1400. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
1401. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
1402. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
1403. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
1404. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
1405. Cloud workflow scheduling with deadlines and time slot availability
1406. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
1407. Path-Based Epidemic Spreading in Networks
1408. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
1409. On the Resiliency of Static Forwarding Tables
1410. Network Capability in Localizing Node Failures via End-to-End Path Measurements
1411. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
1412. DX: Latency-Based Congestion Control for Datacenters


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
1413. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
1414. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
1415. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
1416. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
1417. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
1418. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
1419. Hacking is not random: a case-control study of webser ver-compromise risk
1420. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
1421. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
1422. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
1423. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
1424. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1425. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
1426. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
1427. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
1428. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
1429. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
1430. Diversifying Web Service Recommendation Results via Exploring Service Usage History
1431. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
1432. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1433. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1434. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
1435. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
1436. Cross-Domain Feature Learning in Multimedia
1437. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
1438. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
1439. Saliency-based color accessibility
1440. Contextual Online Learning for Multimedia Content Aggregation
1441. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
1442. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
1443. An Attribute-assisted Reranking Model for Web Image Search
1444. RRW - A Robust and Reversible Watermarking
1445. Steganography Using Reversible Texture Synthesis
1446. Single Image Super-Resolution Based on Gradient Profile Sharpness
1447. Detection and Rectification of Distorted Fingerprints
1448. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1449. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
1450. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1451. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1452. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
1453. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
1454. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
1455. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
1456. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
1457. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1458. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
1459. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
1460. Authenticated Key Exchange Protocols for Parallel Network File Systems
1461. Data Collection in Multi-Application Sharing Wireless Sensor Networks
1462. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
1463. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
1464. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1465. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
1466. Optimum Power Allocation in Sensor Networks for Active Radar Applications
1467. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1468. Context-based Diversification for Keyword Queries over XML Data
1469. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
1470. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
1471. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
1472. Tweet Segmentation and Its Application to Named Entity Recognition
1473. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
1474. Automatic Group Happiness Intensity Analysis
1475. RRW - A Robust and Reversible Watermarking Technique for Relational Data
1476. Query Aware Determinization of Uncertain Objects
1477. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1478. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
1479. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1480. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1481. Efficient Community Formation for Web Services
1482. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
1483. Secure Mining of Association Rules in Hor izontally Distributed Databases
1484. Dynamic Query Forms for Database Queries
1485. Secure kNN Query Processing in Untrusted Cloud Environments
1486. An Empirical Performance Evaluation of Relational Keyword Search Systems
1487. Keyword Query Routing
1488. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
1489. Demand Bidding Program and Its Application in Hotel Energy Management
1490. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1491. Incremental Detection of Inconsistencies in Distributed Data
1492. A Cocktail Approach for Travel Package Recommendation
1493. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1494. A Random Decision Tree Framework for Privacy-Preserving Data Mining
1495. Analysis of Field Data on Web Security Vulnerabilities
1496. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
1497. A Reliability Improvement Method for SOA-Based Applications
1498. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
1499. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
1500. Web Service Recommendation via Exploiting Location and QoS Information
1501. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
1502. Exploiting Rateless Codes in Cloud Storage Systems
1503. COMIC:Cost Optimization for Internet Content Multihoming
1504. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
1505. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1506. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
1507. Uniform Embedding for Efficient JPEG Steganography
1508. Secure Deduplication with Efficient and Reliable Convergent Key Management
1509. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
1510. Link Quality Aware Code Dissemination in Wireless Sensor Networks
1511. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
1512. Location Aware Keyword Query Suggestion Based on Document Proximity
1513. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
1514. A secure data self-destructing scheme in cloud computing
1515. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
1516. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1517. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
1518. Secure kNN Query Processing in Untrusted Cloud Environments
1519. Exploiting Rateless Codes in Cloud Storage Systems
1520. Fuzzy Authorization for Cloud Storage
1521. Planning vs. dynamic control Resource allocation in corporate clouds
1522. Automatic Scaling of Internet Applications for Cloud Computing Services
1523. Strategy-proof Pricing for Cloud Service Composition
1524. Privacy Preserving Delegated Access Control in Public Clouds
1525. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
1526. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
1527. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
1528. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
1529. A Mechanism Design Approach to Resource Procurement in Cloud Computing
1530. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
1531. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
1532. A Scientometric Analysis of Cloud Computing Literature
1533. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
1534. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
1535. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
1536. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
1537. FeatureMatch: A General ANNF Estimation Technique and its Applications
1538. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
1539. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
1540. As-Projective-As-Possible Image Stitching with Moving DLT
1541. Sharing Visual Secrets in Single Image Random Dot Stereograms
1542. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
1543. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
1544. A New Iterative Triclass Thresholding Technique in Image Segmentation
1545. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
1546. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
1547. An Iranian License Plate Recognition System Based on Color Features
1548. Learning Layouts for Single-Page Graphic Designs
1549. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
1550. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
1551. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
1552. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
1553. Fingerprint Compression Based on Sparse Representation
1554. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
1555. LBP-Based Edge-Texture Features for Object Recoginition
1556. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
1557. Toward Experiential Mobile Media Processing
1558. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
1559. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
1560. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
1561. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
1562. Designing Truthful Spectrum Double Auctions with Local Markets
1563. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
1564. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
1565. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
1566. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
1567. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
1568. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
1569. A Study on Clinical Prediction Using Data Mining Techniques
1570. Online Payment System using Steganography and Visual Cryptography
1571. Efficient Instant-Fuzzy Search with Proximity Ranking
1572. Attribute Based Encryption with Privacy Preserving In Clouds
1573. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1574. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
1575. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
1576. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
1577. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
1578. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
1579. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
1580. The Target Tracking in Mobile Sensor Networks
1581. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
1582. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
1583. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
1584. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
1585. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
1586. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
1587. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1588. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
1589. SUSIE: Search Using Services and Information Extraction
1590. SeDas: A Self-Destructing Data System Based on Active Storage Framework
1591. Secure Mining of Association Rules in Horizontally Distributed Databases
1592. Sampling Online Social Networks
1593. Privacy Preserving Delegated Access Control in Public Clouds
1594. Mining Order-Preserving Submatrices from Data with Repeated Measurements
1595. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
1596. Ginix : Generalized Inverted Index for Keyword Search
1597. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
1598. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
1599. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
1600. Dynamic Query Forms for Database Queries
1601. Cost-Based Optimization of Service Compositions
1602. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
1603. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
1604. Automatic Extraction of Top-k Lists from the Web
1605. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
1606. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
1607. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
1608. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
1609. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1610. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
1611. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
1612. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
1613. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
1614. Privacy Preserving Data Sharing With Anonymous ID Assignment
1615. Non-Cooperative Location Privacy
1616. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
1617. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
1618. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1619. Cloud based emails boundaries and vulnerabilities
1620. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1621. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
1622. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
1623. Optimal Content Downloading in Vehicular Networks
1624. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
1625. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
1626. View-invariant action recognition based on Artificial Neural Networks
1627. User-aware Image Tag Refinement via Ternary Semantic Analysis
1628. Separable Reversible Data Hiding in Encrypted Image
1629. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
1630. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
1631. Robust Face-Name Graph Matching for Movie Character Identification
1632. IntentSearch:Capturing User Intention for One-Click Internet Image Search
1633. Improving Color Constancy by Photometric Edge Weighting
1634. Exploring the design space of social network-based Sybil defenses
1635. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
1636. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
1637. AnnoSearch: Image Auto-Annotation by Search
1638. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1639. Scalable Scheduling of Updates in Streaming Data Warehouses
1640. Scalable Learning of Collective Behavior
1641. Ranking Model Adaptation for Domain-Specific Search
1642. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1643. Outsourced Similarity Search on Metric Data Assets
1644. Organizing User Search Histories
1645. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
1646. Mining Web Graphs for Recommendations
1647. Joint Top K Spatial Keyword Query Processing
1648. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1649. Identifying Content for Planned Events Across Social Media Sites
1650. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1651. Generative Models for Item Adoptions Using Social Correlation
1652. Efficient Data Mining for XML Queries Answering Support
1653. Efficient audit service outsourcing for data integrity in clouds
1654. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1655. Effective Pattern Discovery for Text Mining
1656. Combined Mining: Discovering Informative Knowledge in Complex Data
1657. Decentralized Probabilistic Text Clustering
1658. Computing Structural Statistics by Keywords in Databases
1659. Bridging Social and Data Networks
1660. Answering General Time-Sensitive Queries
1661. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
1662. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
1663. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
1664. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
1665. Resource-Aware Application State Monitoring
1666. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
1667. Query Access Assurance in Outsourced Databases
1668. Linear and Differential Cryptanalysis
1669. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1670. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
1671. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
1672. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
1673. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
1674. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
1675. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
1676. ROAuth: Recommendation Based Open Authorization
1677. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
1678. Recommendation Models for Open Authorization
1679. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
1680. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1681. On Privacy of Encrypted Speech Communications
1682. OAuth Web Authorization Protocol
1683. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
1684. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
1685. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
1686. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
1687. Fast Matrix Embedding by Matrix Extending
1688. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
1689. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
1690. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
1691. Access control for online social networks third party applications
SOFTWARE ENGINEERING
1692. Measuring Code Quality to Improve Specification Mining
1693. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
1694. Towards Secure and Dependable Storage Services in Cloud Computing
1695. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
1696. Remote Display Solutions for Mobile Cloud Computing
1697. Privacy Preserving Delegated Access Control in Public Clouds
1698. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
1699. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
1700. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
1701. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
1702. Load-Balancing Multipath Switching System with Flow Slice
1703. Assessing the Veracity of Identity Assertions via OSNs
1704. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
1705. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
1706. A New Cell-Counting-Based Attack Against Tor
1707. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
1708. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
1709. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
1710. Network Assisted Mobile Computing with Optimal Uplink Query Processing
1711. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
1712. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
1713. Fast Release Capture Sampling in Large-Scale Sensor Networks
1714. Cooperative download in vehicular environments
1715. Cooperative Data Dissemination via Roadside WLANs
1716. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
1717. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
1718. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1719. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
1720. Hiding Sensitive Association Rule for Privacy Preservation
1721. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
1722. Development of Certificate Authority Services for Web Applications
1723. Detecting and Validating Sybil Groups in theWild
1724. Association Rule Extracting Knowledge Using Market Basket Analysis
1725. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
1726. Valuable Detours: Least-Cost Anypath Routing
1727. Self-Reconfigurable Wireless Mesh Networks
1728. Reliability in Layered Networks with Random Link Failures
1729. NABS:Novel Approaches for Biometric Systems
1730. Live Streaming with Receiver-based Peer-division Multiplexing
1731. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
1732. Continuous Neighbor Discovery in Asynchronous Sensor Networks
1733. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
1734. Virtualized Screen: A Third Element for CloudMobile Convergence
1735. Steganographic Embedding in JPEG Images with Visual Criterion
1736. On the Typical Statistic Features for Image Blind Steganalysis
1737. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
1738. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
1739. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
1740. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
1741. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
1742. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
1743. Vulnerability Analysis in SOA-Based Business Processes
1744. Service-Oriented Architecture for High-Dimensional Private Data Mashup
1745. Service-Centric Framework for a Digital Government Application
1746. Server-Side Streaming Processing of WS-Security
1747. OWLPath: An OWL Ontology-Guided Query Editor
1748. Monitoring Service Systems from a Language-Action Perspective
1749. Extracting Product Features and Sentiments from Chinese Customer Reviews
1750. Expert Discovery and Interactions in Mixed Service-Oriented Systems
1751. Automated Certification for Compliant Cloud-based Business Processes
1752. Addressing Dependability throughout the SOA Life Cycle
1753. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
1754. The Geometric Efficient Matching Algorithm for Firewalls
1755. Secure Service-Oriented Architecture for Mobile Transactions
1756. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
1757. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
1758. Privacy-Preserving Updates to Anonymous and Confidential Databases
1759. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
1760. IPAS: Implicit Password Authentication System
1761. Improving Security and Performance in the Tor Network through Tunable Path Selection
1762. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
1763. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
1764. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
1765. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
1766. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
1767. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
1768. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
1769. Data Delivery Properties of Human Contact Networks
1770. Converge-Cast: On the Capacity and Delay Tradeoffs
1771. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1772. USHER: Improving Data Quality with Dynamic Forms
1773. The World in a Nutshell: Concise Range Queries
1774. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
1775. Scalable Scheduling of Updates in Streaming Data Warehouses
1776. Scalable Learning of Collective Behavior
1777. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
1778. Publishing Search Logs A Comparative Study of Privacy Guarantees
1779. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
1780. Optimal Service Pricing for a Cloud Cache
1781. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
1782. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
1783. Mining Web Graphs for Recommendations
1784. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
1785. Integration of Sound Signature Authentication System
1786. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
1787. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
1788. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
1789. Exploring Application-Level Semantics for Data Compression
1790. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
1791. Data Leakage Detection
1792. Cost-aware rank join with random and sorted access
1793. Collaborative Filtering with Personalized Skylines
1794. Bridging Socially-Enhanced Virtual Communities
1795. Automatic Discovery of Personal Name Aliases from the Web
1796. A Personalized Ontology Model for Web Information Gathering
1797. Adaptive Provisioning of Human Expertise in Service-oriented Systems
1798. A Query Formulation Language for the Data Web
1799. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
1800. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
1801. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
1802. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
1803. Towards Secure and Dependable Storage Services in Cloud Computing
1804. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
1805. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
1806. Data Integrity Proofs in Cloud Storage
1807. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
1808. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
1809. Feature-level Sentiment Analysis for Chinese Product Reviews
1810. Equal-sized Cells Mean Equal-sized Packets in Tor?
1811. Customer Relationship Management Based on Data Mining Technique
1812. Authentication Schemes for Session Passwords using Color and Images
1813. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
1814. Online Trends Management Service in It Industry
1815. Session Management System in It Industry
1816. Tools for Non IT Expert Developer
ERP PROJECTS
1817. New Company Policy Clearance System
1818. Recommend To Friend
1819. Consultanting About the Foreign Peoples
1820. Performance System Analysis In Industry
1821. Non It People Performance
MODERN AGRICULTURE
1822. Cotton Leaf Disease Identification using Pattern Recognition Techniques
1823. Agriculture Marketing in Generation
1824. Agriculture Assist
1825. Sponsor For Agriculture
SPORTS
1826. Play Ground Booking
OUR MODERN SOCITY
1827. ADHAR VOTING SYSTEM
1828. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
1829. RAILWAY SEAT RESERVATION SYSTEM
1830. Railway Management Service
1831. It Park Media
1832. Automation Transport Maintance
1833. Yell Help For Children
1834. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
1835. Apartment Maintenance
1836. Power Consumption Monitoring House Hold Electronic Device
1837. Direct Q Less Reservation System in train
Advance Health Care System
1838. MAC Sensing Protocol
1839. World Wide Cloud Inter Hospital Acess Health Care System
1840. Live Doctor
Dotnet Apps
1841. TELEVISION CHANNEL PROGRAM MANAGEMENT
1842. WIN THE TRUST OF AN INDIAN CONSUMER
1843. ONLINE ACCOUNT MANAGEMENT
1844. SMART CAB BOOKING SYSTEM
1845. ONLINE FAST FOOD ORDER
1846. Travel Mate Add Module
1847. Work Order System Call Centre
1848. SPORTS MANAGEMENT SYSTEM
1849. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
1850. Pick-It Courier Service
1851. Online Taxi Booking
1852. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
1853. INCOMETAX MAINTAINANCE SYSTEM
1854. Hotel Reservation
1855. ERP System
1856. Bug Tracking System
1857. Vendor Information System For Shiping
1858. Top-K ranking System
1859. Secure Medical Image Archive System
1860. Business Activity Coordination Using Web Services
1861. Management Portal
1862. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
1863. Secure Data Filtering Recommendation System
1864. Online Resources Sharing via Social Networks
1865. Secure self-destructing in Cloud Computing
1866. Web Resourecs File Authorization Management
1867. Click based image re-ranking system
1868. Tree Structure Data Analiysis Mining
1869. Web Resource Allocation for CorPerate
1870. Web Vulnerabilities and Security
1871. Fuzzy Cloud Search Using XML
1872. Cloud Data Supporting Secure Query Search
1873. Tour Recommender Systems on Web
1874. Distributed Interactive Web Applications
1875. Secure Query Processing for Cloud
1876. Online Data Storage with less pricing
1877. Cost Based Web Content Managemnts
1878. Web Hospital Management
1879. Online Data storage with low price
1880. Secure Online Data Block Authorization
1881. Profitable Onlin web Server System
1882. Online Economies File Manager for Multi Keying
1883. Online Community Management
1884. Key based Online Data Managements
1885. Critical Workflow Management for Web Documents
1886. Secure Online Documents Managements for Group Sharing
1887. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
1888. Online Marketing Automation System
1889. Internal organization change management System
1890. Secure confirmation of sensitive transaction data in modern Internet banking services
1891. Privacy security with TPA in cloud computing
1892. Company Information Tracking System
1893. Online Virtualized screen Processing
1894. Web Service for Airline Management
1895. Web Social Club
1896. Quantum Key Cryptography
1897. Patient Data Management Based On Hospital Location
1898. Online Software Developer Community
1899. Online Developed Software sales
1900. Avoid repeated measurements On Genetics Dataset
1901. College Lab Maintenance System
1902. Industrial Manpower Resource Organizer
1903. Web Query Construction and Search on Complex Data
1904. Hospital Emergency Data Management
1905. Data confidentiality On Health-care Information System
1906. Secure Online Trading
1907. Fast Real-Time Event Alert Using social Network
1908. Secure E-Mail Organizer
1909. Web User Service Management System
1910. Easy SQL Query for Non-IT Manager
1911. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
1912. Customer Relationship Management (CRM) on Banking
1913. Online Company ERP System
1914. Constructing E-Tourism
1915. Web based Multi Service Ranking System
1916. Dynamic Customer Data Hiding in Banking
1917. Online Distributed Social Clubs
1918. Virtual Shopping with Negative Feedback Reputation Systems
1919. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
1920. Web Service Oriented Query Authentication Technique
1921. Web Based Customer Favorite vehicle Search Engine
1922. Web Based Book Publishing System
1923. Virtual Energy- Based Encryption and Keying
1924. Video Fraud Detecting On social Network
1925. Video Compression with Data hiding & Data Extraction
1926. Vendor Information System for Shipping
1927. VALUE ADDED TAX (VAT)
1928. Universal Smart Card
1929. Ultimate Location Information Systems
1930. Top K Ranking System
1931. Techno Task Manager
1932. Supply Chain Management
1933. Substitution-Permutation cryptanalysis System
1934. Streaming Data Warehouse Updations
1935. Step by Step Monitoring for Product Purchasing System
1936. Steganography for Data Reading and Writing AVI files
1937. SQL TUNER
1938. SMS Transaction Security
1939. Session Authentication Passwords using Color
1940. Service Availability Guarantees on Virtual Economy
1941. Server Fraud Detection on Cloud
1942. Sentence Based Search on Cloud
1943. Semantic Web Search Engines
1944. Secured Image communicator
1945. Secure smart application on web application
1946. Secure Service-Oriented Smartcard systems
1947. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
1948. Secure Location Identification System
1949. Secure and Cloud Based Patient Information Systems
1950. Reduce the Password Guessing Attacks using Click Point
1951. Recommendation System Based on Graph
1952. Quantum Key Cryptography
1953. Quality Controller
1954. Public Web Status Monitoring System
1955. Project Trade Pool
1956. Product Marketing Analysis On Public Opinion
1957. Predicting Users Behaviors Using Web Mining
1958. Personal Health Information on M-Healthcare Emergency
1959. Optimum Online Knowledge Base
1960. Online Training Program
1961. Online Time sensitive queries
1962. Online Tag Based Image Retrieval and Effective Management
1963. Online Social networks controls using cloud
1964. Online Rental System
1965. Online product Opinion and Ranking System
1966. Online Dynamic form creation for Non-IT Peoples
1967. Online Digital Contract Signing in Mistrusted Parities
1968. Online Aventure
1969. Online Shopping
1970. News Ticker Project
1971. Net Bank in Recharge
1972. Multi User Public Auditing System of Data Storage Security
1973. Multi Location Networked Mobile Auto Intimates
1974. Modern Distributed Business Applications for Supply Chain Management
1975. Market Intelligence Based Public Sentiment Analysis
1976. Leave Management System
1977. Joint processing of spatial keyword queries
1978. Intelligence Missing Items in Shopping Cart
1979. Information Leak Detection and Prevention
1980. Industrial Manpower Resource Organizer
1981. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
1982. Human Expertise Search Engine
1983. Home appliances online Purchase
1984. High Secure Corporate Web Search Engine
1985. High Degree Patient Privacy on Secure Data Outsourcing
1986. Group Movement Pattern Discovery
1987. Graph Based Share Market Data Updating
1988. Generic Business Portal
1989. Flight Booking Portal
1990. Firewall using Packet Filtering
1991. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
1992. Ethical and Social issues in File sharing system
1993. Enterprener Sales Report Management
1994. Encyclopedia for Computer Science
1995. Employee Based Performance Monitoring and Action Systems
1996. Emerging Patient Health Information Exchange System On Cloud
1997. Efficient Search on Outsourced data using Cloud
1998. Efficient and Secure Data Processing on Queries Similarity
1999. Distributed Database Optimization on HealthCare
2000. Digital Asset Management Systems (DAMS) Using Watermarking
2001. Detecting Fraud on Vehicle Insurance System
2002. Defeating Lazy Servers Database Vs Query Access Assurance
2003. Data Processing for Disease-Treatment Relations
2004. Data Mining Analysis on EB bill system
2005. Data confidential against untrusted servers using attribute-based encryption (ABE)
2006. Data Aggregation using SQL clustering
2007. Customer Sales Analysis System Based On Purchasing
2008. Cryptography on Personal confidential information
2009. Cost Based Secure Cloud Data Systems
2010. Market Based Analysis for consumer correct decision
2011. Construction Company Work Order System
2012. Complete Medical Transcription System(Mts)
2013. Company Security Reporting System(CSRS)
2014. College Result Analysis
2015. Cloud Economic Benefit On Scientific Computing
2016. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
2017. Centralized Event Planer across Social Media Sites
2018. Call Center Management
2019. A Reservation-Based Coordination Protocol for Web Services
2020. Building construction and cost estimation
2021. Budget Planner
2022. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
2023. Automatically identifying query groups on Web Search Engine
2024. Auditing Data integrity and data storage using cloud
2025. Application layer blocker for preventing on cyber security
2026. Advanced One-Click User Web Search Engine
2027. Advance Patient Management System


Dotnet Mini Projects
Mini Projects
2028. VALUE ADDED TAX (VAT)
2029. User Oriented Network Attacks
2030. Secure Back Up
2031. Screen Capture And Mouse I/O
2032. Sales Bill Printing System using Excel
2033. Password Security
2034. Online User Mobile Rating
2035. Online Sensex Graph System
2036. Online Book Publishing
2037. NEWS TICKER PROJECT
2038. Multi Storage file
2039. Message Chating
2040. Medical Equipment in WAP
2041. Login Authentication Scheme
2042. Information Alert System
2043. Image Encryption And Decryption
2044. Generic Business Portal
2045. Flight Booking Portal
2046. File Transfer using Cryptography Techniques
2047. File Splitting
2048. Excel Format in Report
2049. EB Management System
2050. Dynamic Web Form Creation
2051. Android Image Search


Struts Application Projects
Struts Apps
2052. Public Sentiment Analysis with Online Shopping Using Struts
2053. Modern distributed business for supply-chain management
2054. High Confidential Personal Disease Reporting System
2055. Distributor Sensitive Data Management Using Struts
2056. Development of Certificate Authority Services for Web Applications
2057. Access Control on User-To-User Interactions in Social Networks


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
2058. Sponsor For Agriculture
2059. Agriculture Assist
2060. Agriculture Marketing in Generation
2061. International Plant Import and Export
MODERN EDUCATION SYSTEM
2062. Old In Gold
2063. I School
2064. College Placement And Events
2065. Rural Area Educational Trouble Shooter
2066. Web Direct Recruitment Analysis
2067. Online Aquarum
2068. School Automation System
2069. Secure Online Course Automation
2070. Session Management System in It Industry
2071. Tools for Non IT Expert Developer
2072. Students Skills With Modern Industries
MODERN TECHNOLOGY
2073. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
2074. Customer Favarate Greeting Card Design
2075. GPS Transport Packers and Movers
2076. House Hold Appliancies Warranty Management
2077. Direct Q Less Reservation System in train
2078. Power Consumption Monitoring House Hold Electronic Device
2079. Apartment Maintenance
2080. Budget Home Design
2081. Online Buy And Sale Software
2082. Online Softskills Tracks
2083. Gps Consumers Complients
2084. Economic Usage of Solar Energy
Advance Health Care System
2085. Organizing medical camp for public health development
2086. LIVE WEB DOCTOR CONSULTATION
2087. World Wide Cloud Inter Hospital Acess Health Care System
2088. MAC Sensing Protocol
2089. Medical Record Authentication
2090. Raw Requried Online Medicine
2091. Consumer Legal Advicer
2092. Homeopathy Health Record
SPORTS
2093. Play Ground Booking
2094. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
2095. Cloud Storage Public Digital Certificate
ERP PROJECTS
2096. Corporate Trouble Shooter
2097. Entrepreneur Fault Analysis
2098. Organise Corporate Training For Client Projects
2099. Employment Knowledge Database
2100. GPS Employee Tracking System
2101. Non It People Performance
2102. Performance System Analysis In Industry
2103. Consultanting About the Foreign Peoples
2104. Recommend To Friend
2105. New Company Policy Clearance System
2106. ERP System (Enterprint Resource Plan
2107. Software Requirements Analysis for Client Side
2108. Select Your Age(Business Motivation all age group)
2109. Engnering Lab Maintenance
2110. Corporate Event Organisation
LATEST BANKING
2111. EyeBank Management System
2112. Advanced Banking System
OUR MODERN SOCIETY
2113. Trained Volunteers Create A Successful Social Campaign
2114. Finger thump Based Shopping Cart
2115. Railway Management Service
2116. Create a Successful Anti- Nuclear Campaign
2117. Crowding Funding Mobilization
2118. People Power of India
2119. Pets Care
2120. Feature in Best Potitical Leader in India
2121. Yell Help For Children
2122. Automation Transport Maintance
2123. It Park Media
2124. Online Painting Auction
2125. Election Commission Management
2126. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
2127. ANDROID APPS FOR INSURANCE SYSTEM
2128. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
2129. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
2130. ANDROID APPS FOR DOCTOR APPOINTMENT
2131. LIVE WEB DOCTOR CONSULTATION
2132. ANDROID APPS ON DOCTOR WITH NURSE
2133. HOSPITAL ANDROID APPS
2134. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
2135. Fertilizer Management System -Java, JSP, MySQL
2136. Land Bank for Nursery -Java, JSP, MySQL
2137. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
2138. FORMER APPS - ANDROID
2139. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
2140. Online Banking with Fraud Detecting- Java JSP, MySQL
2141. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
2142. MICRO CREDIT BANKING ON SMARTPHONE


RESTful Web services
REST API
2143. Big Scholarly Data: A Survey
2144. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Whatsapp : 09566137117
Support : 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved
o