Call us : 09566137117
Mail ID: chennaisunday@gmail.com
Skype ID : chennaisunday
  Home Full Project List Contact us          
   
HOT IT SOFT SKILLS BIGDATA- MONGO DB 2017-2018 BIGDATA mongoDB BIG DATA - HADOOP PROJECTS
JAVA SPRING AND HIBERNATE ANDROID IEEE 2017 -18 ANDROID IEEE 2016 -17 CLOUD IMPLEMENTATION- ANDROID
ANDOROID JSON PHP ANDROID APPS IEEE PHP Projects 2017-18 IEEE PHP Projects
PHP Application Projects Dot Net IEEE 2017-18 RAZOR MVC 4 ASP.NET 2017-18 ANGULAR JS ,
Dot Net IEEE 2016-17 RAZOR MVC 4 ASP.NET ASP.NET MVC Framework Latest IEEE 2015-2016 Dotnet Projects
IEEE 2014-2015 Dotnet Projects IEEE 2013-2014 Dotnet Projects IEEE 2012-2013 Dotnet Projects IEEE 2011-2012 Dotnet Projects
Dotnet Application Projects JAVA IEEE 2017-18 JAVA IEEE 2016-17 Latest IEEE 2015-2016 Java Projects
IEEE 2014-2015 Java Projects IEEE 2013-2014 Java Projects IEEE 2012-2013 Java Projects IEEE 2011-2012 Java Project
Java Application Projects Dotnet Mini Projects Struts Application Projects Java Mini Projects
SOFT IDEA FOR DIGITAL SOCIETY INSURANCE DOMAIN PROEJCTS HEALTHCARE DOMAIN PROJECTS AGRICULTURE DOMAIN PROJECTS
BANKING PROJECTS Internet of things (IoT) RESTful Web services
 
HOT IT SOFT SKILLS
MEAN: MongoDB, Ember, AngularJS and nodeJS
1. Big Scholarly Data: A Survey
2. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
3. Big Data, Big Knowledge Big Data for Personalized Healthcare
4. Deduplication on Encrypted Big Data in Cloud
5. Secure Sensitive Data Sharing on a Big Data Platform
6. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
7. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
8. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
9. Self-Healing in Mobile Networks with Big Data
10. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
11. Dynamic Resource Allocation for MapReduce with Partitioning Skew
ANDROID IOS JSON CLOUD
12. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
13. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
14. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
15. Developing Apps for visually imapired people: Lessons learned from social network
16. WORAL: A Witness Oriented Secure LocationProvenance Framework for Mobile Devices
17. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
18. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
19. Design of secure location and message sharing system for android platform
20. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
21. Mobile Cloud Support for Semantic-enriched Speech Recognition in Social Care
22. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
23. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
jQuery - ANGULAR JS - RAZAR MVC DOT NET
24. Privacy Protection based Access Control Scheme in Cloud-based Services
25. Privacy-Preserving Selective Aggregation of Online User Behavior Data
26. User Preference Learning for Online Social Recommendation
ASP.NET Razor MVC
27. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation


BIGDATA- MONGO DB 2017-2018
NOSQL-mongoDB on BIG DATA
28. Practical Privacy-Preserving MapReduce Based K-means Clustering over Large-scale Dataset
29. Question Quality Analysis and Prediction in Community Question Answering Services with Coupled Mutual Reinforcement
30. Efficient Recommendation of De-identification Policies using MapReduce
31. Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach
32. Big Scholarly Data: A Survey
33. SocialQ&A: An Online Social Network Based Question and Answer System
34. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
35. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
36. Large-Scale Multi-Modality Attribute Reduction with Multi-Kernel Fuzzy Rough Sets
37. Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
38. Hierarchy-Cutting Model based Association Semantic for Analyzing Domain Topic on the Web
39. User-Centric Similarity Search
40. Efficient Processing of Skyline Queries Using MapReduce


BIGDATA mongoDB
NOSQL-mongoDB on BIG DATA
41. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications
42. A MapReduce-based k-Nearest Neighbor Approach for Big Data Classification
43. Enhanced Secure Thresholded Data Deduplication Scheme for Cloud Storage
44. GroRec:AGroup-centric Intelligen Recommender System Integrating Social, Mobile and Big Data Technologies
45. Processing Incomplete k Nearest Neighbor Search
46. Application of Big Data In Education Data Mining And Lerning Analytics A Literature Reviev
47. A BigData Approach for Classification and Prediction of Student Result Using MapReduce
48. K Nearest Neighbour Joins for Big Data on MapReduce: a Theoretical and Experimental Analysis
49. A Crowdsourcing Worker Quality Evaluation Algorithm on Map Reduce for Big Data Applications
50. A Framework for Categorizing and Applying Privacy-Preservation Techniques in Big Data Mining
51. Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage
52. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds
53. Deduplication on Encrypted Big Data in Cloud
54. Dynamic Resource Allocation for MapReduce with Partitioning Skew
55. Feedback Autonomic Provisioning for Guaranteeing Performance in MapReduce Systems
56. A Big Data Clustering Algorithm for Mitigating the Risk of Customer Churn
57. FiDoop: Parallel Mining of Frequent Itemsets Using MapReduce
58. Self-Healing in Mobile Networks with Big Data
59. Secure Sensitive Data Sharing on a Big Data Platform
60. Big Data, Big Knowledge: Big Data for Personalized Healthcare
61. k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data
62. Toward Optimal Resource Provisioning for Cloud MapReduce and Hybrid Cloud Applications
63. Secure Big Data Storage and Sharing Scheme for Cloud Tenants
64. Differentially Private Frequent Itemset Mining via Transaction Splitting
65. SUBGRAPH MATCHING WITH SET SIMILARITY IN A LARGE GRAPH DATABASE
66. MULTIVIEW ALIGNMENT HASHING FOR EFFICIENT IMAGE SEARCH
67. Fast Best-Effort Pattern Matching in Large Attributed Graphs


BIG DATA - HADOOP PROJECTS
HADOOP PROJECTS WITH TRAINING
68. HADOOP WITH HEALTHCARE DATA ANALYSYS
69. HADOOP WEBLOG DATA ANALYSES
70. BANK DATA ANALYTIC WITH HADOOP
71. HADOOP TRAINING


JAVA SPRING AND HIBERNATE
SPRING AND HIBERNATE TRAINING
72. SPRING AND HIBERNATE


ANDROID IEEE 2017 -18
IEEE Internet of Things (IoT)
73. FogRoute: DTN-based Data Dissemination Model in Fog Computing
IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON CLOUD COMPUTING
74. Privacy-Preserving Location-Proximity for Mobile Apps
75. Cooperative Query Answer Authentication
76. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing
Transactions on Mobile Computing
77. ZapDroid: Managing Infrequently Used Applications on Smartphones
78. Searching Trajectories by Regions of Interest
79. Knowledge-Enhanced Mobile Video Broadcasting (KMV-Cast) Framework with Cloud Support
80. A Classroom Scheduling Service for Smart Classes
81. Efficient and Privacy-preserving Min and k-th Min Computations in Mobile Sensing Systems
82. ShakeIn: Secure User Authentication of Smartphones with Habitual Single-handed Shakes
83. Performance Analysis of Mobile Data Offloading in Heterogeneous Networks
84. Buy your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal


ANDROID IEEE 2016 -17
Internet-of-Things Technologies
85. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
86. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
Secure Computing
87. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
88. PassBYOP: Bring Your Own Picture for Securing Graphical Passwords
89. Authentication of Smartphone Users Using Behavioral Biometrics
90. An Exploration of Geographic Authentication Schemes
91. A Shoulder Surfing Resistant Graphical Authentication System
TRANSACTIONS ON NETWORKING
92. STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users
Transactions on Mobile Computing
93. Safeguard: User Reauthentication on Smartphones via Behavioral Biometrics
94. Distributed secret sharing approach with cheater prevention
95. Scheduling Crowdsensing Data to Smart City Applications in the Cloud
96. Efficient privacy preserving location based query over outsourced encrypted data
97. Utilizing the Cloud to Store Hijacked Camera Images
98. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications
99. SecureRun: Cheat-Proof and PrivateSummaries for Location-Based Activities
100. Context Awareness Location-based Android Application for Tracking Purposes in Assisted Living
101. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users
102. Enabling privacy preserving location proof for mobile users.
103. Optimizing User Experience in Choosing Android Applications
104. (Ask-a-Doctor) Mobile cloud support for sementic enriched speech recognition in social care
105. Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication
106. FoodForCare: An Android Application for Self-Care with Healthy Food
107. The sleepy bird catches more worms: revisiting energy efficient neighbor discovery
108. Silence is Golden: Enhancing Privacy of Location-Based Services
109. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices
110. KISS: Knowing Camera Prototype System for Recognizing and Annotating Places-of-Interest
111. ShakeUnlock: Securely Transfer Authentication States Between Mobile Devices
112. Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret Questions
113. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
Transactions on Services Computing
114. SemanticSLAM: Using Environment Landmarks for Unsupervised Indoor Localization
115. Adapting to User Interest Drift for POI Recommendation
116. A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing
117. Developing Apps for visually imapired people: Lessons learned from social network
118. MobiGoal: Flexible Achievement of Personal Goals for Mobile Users
119. Service Rating Prediction by Exploring Social Mobile Users Geographical Locations
120. Read2Me: A Cloud- based Reading Aid for the Visually Impaired
121. Designing a Secure Exam Management System (SEMS) for M-Learning Environments
122. Privacy-Preserving Location Sharing Services for Social Networks
Speech Recognition
123. Personalized Travel Sequence Recommendation on Multi-Source Big Social Media
124. Intelligent Hands Free Speech based SMS System on Android


CLOUD IMPLEMENTATION- ANDROID
IEEE REAL CLOUD IMPLEMENTATION
125. One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications
126. Mobile cloud support for semantic enriched speech recognition in social care
127. Distributing secret sharing approach with cheater prevention based on QR code
128. Design of Secure Location and Message Sharing System for Android Platform
129. The impact of cloud technology on the automation of businesses
130. Design and Analysis of an Efficient Friend-to-Friend Content Dissemination System
131. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices


ANDOROID JSON PHP
ANDROID- JSON - PHP
132. Rescue Management System
133. Android Army - Military Apps
134. Android Beauty Parlor
135. Android E Municipality
136. ANDROID NURSE AID
137. Android Customer Care ANDROID, PHP JSON, MySQL


ANDROID APPS
ERP PROEJCT
138. GPS Employee Tracking System
OUR MODERN SOCITY
139. ANDROID APPS FOR INSURANCE SYSTEM
140. BUDGET HOME DESIGN -ANDROID APPS
141. Former To Former Apps
142. Pets Care
ONLINE CONSUMERS PROCESSING
143. House Hold Appliancies Warranty Management
144. GPS Transport Packers and Movers
Android Apps
145. MY LIBRARY
146. FACULTY RATING SYSTEM
147. App for self organizer
148. ONLINE DOCTOR APPOINTMENT
149. Conference Event Mobile Assistant
150. Mobile Prescription
151. Metastore Application
152. Android SmartCampus
153. Android Shopping Mall
154. TOLL GATE -Barcode Billing System --ANDROID
155. Shedular Apps for VOICE, TEXT, GPS Possition - Visually challenged people
156. Taste Hunt For Restaurants
157. POLICE APPS
158. Android Blood Bank
159. Mobile Expense Claim System Android
160. Android Intelligent Time Tracking System TICK
161. Android Course and Attendance Management System
162. Android Event Reminder
163. Android Attendance Assessment
164. Android Advance Shopping
165. Android CAR POOLING
166. "All in ONE" Apps for Water Agent, Cable Operator, News Paper , Milk Man,
167. Android HOSPITAL
168. ATHLETE MEET GUIDE
169. Android Apps PARKING MANAGER
170. Love and Care
171. Food Waste Management System
172. Travel Guide
173. Android Provisional Store
174. Best Baby Care with Vaccines Remainder
175. Android Assist for Lecturer and Student
176. Android Personal Assistance (PA)
177. Android Application for College Management System
178. Tollgate Payment system in android
179. Intelligence Quotient (IQ) Test
180. GPS LOCATION ALARM SYSTEM
181. Location Based Intelligent Mobile Organizer
182. BANK ACCOUNT TRACKER FOR ANDROID
183. UNIT CONVERTER
184. Tips and Tax Calculator in Android
185. TEXT EDITOR FOR ANDROID
186. Student Attendance Tracking System
187. Smart Money With Daily Expenses
188. Simple And Secure Android TO DO List Application
189. Restaurant Table Order Management System
190. Online Shopping
191. Online Examination System For Android
192. ANDROID SHOPPING LOCATION IDENTIFIER
193. MULTY USER MOBILE BLUETOOTH TWO WAY TEXT CHAT
194. MOBILE TRAVEL GUIDE SMART WAY TO TRAVEL
195. MICRO CREDIT BANKING ON SMARTPHONE
196. LOCATION BASED ALARM
197. Insurance in android
198. GOOGLE PLACE FINDER
199. Friend Mapper on Mobiles - Friend Locator
200. EXPENSE MANAGER
201. Employee Diractory
202. Online job search
203. CRICKET AND FOOTBALL LIVE DATA STREAMING IN NOTIFICATION SERVICE
204. ANDROID STUDENT RESULT ANALYZING SYSTEM
205. CloudMoV : Cloud-based Mobile Social TV
206. Bus Reservation
207. Budget Planner
208. Android SMS Systems
209. ANDROID LEAVE MANAGEMENT SYSTEM
210. ANDROID EVENT SCHEDULER/REMINDER
211. Android Grocery Shopping List
212. Android Attack Application
213. ADVANCED GPS LOCATION FINDER TO IDENTIFY HOSPITAL LOCATION AND ATM LOCATION
214. A Mobile Phone Based Medicine In-take Reminder and Monitor


IEEE PHP Projects 2017-18
Transactions on Knowledge and Data Engineering
215. Bring Order into the Samples: A Novel Scalable Method for Influence Maximization
PHP Projects
216. Filtering out Infrequent Behavior from Business Process Event Logs


IEEE PHP Projects
PHP Projects
217. Optimizing Display Advertising Markets
218. Using Knowledge Libraries to Transfer Expert Knowledge
219. Semantic Retrieval of Trademarks Based on Conceptual Similarity
220. Understanding and Predicting Question Subjectivity in Social Question and Answering
221. Linking Heterogeneous Data in the Semantic Web Using Scalable and Domain-Independent Candidate Selection
222. Secure Multi-Attribute One-to-Many Bilateral Negotiation Framework for E-Commerce
223. Fast Top-K Path-based Relevance Query on Massive Graphs
224. Web Image Search Re-ranking with Click-based Similarity and Typicality
225. Automatically Mining Facets for Queries from Their Search Results
226. Privacy-Preserving and Regular Language Search over Encrypted Cloud Data
227. Statistical Entity Extraction from Web
228. Question Answering System for an Effective Collaborative Learning
229. Lost in Translation: Improving Decoy Documents via Automated Translation
230. Learn to Personalized Image Search from the Photo Sharing Websites
231. In Tags We Trust Trust modeling in social tagging of multimedia content
232. Efficient Anonymous Message Submission
233. Cryptonite: A Secure and Performant Data Repository on Public Clouds


PHP Application Projects
ERP PROJECTS
234. Employment Knowledge Database
235. Organise Corporate Training For Client Project s
236. Entrepreneur Fault Analysis
ONLINE CONSUMERS PROCESSING
237. ONLINE VEHICLE SHOWROOM SYSTEMS
238. Online Voting
239. Customer Favarate Greeting Card Design
MORDERN EDUCATION SYSTEM
240. School Management System
241. Secure Online Course Automation
242. School Automation System
243. Online Aquarum
244. Web Direct Recruitment Analysis
PHP Apps
245. INSTANT PERSONALIZED TELEVISION NEWS REPORTS
246. TRADE / INDUSTRY WEB PORTAL
247. Feeding the poor from the supermarket
248. Application for recording your goals and habits
249. VISUAL WAY TO RAISE AWARENESS
250. Municipal Corporation
251. Online Polling For Publishers And Brands
252. Avoid Food Wastage
253. Web Doctor
254. ONLINE FOOD ORDERING SYSTEM
255. E-Tendering
256. Improving Rural Communities
257. Green Planet Awarness
258. Development of an Online Course Portal for a campus
259. Auxon Test
260. WEB BASED LEARNING SYSTEM
261. Tagging in online social networks
262. Secured file Downloading system
263. Cryptonite : A Secure and Performant Data Repository on Public Clouds
264. searching a image from websites
265. Online University
266. Online product Opinion and Ranking System
267. MNC LEAVE MANAGEMENT SYSTEM
268. Home appliances online purchase
269. Freelancer Job
270. E-Tutor Online Jobs
271. Statistical Entity Extraction from Web
272. Effective Collaborative Learning
273. Development of an e-Post Office System
274. Question Answering System for an Effective Collaborative Learning


Dot Net IEEE 2017-18
IEEE/ACM TRANSACTIONS ON NETWORKING
Services Computing
IEEE Transactions on Security Computing
275. FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data
276. Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
277. Privacy Protection based Access Control Scheme in Cloud-based Services
278. Practical Privacy-Preserving Content-Based Retrieval in Cloud Image Repositories
IEEE Transactions on Computers
IEEE Transactions on Information Forensics and Security
279. Two-Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving
280. Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending
IEEE TRANSACTIONS ON SERVICE COMPUTING
281. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud
282. Transactional Behavior Verification in Business Process as a Service Configuration
IEEE Transactions on Knowledge and Data Engineering
283. Temporal task scheduling with constrained service delay for profit maximization in hybrid clouds
284. Explaining Missing Answers to Top-k SQL Queries
285. Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
286. Continuous Top-k Monitoring on Document Streams
287. Generating Query Facets using Knowledge Bases
288. Query Reorganization Algorithms for Efficient Boolean Information Filtering


RAZOR MVC 4 ASP.NET 2017-18
IEEE Transactions on Computers
289. Privacy-Preserving Selective Aggregation of Online User Behavior Data
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
290. Privacy Protection based Access Control Scheme in Cloud-based Services
291. Dynamic Facet Ordering for Faceted Product Search Engines
292. Continuous Top-k Monitoring on Document Streams


ANGULAR JS ,
ANGULAR JS
293. Two Birds with One Stone: Two-Factor Authentication With Security Beyond Conventional Bound
294. Query Reorganisation Algorithms for Efficient Boolean Information Filtering
295. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
296. Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data
297. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
298. Generating Query Facets using Knowledge Bases
299. Private Over-threshold Aggregation Protocols over Distributed Datasets
300. Private Over-threshold Aggregation Protocols over Distributed Datasets


Dot Net IEEE 2016-17
IEEE Transactions on Computers
301. CDStore: Toward Reliable, Secure, and Cost- Efficient Cloud Storage via Convergent Dispersal
302. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing
303. TagBook: A Semantic Video Representation without Supervision for Event Detection
304. Beating the Artificial Chaos Fighting OSN Spam Using Its Own Templates
305. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
306. Conditional Identity-based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
IEEE Transactions on Cloud Computing
307. The Impact of Review Environment on Review Credibility
308. Private Over-threshold Aggregation Protocols over Distributed Datasets
309. Shadow Attacks based on Password Reuses: A Quantitative Empirical Analysis
310. Attribute-based Access Control with Constant-size Ciphertext in Cloud Computing
311. Identity-Based Encryption with Cloud Revocation Authority and Its Applications
312. Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing
313. Prioritization of Overflow Tasks to Improve Performance of Mobile Cloud
314. Dynamic and Public Auditing with Fair Arbitration for Cloud Data
315. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates
316. Providing User Security Guarantees in Public Infrastructure Clouds
IEEE TRANSACTIONS ON MOBILE COMPUTING
317. Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach
318. Integrating Topic and Latent Factor for Scalable Personalized Review-based Rating Prediction
319. Cross-modal Correlation Learning by Adaptive Hierarchical Semantic Aggregation
320. Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter Metadata using MVC 4 razor
321. What Is Happening in The Video Annotate Video by Sentence
322. Two level QR code for private message sharing and document authentication.
323. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
324. Service Usage Classification with Encrypted Internet Traffic in Mobile Messaging Apps
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
325. Mining Health Examination Records A Graph-based Approach
326. A Credibility Analysis System for Assessing Information on Twitter
327. Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
328. An Efficient Privacy-Preserving Outsourced Calculation Toolkits with Multiple Keys
329. Text Mining the Contributors to Rail Accidents
IEEE Transactions on Security Computing
330. VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data
331. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
332. Dynamic Proofs of Retrievability for Coded Cloud Storage Systems
333. Predicting Personalized Image Emotion Perceptions in Social Networks
334. Probabilistic Flood Mapping Using Synthetic Aperture Radar Data
335. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
336. Explaining Missing Answers to Top-k SQL Queries
337. Bilevel Feature Extraction Based Text Mining
338. Efficient and Expressive Keyword Search Through Encrypted Key in Cloud
339. Privacy-Preserving Outsourced Media Search
340. Modeling and Verification of Online Shopping Business Processes
341. User Preference Learning for Online Social Recommendation
342. Steganalysis Features for Content-Adaptive JPEG Steganography
343. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
344. PiCode: a New Picture-Embedding 2D Barcode
345. Privacy-Preserving Outsourced Association Rule Mining on Vertically Partitioned Databases
346. Secure Reversible Image Data Hiding over Encrypted Domain via Key Modulation
347. MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection
348. Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud
349. Fine-grained Two-factor Access Control for Web-based Cloud Computing Services
Services Computing
350. Flexible and Fine-Grained Attribute-BasedData Storage in Cloud Computing
351. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
352. Cloud workflow scheduling with deadlines and time slot availability
353. Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
IEEE/ACM TRANSACTIONS ON NETWORKING
354. Path-Based Epidemic Spreading in Networks
355. Pandas: Robust Locality-Aware Scheduling With Stochastic Delay Optimality
356. On the Resiliency of Static Forwarding Tables
357. Network Capability in Localizing Node Failures via End-to-End Path Measurements
358. Every Packet Counts: Loss and Reordering Identification and Its Application in Delay Measurement
359. DX: Latency-Based Congestion Control for Datacenters


RAZOR MVC 4 ASP.NET
IEEE TRANSACTIONS ON EDUCATION
360. Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
361. Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns
362. A Forecasting Methodology for Workload Forecasting in Cloud Systems
363. Optimal Shipping Strategy and Return Service Charge Under No-Reason
364. PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud
365. A Recommendation System to Facilitate Business Process Modeling
366. Personalizing Sample Databases With Facebook Information to Increase Intrinsic Motivation
IEEE/ACM TRANSACTIONS ON NETWORKING
367. Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
368. User Differentiated Verifiable File Search on the Cloud
369. Beating the Artificial Chaos: Fighting OSN Spam Using Its Own Templates
IEEE Transactions on Dependable and Secure Computing
370. Statistical Features Based Real-time Detection of Drifted Twitter Spam
371. Incremental Consolidation of Data-Intensive Multi-flows
372. Service Pattern: An Integrated Business Process Model for Modern Service Industry
373. Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation
374. Measuring the Influence of Perceived Cybercrime Risk on Online Service Avoidance
IEEE MULTIMEDIA AND IMAGE PROCESSONG
375. Filtering of Brand-related Microblogs using Social-Smooth Multiview Embedding
376. Fast Range Query Processing with Strong Privacy Protection for Cloud Computing
377. Democratic Diffusion Aggregation for Image Retrieval


ASP.NET MVC Framework
ASP.NET MVC Framework Project
378. Towards Effective Bug Triage with Software Data Reduction Techniques
379. Using Ant Colony System to Consolidate VMs for Green Cloud Computing
380. A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption
381. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption
382. Real-time Semantic Search using Approximate Methodology for Large-scale Storage Systems
383. Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
384. Proof of retrievability with public verifiability resilient against related-key attacks
385. Secure Anonymous Key Distribution Scheme for Smart Grid
386. Converses For Secret Key Agreement and Secure Computing
387. An efficient algorithm for the bursting of Service-based applications in hybrid Clouds


Latest IEEE 2015-2016 Dotnet Projects
Secure Computing
388. Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications
389. A Trust-based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks
390. Security Analysis on One-to-Many Order Preserving Encryption Based Cloud data Search
391. Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation
392. Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage
393. An Efficient Lattice Based Multi-stage Secret Sharing Scheme
394. Hacking is not random: a case-control study of webser ver-compromise risk
395. VoteTrust: Leveraging Friend Invitation Graph to Defend against Social Network Sybils
396. Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
397. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
398. Knowledge Sharing in the Online Social Network of Yahoo! Answers and Its Implications
399. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
400. Generating Searchable Public-Key Ciphertexts with Hidden Structures for Fast Keyword Search
401. Automatic Face Naming by Learning Discriminative Affinity Matrices from Weakly Labeled Images
402. Revealing the Trace of High-Quality JPEG Compression Through Quantization Noise Analysis
SERVICES COMPUTING
403. Resource Accounting of Shared IT Resources in Multi-Tenant Clouds
404. Trustworthy Parking Communities: Helping Your Neighbor to Find a Space
405. Diversifying Web Service Recommendation Results via Exploring Service Usage History
406. A Highly Accurate Prediction Algorithm for Unknown Web Service QoS Values
407. Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
408. Congestion Aware Load Balancing for Multiradio Wireless Mesh Network
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
409. A Regularization Approach to Blind Deblurring and Denoising of QR Barcodes
410. Interactive Streaming of Sequences of High Resolution JPEG2000 Images
411. Cross-Domain Feature Learning in Multimedia
412. A Regularization Approach to Blind Deblurringand Denoising of QR Barcodes
413. Vector Sparse Representation of Color Image Using Quaternion Matrix Analysis
414. Saliency-based color accessibility
415. Contextual Online Learning for Multimedia Content Aggregation
416. A Probabilistic Approach for Color Correction in Image Mosaicking Applications
417. A Methodology for Visually Lossless JPEG2000 Compression of Monochrome Stereo Images
418. An Attribute-assisted Reranking Model for Web Image Search
419. RRW - A Robust and Reversible Watermarking
420. Steganography Using Reversible Texture Synthesis
421. Single Image Super-Resolution Based on Gradient Profile Sharpness
422. Detection and Rectification of Distorted Fingerprints
423. Learning Fingerprint Reconstruction: From Minutiae to Image
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
424. Optimal Data Center Scheduling for Quality of Service Management in Sensor-cloud
425. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
426. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
427. Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
428. EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service
429. Performing Initiative Data Prefetching in Distributed File Systems for Cloud Computing
430. Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
431. Energy-aware Load Balancing and Application Scaling for the Cloud Ecosystem
432. Combining Efficiency, Fidelity, and Flexibility in Resource Information Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
433. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
434. A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
435. Authenticated Key Exchange Protocols for Parallel Network File Systems
436. Data Collection in Multi-Application Sharing Wireless Sensor Networks
437. Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
438. A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
439. Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybrid Clouds
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
440. Friendbook: A Semantic-based Friend Recommendation System for Social Networks
441. Optimum Power Allocation in Sensor Networks for Active Radar Applications
442. A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
443. Context-based Diversification for Keyword Queries over XML Data
444. Extending Association Rule Summarization Techniquesto Assess Risk of Diabetes Mellitus
445. Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
446. Reverse Keyword Search for Spatio-Textual Top-k Queries in Location-Based Services
447. Tweet Segmentation and Its Application to Named Entity Recognition
448. EMR: A Scalable Graph-based Ranking Model for Content-based Image Retrieval
449. Automatic Group Happiness Intensity Analysis
450. RRW - A Robust and Reversible Watermarking Technique for Relational Data
451. Query Aware Determinization of Uncertain Objects
452. PAGE: A Partition Aware Engine for Parallel Graph Computation


IEEE 2014-2015 Dotnet Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
453. Keylogging-resistant Visual Authentication Protocols
SOFTWARE ENGINEERING
454. Governing Software Process Improvements in Globally Distributed Product Development
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
455. Cotton Leaf Disease Identification using Pattern Recognition Techniques
456. Efficient Community Formation for Web Services
457. BestPeer++ A Peer-to-Peer based Large-scale Data Processing Platform
458. Secure Mining of Association Rules in Hor izontally Distributed Databases
459. Dynamic Query Forms for Database Queries
460. Secure kNN Query Processing in Untrusted Cloud Environments
461. An Empirical Performance Evaluation of Relational Keyword Search Systems
462. Keyword Query Routing
463. Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
464. Demand Bidding Program and Its Application in Hotel Energy Management
465. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
466. Incremental Detection of Inconsistencies in Distributed Data
467. A Cocktail Approach for Travel Package Recommendation
468. The Role of Hubness in Clustering High-Dimensional Data
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
469. A Random Decision Tree Framework for Privacy-Preserving Data Mining
470. Analysis of Field Data on Web Security Vulnerabilities
471. The Client Assignment Problem for Continuous Distributed Interactive Applications Analysis, Algorithms, and Evaluation
472. A Reliability Improvement Method for SOA-Based Applications
473. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
474. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
475. Web Service Recommendation via Exploiting Location and QoS Information
476. Traffic Pattern Based Content Leakage Detection for Trusted Content Delivery Networks
477. Exploiting Rateless Codes in Cloud Storage Systems
478. COMIC:Cost Optimization for Internet Content Multihoming
479. Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
480. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
481. An Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes
482. Uniform Embedding for Efficient JPEG Steganography
483. Secure Deduplication with Efficient and Reliable Convergent Key Management
484. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
485. Link Quality Aware Code Dissemination in Wireless Sensor Networks
486. Exploiting Service Similarity for Privacy in Location Based Search Queries
CLOUD COMPUTING
487. Location Aware Keyword Query Suggestion Based on Document Proximity
488. Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
489. A secure data self-destructing scheme in cloud computing
490. A Dynamic Secure Group Sharing Framework in Public Cloud Computing
491. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
492. An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
493. Secure kNN Query Processing in Untrusted Cloud Environments
494. Exploiting Rateless Codes in Cloud Storage Systems
495. Fuzzy Authorization for Cloud Storage
496. Planning vs. dynamic control Resource allocation in corporate clouds
497. Automatic Scaling of Internet Applications for Cloud Computing Services
498. Strategy-proof Pricing for Cloud Service Composition
499. Privacy Preserving Delegated Access Control in Public Clouds
500. A Social Compute Cloud: Allocating and Sharing Infrastructure Resources via Social Networks
501. Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor
502. Compatibility-Aware Cloud Service Composition under Fuzzy Preferences o f Users
503. Achieving Effective Cloud Search Services: Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Synonym Query
504. A Mechanism Design Approach to Resource Procurement in Cloud Computing
505. Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud
506. Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage
507. A Scientometric Analysis of Cloud Computing Literature
508. Consistency as a Service Auditing Cloud Consistency
IMAGE PROCESSING - MULTIMEDIA
509. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting
510. Visibility Restoration of Single Hazy Images Captured in Real-World Weather Conditions
511. Image Search Re-ranking with Query-dependent Click-based Relevance Feedback
512. FeatureMatch: A General ANNF Estimation Technique and its Applications
513. Robust Semi-Automatic Depth Map Generation in Unconstrained Images and Video Sequences for 2D to Stereoscopic 3D Conversion
514. Multisensor Fusion-Based Concurrent Environment Mapping and Moving Object Detection for Intelligent Service Robotics
515. As-Projective-As-Possible Image Stitching with Moving DLT
516. Sharing Visual Secrets in Single Image Random Dot Stereograms
517. Photometric Stereo Using Sparse Bayesian Regression for General Diffuse Surfaces
518. Image Classification Using Multiscale Information Fusion Based on Saliency Driven Nonlinear Diffusion Filtering
519. A New Iterative Triclass Thresholding Technique in Image Segmentation
520. How to Estimate the Regularization Parameter for Spectral Regression Discriminant Analysis and its Kernel Version?
521. Localization of License Plate Number Using Dynamic Image Processing Techniques And Genetic Algorithms
522. An Iranian License Plate Recognition System Based on Color Features
523. Learning Layouts for Single-Page Graphic Designs
524. Weighted KPCA Degree of Homogeneity Amended Nonclassical Receptive Field Inhibition Model for Salient Contour Extraction in Low-Light-Level Image
525. Single-Image Superresolution of Natural Stochastic Textures Based on Fractional Brownian Motion
526. Model-Based Edge Detector for Spectral Imagery Using Sparse Spatiospectral Masks
527. Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform
528. Fingerprint Compression Based on Sparse Representation
529. Modeling of Speaking Rate Influences on Mandarin Speech Prosody and Its Application
530. LBP-Based Edge-Texture Features for Object Recoginition
531. A Compressive Sensing based Secure Watermark Detection and Privacy Preserving Storage Framework
532. Toward Experiential Mobile Media Processing
533. Quality Assessment of Stereoscopic 3D Image Compression by Binocular Integration Behaviors
534. Corruptive Artifacts Suppression for Example-Based Color Transfer
NETWORKING
535. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
536. On the Payoff Mechanisms in Peer-Assisted Services With Multiple Content Providers Rationality and Fairness
537. Designing Truthful Spectrum Double Auctions with Local Markets
538. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
539. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
540. Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks
541. Distributed Mobile Sink Routing for Wireless Sensor Networks: A Survey
542. D2P: Distributed Dynamic Pricing Policy in Smart Grid for PHEVs Management
543. Cooperation Versus Multiplexing: Multicast Scheduling Algorithms for OFDMA Relay Networks
INTERNATIONAL CONFERENCE
544. A Study on Clinical Prediction Using Data Mining Techniques
545. Online Payment System using Steganography and Visual Cryptography
546. Efficient Instant-Fuzzy Search with Proximity Ranking
547. Attribute Based Encryption with Privacy Preserving In Clouds
548. A Secure Client Side Deduplication Scheme in Cloud Storage Environments


IEEE 2013-2014 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
549. Visual Object Tracking Based on Local Steering Kernels and Color Histograms
550. Selecting a Reference High Resolution for Fingerprint Recognition Using Minutiae and Pores
551. Perceptual Video Coding Based on SSIM-Inspired Divisive Normalization
552. Local Directional Number Pattern for Face Analysis: Face and Expression Recognition
553. LLSURE: Local Linear SURE-Based Edge-Preserving Image Filtering
NETWORKING
554. Transfer Reliability and Congestion Control Strategies in Opportunistic Networks: A Survey
555. The Target Tracking in Mobile Sensor Networks
556. Strong Secrecy and Reliable Byzantine Detection in the Presence of an Untrusted Relay
557. Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks
558. Performance Analysis of OSPF and EIGRP Routing Protocols for Greener Internetworking
559. Exploiting Cooperative Relay for High Performance Communications in MIMO Ad Hoc Networks
560. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
561. A Highly Scalable Key Pre-distribution Scheme for Wireless Sensor Networks
SOFTWARE ENGINEERING
562. Analyzing the Friendliness of Exchanges in an Online Software Developer Community
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
563. Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development
564. SUSIE: Search Using Services and Information Extraction
565. SeDas: A Self-Destructing Data System Based on Active Storage Framework
566. Secure Mining of Association Rules in Horizontally Distributed Databases
567. Sampling Online Social Networks
568. Privacy Preserving Delegated Access Control in Public Clouds
569. Mining Order-Preserving Submatrices from Data with Repeated Measurements
570. Gmatch: Secure and Privacy-Preserving Group Matching in Social Networks
571. Ginix : Generalized Inverted Index for Keyword Search
572. Exploring the Impact of Information System Introduction: The Case of an Australian Hospital Emergency Department
573. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint:2008)
574. ELCA : Evaluation for Keyword Search on Probabilistic XML Data
575. Dynamic Query Forms for Database Queries
576. Cost-Based Optimization of Service Compositions
577. Constructing E-Tourism Platform Based on Service Value Broker: A Knowledge Management Perspective
578. Constructing a Global Social Service Network for Better Quality of Web Service Discovery
579. Automatic Extraction of Top-k Lists from the Web
580. Anonymization of Centralized and Distributed Social Networks by Sequential Clustering
581. Achieving Data Privacy through Secrecy Views and Null-Based Virtual Updates
582. A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data
583. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
PARALLEL AND DISTRIBUTED SYSTEMS
584. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
585. Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
586. Privacy Preserving Back-Propagation Neural Network Learning Over Arbitrarily Partitioned Data
587. Mobi-Sync: Efficient Time Synchronization for Mobile Underwater Sensor Networks
SECURE COMPUTING
588. Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption
589. Privacy Preserving Data Sharing With Anonymous ID Assignment
590. Non-Cooperative Location Privacy
591. Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing
592. An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol
CLOUD COMPUTING
593. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
594. Cloud based emails boundaries and vulnerabilities
595. Attribute-based Access to Scalable Media in Cloud-assisted Content Sharing Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
596. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
597. Optimal Multicast Capacity and Delay Tradeoffs in MANETs
598. Optimal Content Downloading in Vehicular Networks
599. On Quality of Monitoring for Multi-channel Wireless Infrastructure Networks
600. EMAP: Expedite Message Authentication Protocol for Vehicular Ad Hoc Networks


IEEE 2012-2013 Dotnet Projects
IMAGE PROCESSING - MULTIMEDIA
601. View-invariant action recognition based on Artificial Neural Networks
602. User-aware Image Tag Refinement via Ternary Semantic Analysis
603. Separable Reversible Data Hiding in Encrypted Image
604. Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval
605. Robust Watermarking of Compressed and Encrypted JPEG2000 Images
606. Robust Face-Name Graph Matching for Movie Character Identification
607. IntentSearch:Capturing User Intention for One-Click Internet Image Search
608. Improving Color Constancy by Photometric Edge Weighting
609. Exploring the design space of social network-based Sybil defenses
610. DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS
611. Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
612. AnnoSearch: Image Auto-Annotation by Search
613. Altered Fingerprints: Analysis and Detection
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
614. Scalable Scheduling of Updates in Streaming Data Warehouses
615. Scalable Learning of Collective Behavior
616. Ranking Model Adaptation for Domain-Specific Search
617. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
618. Outsourced Similarity Search on Metric Data Assets
619. Organizing User Search Histories
620. Optimization of Horizontal Aggregation in SQL by Using K-Means Clustering
621. Mining Web Graphs for Recommendations
622. Joint Top K Spatial Keyword Query Processing
623. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
624. Identifying Content for Planned Events Across Social Media Sites
625. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
626. Generative Models for Item Adoptions Using Social Correlation
627. Efficient Data Mining for XML Queries Answering Support
628. Efficient audit service outsourcing for data integrity in clouds
629. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
630. Effective Pattern Discovery for Text Mining
631. Combined Mining: Discovering Informative Knowledge in Complex Data
632. Decentralized Probabilistic Text Clustering
633. Computing Structural Statistics by Keywords in Databases
634. Bridging Social and Data Networks
635. Answering General Time-Sensitive Queries
636. A Survey of Indexing Techniques for Scalable Record Linkage and Deduplication
637. A Query Formulation Language for the Data Web
PARALLEL AND DISTRIBUTED SYSTEMS
638. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency
639. Dynamic Authentication for Cross-Realm SOA-Based Business Processes
640. Resource-Aware Application State Monitoring
641. Random4: An Application Specific Randomized Encryption Algorithm to prevent SQL injection
642. Query Access Assurance in Outsourced Databases
643. Linear and Differential Cryptanalysis
644. Expert Discovery and Interactions in Mixed Service-Oriented Systems
645. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data
646. In Cloud, Can Scientific Communities Benefit from the Economies of Scale
647. BloomCast: Efficient and Effective Full-Text Retrieval in Unstructured P2P Networks
648. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
649. Balancing the Tradeoffs between Query Delay and Data Availability in MANETs
650. A NOVEL ANTI PHISHING FRAMEWORK BASED ON VISUAL CRYPTOGRAPHY
SECURE COMPUTING
651. ROAuth: Recommendation Based Open Authorization
652. Review: Steganography Bit Plane Complexity Segmentation (BPCS) Technique
653. Recommendation Models for Open Authorization
654. A Probabilistic Model of (t,n) Visual Cryptography Scheme With Dynamic Group
655. Packet-Hiding Methods for Preventing Selective Jamming Attacks
656. On Privacy of Encrypted Speech Communications
657. OAuth Web Authorization Protocol
658. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
659. Novel Approach for Color Extended Visual Cryptography Using Error Diffusion
660. Joint Relay and Jammer Selection for Secure Two-Way Relay Networks
661. HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing
662. Fast Matrix Embedding by Matrix Extending
663. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
664. Automatic Reconfiguration for Large-Scale Reliable Storage Systems
665. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service
666. Access control for online social networks third party applications
SOFTWARE ENGINEERING
667. Measuring Code Quality to Improve Specification Mining
668. Comparing the Defect Reduction Benefits of Code Inspection and Test-Driven Development
CLOUD COMPUTING
669. Towards Secure and Dependable Storage Services in Cloud Computing
670. Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption
671. Remote Display Solutions for Mobile Cloud Computing
672. Privacy Preserving Delegated Access Control in Public Clouds
673. Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing
674. Automatic Protocol Blocker for Privacy-Preserving Public Auditing in Cloud Computing
NETWORKING
675. SPREAD: Improving network security by multipath routing in mobile ad hoc networks
676. Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms
677. Load-Balancing Multipath Switching System with Flow Slice
678. Assessing the Veracity of Identity Assertions via OSNs
679. A Security-Enhanced Key Authorization Management Scheme for Trusted computing Platform
680. A Reliable Multi-Grid Routing Protocol for Tactical MANETs
681. A New Cell-Counting-Based Attack Against Tor
682. A Keyless Approach to Image Encryption
MOBILE COMPUTING - WIRELESS COMMUNICATION
683. Topology Control in Mobile Ad Hoc Networks with Cooperative Communications
684. Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper
685. Network Assisted Mobile Computing with Optimal Uplink Query Processing
686. Local Broadcast Algorithms in Wireless Ad Hoc Networks: Reducing the Number of Transmissions
687. Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees
688. Fast Release Capture Sampling in Large-Scale Sensor Networks
689. Cooperative download in vehicular environments
690. Cooperative Data Dissemination via Roadside WLANs
691. AMPLE: An Adaptive Traffic Engineering System Based on Virtual Routing Topologies
INTERNATIONAL CONFERENCE
692. Securing Node Capture Attacks for Hierarchical Data Aggregation in Wireless Sensor Networks
693. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
694. Integrating Web Content Mining into Web Usage Mining for Finding Patterns and Predicting Users Behaviors
695. Hiding Sensitive Association Rule for Privacy Preservation
696. Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks
697. Development of Certificate Authority Services for Web Applications
698. Detecting and Validating Sybil Groups in theWild
699. Association Rule Extracting Knowledge Using Market Basket Analysis
700. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Dotnet Projects
NETWORKING
701. Valuable Detours: Least-Cost Anypath Routing
702. Self-Reconfigurable Wireless Mesh Networks
703. Reliability in Layered Networks with Random Link Failures
704. NABS:Novel Approaches for Biometric Systems
705. Live Streaming with Receiver-based Peer-division Multiplexing
706. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection
707. Continuous Neighbor Discovery in Asynchronous Sensor Networks
708. Congestion Detection for Video Traffic in Wireless Sensor Networks
IMAGE PROCESSING - MULTIMEDIA
709. Virtualized Screen: A Third Element for CloudMobile Convergence
710. Steganographic Embedding in JPEG Images with Visual Criterion
711. On the Typical Statistic Features for Image Blind Steganalysis
712. A Novel Video Steganography based on Non-uniform Rectangular Partition
PARALLEL AND DISTRIBUTED SYSTEMS
713. Throughput and Delay Analysis for Convergecast with MIMO in Wireless Networks
714. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
715. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
716. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
717. Computing Localized Power-Efficient Data Aggregation Trees for Sensor Networks
SERVICE COMPUTING
718. Vulnerability Analysis in SOA-Based Business Processes
719. Service-Oriented Architecture for High-Dimensional Private Data Mashup
720. Service-Centric Framework for a Digital Government Application
721. Server-Side Streaming Processing of WS-Security
722. OWLPath: An OWL Ontology-Guided Query Editor
723. Monitoring Service Systems from a Language-Action Perspective
724. Extracting Product Features and Sentiments from Chinese Customer Reviews
725. Expert Discovery and Interactions in Mixed Service-Oriented Systems
726. Automated Certification for Compliant Cloud-based Business Processes
727. Addressing Dependability throughout the SOA Life Cycle
728. A Loosely Coupled Integration Environment for Collaborative Applications
SECURE COMPUTING
729. The Geometric Efficient Matching Algorithm for Firewalls
730. Secure Service-Oriented Architecture for Mobile Transactions
731. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking
732. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables
733. Privacy-Preserving Updates to Anonymous and Confidential Databases
734. Online Intrusion Alert Aggregation with Generative Data Stream Modeling
735. IPAS: Implicit Password Authentication System
736. Improving Security and Performance in the Tor Network through Tunable Path Selection
737. Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error
738. Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
739. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
MOBILE COMPUTING - WIRELESS COMMUNICATION
740. Throughput Optimization in High Speed Downlink Packet Access (HSDPA
741. Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
742. Minimum Bandwidth Reservations for Periodic Streams in Wireless Real-Time Systems
743. Distributed Adaptation of Quantized Feedback for Downlink Network MIMO Systems
744. Data Delivery Properties of Human Contact Networks
745. Converge-Cast: On the Capacity and Delay Tradeoffs
746. A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
747. USHER: Improving Data Quality with Dynamic Forms
748. The World in a Nutshell: Concise Range Queries
749. Selecting Attributes for Sentiment Classification Using Feature Relation Networks
750. Scalable Scheduling of Updates in Streaming Data Warehouses
751. Scalable Learning of Collective Behavior
752. Query Planning for Continuous Aggregation Queries over a Network of Data Aggregators
753. Publishing Search Logs A Comparative Study of Privacy Guarantees
754. Optimal Stochastic Location Updates in Mobile Ad Hoc Networks
755. Optimal Service Pricing for a Cloud Cache
756. One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
757. Network Coding Based Privacy Preservation against Traffic Analysis in Multi-hop Wireless Networks
758. Mining Web Graphs for Recommendations
759. Knowledge-Based Interactive Postmining of Association Rules Using Ontologies
760. Integration of Sound Signature Authentication System
761. Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
762. Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining Analysis
763. Heuristics Based Query Processing for Large RDF Graphs Using Cloud Computing
764. Exploring Application-Level Semantics for Data Compression
765. Efficient and Accurate Discovery of Patterns in Sequence Data Sets
766. Data Leakage Detection
767. Cost-aware rank join with random and sorted access
768. Collaborative Filtering with Personalized Skylines
769. Bridging Socially-Enhanced Virtual Communities
770. Automatic Discovery of Personal Name Aliases from the Web
771. A Personalized Ontology Model for Web Information Gathering
772. Adaptive Provisioning of Human Expertise in Service-oriented Systems
773. A Query Formulation Language for the Data Web
774. A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
775. A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts
776. A Link Analysis Extension of Correspondence Analysis for Mining Relational Databases
777. A Dual Framework and Algorithms for Targeted Data Delivery
CLOUD COMPUTING
778. Towards Secure and Dependable Storage Services in Cloud Computing
779. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data
780. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds
781. Data Integrity Proofs in Cloud Storage
782. A Secured Cost-effective Multi-Cloud Storage in Cloud Computing
783. A Medical Image Archive Solution in the Cloud
INTERNATIONAL CONFERENCE
784. Feature-level Sentiment Analysis for Chinese Product Reviews
785. Equal-sized Cells Mean Equal-sized Packets in Tor?
786. Customer Relationship Management Based on Data Mining Technique
787. Authentication Schemes for Session Passwords using Color and Images
788. An Approach to Detect and Prevent SQL Injection Attacks in Database Using Web Service


Dotnet Application Projects
MODERN EDUCATION SYSTEM
789. Online Trends Management Service in It Industry
790. Session Management System in It Industry
791. Tools for Non IT Expert Developer
ERP PROJECTS
792. New Company Policy Clearance System
793. Recommend To Friend
794. Consultanting About the Foreign Peoples
795. Performance System Analysis In Industry
796. Non It People Performance
MODERN AGRICULTURE
797. Cotton Leaf Disease Identification using Pattern Recognition Techniques
798. Agriculture Marketing in Generation
799. Agriculture Assist
800. Sponsor For Agriculture
SPORTS
801. Play Ground Booking
OUR MODERN SOCITY
802. INVENTORY SYSTEM FOR ELECTRONICS FACTORY
803. RAILWAY SEAT RESERVATION SYSTEM
804. Railway Management Service
805. It Park Media
806. Automation Transport Maintance
807. Yell Help For Children
808. Feature in Best Potitical Leader in India
ONLINE CONSUMERS PROCESSING
809. Apartment Maintenance
810. Power Consumption Monitoring House Hold Electronic Device
811. Direct Q Less Reservation System in train
Advance Health Care System
812. MAC Sensing Protocol
813. World Wide Cloud Inter Hospital Acess Health Care System
814. Live Doctor
Dotnet Apps
815. TELEVISION CHANNEL PROGRAM MANAGEMENT
816. WIN THE TRUST OF AN INDIAN CONSUMER
817. ONLINE ACCOUNT MANAGEMENT
818. SMART CAB BOOKING SYSTEM
819. ONLINE FAST FOOD ORDER
820. Travel Mate Add Module
821. Work Order System Call Centre
822. SPORTS MANAGEMENT SYSTEM
823. Searchable Attribute-Based Mechanism with Efficient Data Sharing for Secure Cloud Storage
824. Pick-It Courier Service
825. Online Taxi Booking
826. Lifetime Enhancement Techniques for PCM-BASED IMAGE Buffer in Multimedia Applications
827. INCOMETAX MAINTAINANCE SYSTEM
828. Hotel Reservation
829. ERP System
830. Bug Tracking System
831. Vendor Information System For Shiping
832. Top-K ranking System
833. Secure Medical Image Archive System
834. Business Activity Coordination Using Web Services
835. Management Portal
836. EXPERT REVIEW ANALYSIS ON LATEST CAR ARRIVALS
837. Secure Data Filtering Recommendation System
838. Online Resources Sharing via Social Networks
839. Secure self-destructing in Cloud Computing
840. Web Resourecs File Authorization Management
841. Click based image re-ranking system
842. Tree Structure Data Analiysis Mining
843. Web Resource Allocation for CorPerate
844. Web Vulnerabilities and Security
845. Fuzzy Cloud Search Using XML
846. Cloud Data Supporting Secure Query Search
847. Tour Recommender Systems on Web
848. Distributed Interactive Web Applications
849. Secure Query Processing for Cloud
850. Online Data Storage with less pricing
851. Cost Based Web Content Managemnts
852. Web Hospital Management
853. Online Data storage with low price
854. Secure Online Data Block Authorization
855. Profitable Onlin web Server System
856. Online Economies File Manager for Multi Keying
857. Online Community Management
858. Key based Online Data Managements
859. Critical Workflow Management for Web Documents
860. Secure Online Documents Managements for Group Sharing
861. ONLINE PRODUCT MARKETING AUTOMATION ANALYSIS SYSTEM
862. Online Marketing Automation System
863. Internal organization change management System
864. Secure confirmation of sensitive transaction data in modern Internet banking services
865. Privacy security with TPA in cloud computing
866. Company Information Tracking System
867. Online Virtualized screen Processing
868. Web Service for Airline Management
869. Web Social Club
870. Quantum Key Cryptography
871. Patient Data Management Based On Hospital Location
872. Online Software Developer Community
873. Online Developed Software sales
874. Avoid repeated measurements On Genetics Dataset
875. College Lab Maintenance System
876. Industrial Manpower Resource Organizer
877. Web Query Construction and Search on Complex Data
878. Hospital Emergency Data Management
879. Data confidentiality On Health-care Information System
880. Secure Online Trading
881. Fast Real-Time Event Alert Using social Network
882. Secure E-Mail Organizer
883. Web User Service Management System
884. Easy SQL Query for Non-IT Manager
885. Hotels Ranking on Web Personal Evaluation Tool (Web PET)
886. Customer Relationship Management (CRM) on Banking
887. Online Company ERP System
888. Constructing E-Tourism
889. Web based Multi Service Ranking System
890. Dynamic Customer Data Hiding in Banking
891. Online Distributed Social Clubs
892. Virtual Shopping with Negative Feedback Reputation Systems
893. Zero-Knowledge Proof System on Outsourcing Cloud Data Integrity
894. Web Service Oriented Query Authentication Technique
895. Web Based Customer Favorite vehicle Search Engine
896. Web Based Book Publishing System
897. Virtual Energy- Based Encryption and Keying
898. Video Fraud Detecting On social Network
899. Video Compression with Data hiding & Data Extraction
900. Vendor Information System for Shipping
901. VALUE ADDED TAX (VAT)
902. Universal Smart Card
903. Ultimate Location Information Systems
904. Top K Ranking System
905. Techno Task Manager
906. Supply Chain Management
907. Substitution-Permutation cryptanalysis System
908. Streaming Data Warehouse Updations
909. Step by Step Monitoring for Product Purchasing System
910. Steganography for Data Reading and Writing AVI files
911. SQL TUNER
912. SMS Transaction Security
913. Session Authentication Passwords using Color
914. Service Availability Guarantees on Virtual Economy
915. Server Fraud Detection on Cloud
916. Sentence Based Search on Cloud
917. Semantic Web Search Engines
918. Secured Image communicator
919. Secure smart application on web application
920. Secure Service-Oriented Smartcard systems
921. Secure Pre-paid Recharging System using Quasigroups Cryptographic Algorithm (QCA).
922. Secure Location Identification System
923. Secure and Cloud Based Patient Information Systems
924. Reduce the Password Guessing Attacks using Click Point
925. Recommendation System Based on Graph
926. Quantum Key Cryptography
927. Quality Controller
928. Public Web Status Monitoring System
929. Project Trade Pool
930. Product Marketing Analysis On Public Opinion
931. Predicting Users Behaviors Using Web Mining
932. Personal Health Information on M-Healthcare Emergency
933. Optimum Online Knowledge Base
934. Online Training Program
935. Online Time sensitive queries
936. Online Tag Based Image Retrieval and Effective Management
937. Online Social networks controls using cloud
938. Online Rental System
939. Online product Opinion and Ranking System
940. Online Dynamic form creation for Non-IT Peoples
941. Online Digital Contract Signing in Mistrusted Parities
942. Online Aventure
943. Online Shopping
944. News Ticker Project
945. Net Bank in Recharge
946. Multi User Public Auditing System of Data Storage Security
947. Multi Location Networked Mobile Auto Intimates
948. Modern Distributed Business Applications for Supply Chain Management
949. Market Intelligence Based Public Sentiment Analysis
950. Leave Management System
951. Joint processing of spatial keyword queries
952. Intelligence Missing Items in Shopping Cart
953. Information Leak Detection and Prevention
954. Industrial Manpower Resource Organizer
955. I-Med-Design and Evaluation of the Imed Intelligent Medical Search Engine
956. Human Expertise Search Engine
957. Home appliances online Purchase
958. High Secure Corporate Web Search Engine
959. High Degree Patient Privacy on Secure Data Outsourcing
960. Group Movement Pattern Discovery
961. Graph Based Share Market Data Updating
962. Generic Business Portal
963. Flight Booking Portal
964. Firewall using Packet Filtering
965. Finger Print Identification Techniques from Abrading, Cutting, and Burning Fingers
966. Ethical and Social issues in File sharing system
967. Enterprener Sales Report Management
968. Encyclopedia for Computer Science
969. Employee Based Performance Monitoring and Action Systems
970. Emerging Patient Health Information Exchange System On Cloud
971. Efficient Search on Outsourced data using Cloud
972. Efficient and Secure Data Processing on Queries Similarity
973. Distributed Database Optimization on HealthCare
974. Digital Asset Management Systems (DAMS) Using Watermarking
975. Detecting Fraud on Vehicle Insurance System
976. Defeating Lazy Servers Database Vs Query Access Assurance
977. Data Processing for Disease-Treatment Relations
978. Data Mining Analysis on EB bill system
979. Data confidential against untrusted servers using attribute-based encryption (ABE)
980. Data Aggregation using SQL clustering
981. Customer Sales Analysis System Based On Purchasing
982. Cryptography on Personal confidential information
983. Cost Based Secure Cloud Data Systems
984. Market Based Analysis for consumer correct decision
985. Construction Company Work Order System
986. Complete Medical Transcription System(Mts)
987. Company Security Reporting System(CSRS)
988. College Result Analysis
989. Cloud Economic Benefit On Scientific Computing
990. Cloud Documents Security Using Interactive Zero-Knowledge Proof Prevent
991. Centralized Event Planer across Social Media Sites
992. Call Center Management
993. A Reservation-Based Coordination Protocol for Web Services
994. Building construction and cost estimation
995. Budget Planner
996. In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
997. Automatically identifying query groups on Web Search Engine
998. Auditing Data integrity and data storage using cloud
999. Application layer blocker for preventing on cyber security
1000. Advanced One-Click User Web Search Engine
1001. Advance Patient Management System


JAVA IEEE 2017-18
IEEE Transactions on Big Data
1002. Attribute Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud
IEEE/ACM TRANSACTIONS ON NETWORKING
1003. When to Make a Topic Popular Again? A Temporal Model for Topic Re-hotting Prediction in Online Social Networks
Services Computing
1004. Resource renting for periodical cloud workflow applications
IEEE Transactions on Security Computing
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
IEEE TRANSACTIONS ON MOBILE COMPUTING
IEEE Transactions on Cloud Computing
1005. Customer-Satisfaction-Aware Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1006. Securing Cloud Data under Key Exposure
IEEE Transactions on Computers
Transactions on Knowledge and Data Engineering
1007. Search Rank Fraud and Malware Detection in Google Play
1008. PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks
1009. Influence Maximization in Trajectory Databases
1010. An Iterative Classification Scheme for Sanitizing Large-Scale Datasets
1011. Personal Web Revisitation by Context and Content Keywords with Relevance Feedback
1012. Query Expansion with Enriched User Profiles for Personalized Search Utilizing Folksonomy Data
1013. Understand Short Texts by Harvesting and Analyzing Semantic Knowledge
1014. Computing Semantic Similarity of Concepts in Knowledge Graphs
1015. QDA: A Query-Driven Approach to Entity Resolution
1016. Influential Node Tracking on Dynamic Social Network: An Interchange Greedy Approach
1017. User Vitality Ranking and Prediction in Social Networking Services: a Dynamic Network Perspective
Transactions on Parallel and Distributed Systems
1018. The Importance of Worker Reputation Information in Microtask-Based Crowd Work Systems
IEEE Transactions on Information Forensics and Security
1019. A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
1020. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification
1021. RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage
1022. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds


JAVA IEEE 2016-17
IEEE Transactions on Emerging Topics in Computing
1023. Two-Factor Data Security Protection Mechanism for Cloud Storage System
1024. Then and Now: On The Maturity of the Cybercrime Markets
Transactions on Dependable and Secure Computing
1025. An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing
1026. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement
1027. Tell Me What You Eat, and I Will Tell You Where You Come From: A Data Science Approach for Global Recipe Data on the Web
1028. Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
1029. Where You Are Is Who You Are User Identification by Matching Statistics
1030. Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-encryption
1031. TTSA: An Effective Scheduling Approach for Delay Bounded Tasks in Hybrid Clouds
1032. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
1033. Online Subgraph Skyline Analysis Over Knowledge Graphs
1034. 2DCrypt: Image Scaling and Cropping in Encrypted Domains
1035. Mitigating Cross-Site Scripting Attacks with a Content Security Policy
1036. ID2S Password-Authenticated Key Exchange Protocols
1037. Dual-Server Public-Key Encryption with Keyword Search for Secure Cloud Storage
1038. A Shoulder Surfing Resistant Graphical Authentication System
Transactions on Knowledge and Data Engineering
1039. Classification model to predict the learners' academic performance using big data
1040. Electronic Commerce Meets the Semantic Web
1041. Mining High Utility Patterns in One Phase without Generating Candidates
1042. From Latency through Outbreak to Decline: Detecting Different States of Emergency Events Using Web Resources
1043. Automatic Generation of Social Event Storyboard from Image Click-through Data
1044. D-ToSS: A Distributed Throwaway Spatial Index Structure for Dynamic Location Data
1045. Understanding Deep Representations Learned in Modeling Users Likes
1046. Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds
1047. Topic-Oriented Exploratory Search Based on an Indexing Network
1048. Relevance Feedback Algorithms Inspired By Quantum Detection
1049. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information
1050. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1051. Efficiently Estimating Statistics of Points of Interests on Maps
1052. Prefix-adaptive and Time-sensitive Personalized Query Auto Completion
1053. Aspect-level Influence Discovery from Graphs
1054. Sentiment Embeddings with Applications to Sentiment Analysis
1055. Connecting Social Media to E-Commerce: Cold-Start Product Recommendation
1056. Resolving Multi-party Privacy Conflicts in Social Media
1057. Encrypted Data Management with Deduplication in Cloud Computing
1058. NATERGM: A Model for Examining the Role of Nodal Attributes in Dynamic Social Media Networks
1059. Crawling Hidden Objects with kNN Queries
1060. A Comprehensive Study on Willingness Maximization for Social Activity Planning with Quality Guarantee
1061. Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder
1062. Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks
1063. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments
1064. Mining User-Aware Rare Sequential Topic Patterns in Document Streams
1065. Nearest Keyword Set Search in Multi-dimensional Datasets
1066. Quality-Aware Subgraph Matching Over Inconsistent Probabilistic Graph Databases
1067. Inverted Linear Quadtree: Efficient Top K Spatial Keyword Search
1068. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy
IEEE TRANSACTIONS ON SERVICES COMPUTING
1069. Secure Authentication For Data Protection in Cloud Computing using Color Schemes
1070. Immutable Authentication and Integrity Schemes for Outsourced Databases
1071. Two-factor Data Access Control with Efficient Revocation for Multi-authority Cloud Storage Systems
1072. Server-Aided Public Key Encryption with Keyword Search
1073. Online Learning in Large-Scale Contextual Recommender Systems
1074. OUTSOURCED ATTRIBUTE BASED ENCRYPTION WITH KEYWORD SEARCH FUNCTION FOR CLOUD STORAGE
1075. SecRBAC: Secure data in the Clouds
IEEE INTELLIGENT SYSTEMS
1076. Trust Agent-Based Behavior Induction in Social Networks
IEEE TRANSACTIONS ON MULTIMEDIA
1077. Enabling Secure and Fast Indexing for Privacy-assured Healthcare Monitoring via Compressive Sensing
1078. Ensembling Classifiers for Detecting Users Intentions behind Web Queries
1079. Multi-Modal Event Topic Model for Social Event Analysis
1080. Social friend recommendation on multiple network correlation
1081. Tag Based Image Search by Social Re-ranking
1082. Enhancing Sketch-Based Image Retrieval by Re-ranking and Relevance Feedback
1083. A Locality Sensitive Low-Rank Model for Image Tag Completion
IEEE/ACM TRANSACTIONS ON NETWORKING
1084. Optimal Rate Allocation for Video Streaming in Wireless Networks With User Dynamics
1085. Traffic Engineering with Equal-Cost-MultiPath: An Algorithmic Perspective
1086. Online Algorithms for Information Aggregation From Distributed and Correlated Sources
1087. Capacity of Hybrid Wireless Networks With Long-Range Social Contacts Behavior
1088. Packet-Scale Congestion Control Paradigm


Latest IEEE 2015-2016 Java Projects
SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS
1089. Rank-Based Similarity Search: Reducing the Dimensional Dependence
1090. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
Service Computing
1091. SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces
Secure Computing
1092. Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
1093. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility
1094. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1095. Discovering Latent Semantics in Web Documents using Fuzzy Clustering
1096. On the Security of data access control for multiauthority cloud storage system
1097. Trust-based Service Management for Social Internet of Things Systems
1098. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1099. Formalization and Verification of Group Behavior Interactions
1100. Group Key Agreement with Local Connectivity
1101. Data Lineage in Malicious Environments
1102. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1103. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
1104. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1105. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption
1106. Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing
1107. T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services
CLOUD COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1108. TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage
1109. CloudArmor: Supporting Reputation-based Trust Management for Cloud Services
1110. Quantitative Reasoning About Cloud Security Using Service Level Agreements
1111. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control
1112. Social Cloud Computing: an Opportunity for Technology Enhanced Competence Based Learning
1113. MobiContext: A Context-aware Cloud-Based Venue Recommendation Framework
1114. SAE: Toward Efficient Cloud Data Analysis Service for Large-Scale Social Networks
1115. Understanding the Performance and Potential of Cloud Computing for Scientific Applications
1116. Towards Optimized Fine-Grained Pricing of IaaS Cloud Platform
1117. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1118. Reactive Resource Provisioning Heuristics for Dynamic Dataflows on Cloud Infrastructure
1119. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1120. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1121. OPoR: Enabling Proof of Retrievability in Cloud Computing with Resource-Constrained Devices
1122. Enabling Cloud Storage Auditing with Key-Exposure Resistance
1123. CONTROL CLOUD DATA ACCESS PRIVILEGE AND ANONYMITY WITH FULLY ANONYMOUS ATTRIBUTE-BASED ENCRYPTION
1124. Circuit Ciphertext-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing
1125. Audit-Free Cloud Storage via Deniable Attribute-based Encryption
1126. CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability
1127. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing
1128. Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1129. Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
1130. Key-Aggregate Searchable Encryption (KASE)for Group Data Sharing via Cloud Storage
1131. Secure Auditing and Deduplicating Data in Cloud
1132. Identity-based Encryption with Outsourced Revocation in Cloud Computing
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING) (Hint: For Abstract and Base Paper Contact: 9566137117)
1133. Towards reproducibility in online social network Research
1134. Geo-Social K-Cover Group Queries for Collaborative Spatial Computing
1135. Creating Usage Context-based Object Similarities to Boost Recommender Systems in Technology Enhanced Learning
1136. Efficient Notification of Meeting Points for Moving Groups via Independent Safe Regions
1137. CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
1138. Structured Learning from Heterogeneous Behavior for Social Identity Linkage
1139. Making Digital Artifacts on the Web Verifiable and Reliable
1140. Anonymizing Collections of Tree-Structured Data
1141. Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
1142. FOCS: Fast Overlapped Community Search
1143. Sparsity Learning Formulations for Mining Time-Varying Data
1144. The Impact of View Histories on Edit Recommendations
1145. Agent-based Interactions and Economic Encounters in an Intelligent InterCloud
1146. Discovery of Ranking Fraud for Mobile Apps
1147. Towards Effective Bug Triage with Software Data Reduction Techniques
1148. Subgraph Matching with Set Similarity in a Large Graph Database
Software Engineering
1149. The Impact of View Histories on Edit Recommendations
NETWORKING (Hint: For Abstract and Base Paper Contact: 9566137117)
1150. Auditing for Distributed Storage Systems
1151. FRAppE: Detecting Malicious Facebook Applications
IMAGE PROCESSING - MULTIMEDIA (Hint: For Abstract and Base Paper Contact: 9566137117)
1152. Uploader Intent for Online Video: Typology, Inference and Applications
1153. YouTube Video Promotion by Cross-network
1154. Semantic-Improved Color Imaging Applications: It Is All About Context
1155. Geolocalized Modeling for Dish Recognition
1156. Learning to Rank Image Tags with Limited Training Examples
1157. Automatic Face Naming by Learning Discriminative Affnity Matrices From Weakly Labeled Image
1158. Multiview Alignment Hashing for Efficient Image
MOBILE COMPUTING - WIRELESS COMMUNICATION (Hint: For Abstract and Base Paper Contact: 9566137117)
1159. Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering
1160. Tracking Temporal Community Strength in Dynamic Networks
1161. Modelling and Analysis of Communication Traffic Heterogeneity in Opportunistic Networks
1162. Towards Information Diffusion in Mobile Social Networks
1163. User-Defined Privacy Grid System for Continuous Location-Based Services
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING (Hint: For Abstract and Base Paper Contact: 9566137117)
1164. An Efficient Privacy-Preserving Ranked Keyword Search Method
1165. Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems
1166. Dispersing Instant Social Video Service Across Multiple Clouds
1167. Service Operator-aware Trust Scheme for Resource Matchmaking across Multiple Clouds
1168. A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
1169. Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
1170. A Computational Dynamic Trust Model for User Authorization
1171. Secure Distributed Deduplication Systems with Improved Reliability
1172. Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
1173. Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption


IEEE 2014-2015 Java Projects
MOBILE COMPUTING - WIRELESS COMMUNICATION
1174. Leveraging the Tail Time for Saving Energy in Cellular Networks
1175. Keylogging-resistant Visual Authentication Protocols
1176. Video Dissemination over Hybrid Cellular and Ad Hoc Networks
1177. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
1178. Preserving Location Privacy in Geo-Social Applications
1179. Efficient Authentication for Mobile and Pervasive Computing
1180. Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
1181. Map-Aware Models for Indoor Wireless Localization Systems: An Experimental Study
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1182. Typicality-Based Collaborative Filtering Recommendation
1183. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems
1184. CoRE: A Context-Aware Relation Extraction Method for Relation Completion
1185. Keyword Search Over Probabilistic RDF Graphs
1186. Efficient Prediction of Difficult Keyword Queries over Databases
1187. Interpreting the Public Sentiment Variations on Twitter
1188. An Efficient Recommendation Method for Improving Business Process Modeling
1189. Determining Process Model Precision and Generalization with Weighted Artificial Negative Events
1190. Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
1191. On the use of Side Information for Mining Text Data
1192. Privacy Preserving and Content Protecting Location based Queries
1193. Fast Nearest Neighbor Search with Keywords
1194. Towards Differential Query Services in Cost-Efficient Clouds
1195. Facilitating Document Annotation using Content and Querying Value
1196. Decentralized Queue Balancing and Differentiated Service Scheme Based on Cooperative Control Concept
1197. Mining Weakly Labeled Web Facial Images for Search-Based Face Annotation
1198. Secure Outsourced Attribute-Based Signatures
1199. Supporting Privacy Protection in Personalized Web Search
1200. Dealing With Concept Drifts in Process Mining
1201. Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation
1202. A Meta-Top-Down Method for Large-Scale Hierarchical Classification
1203. Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
1204. Active Learning of Constraints for Semi-Supervised Clustering
1205. Best Keyword Cover Search
1206. Personalized Recommendation Combining User Interest and Social Circle
1207. Online Feature Selection and Its Applications
1208. A Supermodularity-Based Differential Privacy Preserving Algorithm for Data Anonymization
1209. Incremental Affinity Propagation Clustering Based on Message Passing
1210. Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
1211. Secure kNN Query Processing in Untrusted Cloud Environments
1212. Malware Propagation in Large-Scale Networks
1213. Infrequent Weighted Itemset Mining Using Frequent Pattern Growth
1214. Identifying Features in Opinion Mining via Intrinsic and Extrinsic Domain Relevance
1215. Discovering Emerging Topics in Social Streams via Link Anomaly Detection
1216. Efficient Ranking on Entity Graphs with Personalized Relationships
1217. Task Trail: An Effective Segmentation of User Search Behavior
1218. Privacy-Preserving Enhanced Collaborative Tagging
1219. XSPath Navigation on XML Schemas Made Easy
1220. Security Evaluation of Pattern Classifiers under Attack
1221. Self-Adaptive Semantic Focused Crawler for Mining Services Information Discovery
1222. On Skyline Groups
PARALLEL AND DISTRIBUTED SYSTEMS WITH SECURE COMPUTING
1223. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
1224. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1225. Nothing is for Free: Security in Searching Shared and Encrypted Data
1226. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1227. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1228. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1229. Behavioral Malware Detection in Delay Tolerant Networks
1230. Securing Broker-Less Publish Subscribe Systems Using Identity-Based Encryption
1231. Private Searching on Streaming Data Based on Keyword Frequency
1232. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1233. On the Security of Trustee-Based Social Authentications
1234. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1235. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks
1236. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks
1237. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1238. A Two-stage Deanonymization Attack Against Anonymized Social Networks
1239. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
CLOUD COMPUTING
1240. DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
1241. Scalable architecture for multi-user encrypted SQL operations on cloud database services
1242. Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
1243. Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
1244. Application-Aware Local-Global Source Deduplication for Cloud Backup Services of Personal Storage
1245. On the Security of a Public Auditing Mechanism for Shared Cloud Data Service
1246. Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
1247. A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
1248. Secure kNN Query Processing in Untrusted Cloud Environments
1249. A Scalable and Reliable Matching Service for Content-based Publish/Subscribe Systems
1250. Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
1251. A Hybrid Cloud Approach for Secure Authorized Deduplication
1252. Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
1253. Performance and cost evaluation of an adaptive encryption architecture for cloud databases
1254. A Novel Model for Competition and Cooperation Among Cloud Providers
1255. CLOUDQUAL: A Quality Model for Cloud Services
1256. Oruta Privacy-Preserving Public Auditing for Shared Data in the Cloud
IMAGE PROCESSING - MULTIMEDIA
1257. Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Images
1258. Personalized Geo-Specific Tag Recommendation for Photos on Social Websites
1259. Captcha as Graphical Passwords A New Security Primitive Based on Hard AI Problems
NETWORKING
1260. PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks
1261. Scaling Laws for Throughput Capacity and Delay in Wireless Networks A Survey
1262. Secure Data Aggregation in Wireless Sensor Networks Filtering out the Attackers Impact
1263. Optimized Multicast Routing Algorithm Based on Tree Structure in MANETs
1264. HALO: Hop-by-Hop Adaptive Link-State Optimal Routing
INTERNATIONAL CONFERENCE
1265. Enhanced Security for Association Rule Mining to secure Transactional Databases
1266. Operational Pattern Revealing Technique in Text Mining
1267. VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
1268. Personalized web search using Browsing history and domain Knowledge
1269. Decentralized Access Control Of Data Stored In Cloud Using Key Policy Attribute Based Encryption
1270. Data Security the Challenge of Cloud Computing
1271. Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance
1272. A Cloud Enviroment for Backup and Data Storage


IEEE 2013-2014 Java Projects
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1273. Location Based Intelligent Mobile Organizer_Using Android (Hint: 2011)
1274. Vickrey-Clarke-Groves for privacy-preserving collaborative classification
1275. User Action Interpretation for Online Content Optimization
1276. Spatial Query Integrity with Voronoi Neighbors
1277. Spatial Approximate String Search
1278. Sensitive Label Privacy Protection on Social Network Data
1279. Secure Mining of Association Rules in Horizontally Distributed Databases
1280. Secure Logging As a Service Delegating Log Management to the Cloud
1281. Robust Module-based Data Management
1282. Ranking on Data Manifold with Sink Points
1283. Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases
1284. Privacy-Enhanced Web Service Composition
1285. Privacy against Aggregate Knowledge Attacks
1286. Preventing Private Information Inference Attacks on Social Networks
1287. PMSE: A Personalized Mobile Search Engine
1288. Personalized QoS-Aware Web Service Recommendation and Visualization
1289. Optimal Client-Server Assignment for Internet Distributed Systems
1290. Online Search and Buying Behaviour in Consumer Markets
1291. M-Privacy for Collaborative Data Publishing
1292. Mining User Queries with Markov Chains: Application to Online Image Retrieval
1293. Learning Regularized, Query-dependent Bilinear Similarities for Large Scale Image Retrieval
1294. Incentive Compatible Privacy-Preserving Data Analysis
1295. Improving Security and Efficiency in Attribute-Based Data Sharing
1296. FoCUS: Learning to Crawl Web Forums
1297. Fast Nearest Neighbor Search with Keywords
1298. Fairness-aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks
1299. Facilitating Effective User Navigation through Website Structure Improvement
1300. Facilitating Document Annotation using Content and Querying Value
1301. Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks (Hint 2008)
1302. Efficient Evaluation of SUM Queries over Probabilistic Data*
1303. Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases
1304. Dynamic Query Forms for Database Queries
1305. Dynamic Personalized Recommendation on Sparse Data
1306. Distributed Strategies for Mining Outliers in Large Data Sets
1307. Crowdsourcing Predictors of Behavioral Outcomes
1308. Co-Occurrence-Based Diffusion for Expert Search on the Web
1309. Comparable Entity Mining from Comparative Questions
1310. CloudMoV: Cloud-based Mobile Social TV
1311. Anomaly Detection via Online Oversampling Principal Component Analysis
1312. Anomaly Detection Approach Using Hidden Markov Model
1313. Annotating Search Results from Web Databases
1314. A System to Filter Unwanted Messages from OSN User Walls
1315. A Survey of XML Tree Patterns
1316. A Probabilistic Approach to String Transformation
1317. A New Algorithm for Inferring User Search Goals with Feedback Sessions
1318. A Methodology for Direct and Indirect Discrimination Prevention in Data Mining
1319. A Learning Approach to SQL Query Results Ranking Using Skyline and Users Current Navigational Behavior
1320. A Generalized Flow-Based Method for Analysis of Implicit Relationships on Wikipedia
1321. A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data
1322. A Data-Mining Model for Protection of FACTS-Based Transmission Line
PARALLEL AND DISTRIBUTED SYSTEMS
1323. Towards Differential Query Services in Cost-Efficient Clouds
1324. SybilDefender: Defend Against Sybil Attacks in Large Social Networks
1325. SocialTube: P2P-assisted Video Sharing in Online Social Networks
1326. Self Adaptive Contention Aware Routing Protocol for Intermittently Connected Mobile Networks
1327. QoS Ranking Prediction for Cloud Services
1328. Priority-Based Consolidation of Parallel Workloads in the Cloud
1329. Optimal Multiserver Configuration for Profit Maximization in Cloud Computing
1330. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
1331. Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks
1332. Load Rebalancing for Distributed File Systems in Clouds
1333. Label-Embedding for Attribute-Based Classification
1334. IP-Geolocation Mapping for Moderately Connected Internet Regions
1335. Identity-Based Secure Distributed Data Storage Schemes
1336. Hint-based Execution of Workloads in Clouds with Nefeli
1337. Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks
1338. Error-Tolerant Resource Allocation and Payment Minimization for Cloud System
1339. Enabling Data Dynamic and Indirect Mutual Trust for Cloud Computing Storage Systems
1340. Efficient Two-Server Password-Only Authenticated Key Exchange
1341. Dynamic Resource Allocation using Virtual Machines for Cloud Computing Environment
1342. An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing
1343. A Privacy Leakage Upper-Bound Constraint Based Approach for Cost-Effective PrivacyPreserving of Intermediate Datasets In cloud
CLOUD COMPUTING
1344. Winds of Change: From Vendor Lock-In to the Meta Cloud
1345. Supporting the Migration of Applications to the Cloud through a Decision Support System
1346. Storing Shared Data on the Cloud via Security-Mediator
1347. Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
1348. Privacy-Preserving Public Auditing for Secure Cloud Storage
1349. Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud
1350. Outsourcing Privacy-Preserving Social Networks to a Cloud
1351. Mining Contracts for Business Events and Temporal Constraints in Service Engagements
1352. Framework of Data Integrity for Cross Cloud Environment Using CPDP Scheme
1353. Fault Tolerance Management in Cloud Computing: A System-Level Perspective
1354. Efficient Security Solution for Privacy-Preserving Cloud Services
1355. Collaboration in Multicloud Computing Environments: Framework and Security Issues
1356. CloudFTP: A Case Study of Migrating Traditional Applications to the Cloud
1357. Cloud-based DDoS Attacks and Defenses
1358. Cloud computing for mobile users can offloading compution save energy
1359. An Efficient Distributed Verification Protocol for Data Storage Security in Cloud Computing
1360. AMES-Cloud A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds
1361. A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
1362. A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
1363. A Load Balancing Model Based on Cloud Partitioning for the Public Cloud
SECURE COMPUTING
1364. Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach
1365. Two tales of privacy in online social networks
1366. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
1367. Towards Secure Multi-Keyword Top-k Retrieval over Encrypted Cloud Data
1368. THEMIS: A Mutually Verifiable Billing System for the Cloud Computing Environment
1369. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
1370. Security and Privacy-Enhancing Multicloud Architectures
1371. Security Using Colors and Armstrong Numbers
1372. Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks
1373. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis
1374. Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
1375. Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs
1376. Privacy Preserving Data Analytics for Smart Homes
1377. On Inference-Proof View Processing of XML Documents
1378. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
1379. Extracting Spread-Spectrum Hidden Data from Digital Media
1380. Efficiently Outsourcing Multiparty Computation under Multiple Keys
1381. Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection
1382. Craigslist Scams and Community Composition: Investigating Online Fraud
1383. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
1384. A Simple Text-Based Shoulder Surfing Resistant Graphical Password Scheme
IMAGE PROCESSING - MULTIMEDIA
1385. Understanding the External Links of Video Sharing Sites: Measurement and Analysis
1386. Super-Resolution-based Inpainting
1387. Scalable Face Image Retrieval using Attribute-Enhanced Sparse Codewords
1388. Image Authentication Using Stochastic Diffusion
1389. Hierarchical Super-Resolution-Based Inpainting
1390. Circular Reranking for Visual Search
1391. Bootstrapping Visual Categorization With Relevant Negatives
1392. Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information
1393. An extended visual cryptography scheme without pixel expansion for halftone images
1394. An Adaptive Cloud Downloading Service
NETWORKING
1395. Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks
1396. Topological Conditions for In-Network Stabilization of Dynamical Systems
1397. Reliable Data Delivery in Mobile Adhoc Networks Using Light Weight Verification Algorithm with High Node Mobility
1398. Price Differentiation for Communication Networks
1399. Participatory Privacy: Enabling Privacy in Participatory Sensing
1400. Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks
1401. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1402. On the Role of Mobility for Multi-message Gossip
1403. Fully Anonymous Profile Matching in Mobile Social Networks
1404. Fault Node Recovery Algorithm for a Wireless Sensor Network
1405. Cross-Domain Privacy-Preserving Cooperative Firewall Optimization
1406. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks
1407. Access Policy Consolidation for Event Processing Systems
1408. A Fast Re-Route Method
SOFTWARE ENGINEERING
1409. A Decentralized Self-Adaptation Mechanism For Service-Based Applications in The Cloud
MOBILE COMPUTING - WIRELESS COMMUNICATION
1410. Vampire attacks: Draining life from wireless ad-hoc sensor networks
1411. Towards a Statistical Framework for Source Anonymity in Sensor Networks
1412. Search Me If You Can: Privacy-preserving Location Query Service
1413. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks
1414. Mobile Relay Configuration in Data-intensive Wireless Sensor Networks
1415. Efficient Rekeying Framework for Secure Multicast with Diverse-Subscription-Period Mobile Users
1416. Distributed Cooperative Caching in Social Wireless Networks
1417. Community-Aware Opportunistic Routing in Mobile Social Networks
1418. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications


IEEE 2012-2013 Java Projects
SECURE COMPUTING
1419. The Devils Behind Web Application Vulnerabilities
1420. Security Architecture for Cloud Networking
1421. SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multi-Agent Systems
1422. Secure Overlay Cloud Storage with Access Control and Assured Deletion
1423. Risk-Aware Mitigation for MANET Routing Attacks
1424. Remote Attestation with Domain-Based Integrity Model and Policy Analysis
1425. Privacy-preserving Enforcement of Spatially Aware RBAC
1426. Persuasive Cued Click-Points: Design, implementation, and evaluation of a knowledge-based authentication mechanism
1427. pCloud: A Distributed System for Practical PIR
1428. Packet-Hiding Methods for Preventing Selective Jamming Attacks
1429. Online Modeling of Proactive Moderation System for Auction Fraud Detection
1430. Fast and accurate annotation of short texts with Wikipedia pages
1431. FADE: Secure Overlay Cloud Storage with File Assured Deletion
1432. Ensuring Distributed Accountability for Data Sharing in the Cloud
1433. DoubleGuard: Detecting Intrusions In Multi-tier Web Applications
1434. Direct and Indirect Discrimination Prevention Methods
1435. Detecting Spam Zombies by Monitoring Outgoing Messages
1436. Detecting Anomalous Insiders in Collaborative Information Systems
1437. Data-Provenance Verification For Secure Hosts
1438. A Learning-Based Approach to Reactive Security
PARALLEL AND DISTRIBUTED SYSTEMS
1439. Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
1440. Payments for Outsourced Computations
1441. Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations
1442. Capacity of Data Collection in Arbitrary Wireless Sensor Networks
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1443. Toward Private Joins on Outsourced Data
1444. Statistical Entity Extraction from Web
1445. Slicing: A New Approach to Privacy Preserving Data Publishing
1446. Sequential Anomaly Detection in the Presence of Noise and Limited Feedback
1447. Resilient Identity Crime Detection
1448. Ranking Model Adaptation for Domain-Specific Search
1449. Organizing User Search Histories
1450. On the Spectral Characterization and Scalable Mining of Network Communities
1451. Multiparty Access Control for Online Social Networks: Model and Mechanisms
1452. Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems
1453. Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines
1454. How do Facebookers use Friendlists
1455. Geometric Data Perturbation for Privacy Preserving Outsourced Data Mining
1456. Fuzzy Order-of-Magnitude Based Link Analysis for Qualitative Alias Detection
1457. A Framework for Personal Mobile Commerce Pattern Mining and Prediction
1458. Enabling Multilevel Trust in Privacy Preserving Data Mining
1459. Enabling cross-site interactions in social networks
1460. Efficient Similarity Search over Encrypted Data
1461. Efficient Extended Boolean Retrieval
1462. Efficient Computation of Range Aggregates against Uncertain Location Based Queries
1463. Efficient Anonymous Message Submission
1464. Effective Pattern Discovery for Text Mining
1465. DDD: A New Ensemble Approach for Dealing with Concept Drift
1466. Credibility Ranking of Tweets during High Impact Events
1467. Creating Evolving User Behavior Profiles Automatically
1468. Coupled Behavior Analysis for Capturing Coupling Relationships in Group-based Market Manipulations
1469. Confucius: A Tool Supporting Collaborative Scientific Workflow Composition
1470. Automatic Discovery of Association Orders between Name and Aliases from the Web using Anchor Texts-based Co-occurrences
1471. Anomaly Detection for Discrete Sequences: A Survey
1472. An Exploration of Improving Collaborative Recommender Systems via User-Item Subgroups
1473. Advance Mining of Temporal High Utility Itemset
1474. A Temporal Pattern Search Algorithm for Personal History Event Visualization
CLOUD COMPUTING
1475. Reliable Re-encryption in Unreliable Clouds
1476. MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud
1477. Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
1478. Managing A Cloud for Multi-agent Systems on Ad-hoc Networks
1479. Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage
1480. Gossip-based Resource Management for Cloud Environments
1481. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
1482. Costing of Cloud Computing Services: A Total Cost of Ownership Approach
1483. Cloud Data Protection for the Masses
1484. Cloud Computing Security: From Single to Multi-Clouds
1485. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
MULTIMEDIA
1486. In Tags We Trust Trust modeling in social tagging of multimedia content
1487. Learn to Personalized Image Search from the Photo Sharing Websites
MOBILE COMPUTING
1488. Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
1489. Fast Data Collection in Tree-Based Wireless Sensor Networks
SOFTWARE ENGINEERING
1490. PerLa: a Language and Middleware Architecture for Data Management and Integration in Pervasive Information Systems
WIRELESS COMMUNICATIONS
1491. Cut Detection in Wireless Sensor Networks
1492. An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
NETWORKING
1493. TrickleDNS: Bootstrapping DNS Security using Social Trust
1494. Privacy- and Integrity-Preserving Range Queries in Sensor Networks
1495. Policy-by-Example for Online Social Networks
1496. Packet Loss Control Using Tokens at the Network Edge
1497. Optimizing Cloud Resources for Delivering IPTV Services through Virtualization
1498. MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
1499. Independent Directed Acyclic Graphs for Resilient Multipath Routing
1500. Handling Multiple Failures in IP Networks through Localized On-Demand Link State Routing
1501. Game-Theoretic Pricing for Video Streaming in Mobile Networks
1502. FireCol: A Collaborative Protection Network for the Detection of Flooding DDoS Attacks
1503. Auditing for Network Coding Storage
1504. An Efficient Caching Scheme and Consistency Maintenance in Hybrid P2P System
INTERNATIONAL CONFERENCE
1505. Privacy Preserving Cloud Data Access With Multi-Authorities
1506. Movie Rating and Review Summarization in Mobile Environment
1507. IDSaaS: Intrusion Detection System as a Service in Public Clouds
1508. DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
1509. BibPro: A Citation Parser Based on Sequence Alignment Techniques
1510. A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network


IEEE 2011-2012 Java Project
SECURE COMPUTING
1511. SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
1512. RITAS: Services for Randomized Intrusion Tolerance
1513. PriPAYD: Privacy-Friendly Pay-As-You-Drive Insurance
1514. Nymble: Blocking Misbehaving Users in Anonymizing Networks
1515. Modeling and Detection of Camouflaging Worm
1516. Coding for Cryptographic Security Enhancement using Stopping Sets
1517. A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree
SOFTWARE ENGINEERING
MOBILE COMPUTING - WIRELESS COMMUNICATION
1518. Wireless Sensor Network Security model using Zero Knowledge Protocol
1519. Utility-Optimal Multi-Pattern Reuse in Multi-Cell Networks
1520. Throughput Optimization in Mobile Backbone Networks
1521. Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks
1522. Secure High-Throughput Multicast Routing in Wireless Mesh Networks
1523. Fast Data Collection in Tree-Based Wireless Sensor Networks
1524. A Survey on Cluster-Based Group Key Agreement Protocols for WSNs
1525. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
NETWORKING
1526. SPAF: Stateless FSA-based Packet Filters
1527. Selfish Overlay Network Creation and Maintenance
1528. ProgME: Towards Programmable Network MEasurement
1529. Locating Equivalent Servants over P2P Networks
1530. Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks
1531. Buffer Sizing for 802.11 Based Networks
1532. A New Multi-path Routing Methodology Based on Logit Type Assignment
CLOUD COMPUTING
1533. Secure and Practical Outsourcing of Linear Programming in Cloud Computing
1534. Improving Utilization of Infrastructure Clouds
1535. Going Back and Forth: Efficient Multideployment and Multisnapshotting on Clouds
1536. CloudTPS: Scalable Transactions for Web Applications in the Cloud
1537. Cloud Computing for Agent-Based Urban Transportation Systems
KNOWLEDGE AND DATA ENGINEERING - (DATA MINING)
1538. The CoQUOS Approach to Continuous Queries in Unstructured Overlays
1539. Relevance-based Retrieval on Hidden-Web Text Databases without Ranking Support
1540. Ranking Spatial Data by Quality Preferences
1541. Making Aggregation Work in Uncertain and Probabilistic Databases
1542. Load Shedding in Mobile Systems with MobiQual
1543. Group Enclosing Queries
1544. Extended XML Tree Pattern Matching: Theories and Algorithms
1545. Effective Navigation of Query Results Based on Concept Hierarchies
1546. Discovering Conditional Functional Dependencies
1547. Decision Trees for Uncertain Data
1548. Data Leakage Detection
1549. Adaptive Cluster Distance Bounding for High Dimensional Indexing+


Java Application Projects
BIOMETRIC SYSTEM
SPORTS
1550. Young Talent Tracker
1551. Cricket Stadium Seat Booking
MODERN AGRICULTRE
1552. International Plant Import and Export
OUR MODERN SOCITY
1553. Trained Volunteers Create A Successful Social Campaign
1554. Finger thump Based Shopping Cart
1555. Finger Print E-Voting Systems
1556. Create a Successful Anti- Nuclear Campaign
1557. Crowding Funding Mobilization
1558. People Power of India
1559. Modern Finger Print Voting System
1560. Election Commission Management
1561. Online Painting Auction
1562. Reality Show Ticket Booking System
1563. Online Broadway Motel Food Ordering System
1564. Fashion Studio Model Management
1565. Women's Selfhelp Group
Advance Health Care System
1566. Organizing medical camp for public health development
1567. Homeopathy Health Record
1568. Consumer Legal Advicer
1569. Raw Requried Online Medicine
1570. Medical Record Authentication
MORDERN EDUCATION SYSTEM
1571. I School
1572. Job fair section process
1573. Advertising in E-Book
1574. Students Skills With Modern Industries
1575. College Placement And College Event
1576. Off-Campus Result Management
PUBLIC DATA ON CLOUD SYSTEM
1577. Cloud Storage Public Digital Certificate
ERP PROJECTS
1578. Customer Relationship Management
1579. Corporate Trouble Shooter
1580. Corporate Event Organisation
1581. Engnering Lab Maintenance
1582. Select Your Age(Business Motivation all age group)
1583. Software Requirements Analysis for Client Side
1584. ERP System (Enterprint Resource Plan
LATEST BANKING
1585. User Opinion For Indian Banking Service And Cashless Economy
1586. Advanced Banking System
1587. EyeBank Management System
ONLINE CONSUMERS PROCESSING
1588. Economic Usage of Solar Energy
1589. Gps Consumers Complients
1590. Online Softskills Tracks
1591. Online Buy And Sale Software
1592. Budget Home Design
1593. Online Product Exchange
1594. Jewellery Management
1595. Finger Print Base on Shopping Cart
MORDERN TECHNOLOGY
1596. Moderate Robatics System with Public Opinion
Java Apps
1597. Online overview of skills really used in jobs
1598. Land Bank for Nursery
1599. Developing Rural Economy
1600. ECOPS - Electronics Police Record Management System
1601. Website Evaluation Using Opinion Mining
1602. Monitoring Suspicious Discussions on Online Forums Using Data Mining
1603. INSURANCE MANAGEMENT SYSTEM
1604. e-Fraud Prevention based on the Self- Authentication of e-Documents
1605. Hope Center
1606. Exam crazy
1607. BUGS REPORTING SYSTEM
1608. LOCATION BASED CONSUMER COMPLAINT
1609. Speed Racing
1610. ROADSTER
1611. META CAFE
1612. ONLINE VIDEO LOCKER
1613. Management System in Metro Train
1614. Plant Shopping on Web
1615. Reporting Online Media News Systems
1616. Informative Content Extraction
1617. E-commerce Complaint Management System
1618. Modern Agriculture Development System
1619. Loan Online Application
1620. Rural Community Developement
1621. LOVE AND CARE
1622. GREEN PLANT
1623. Advance Couier Service
1624. Community Awarness
1625. E_Music
1626. Staff Management System
1627. E-TENDERING
1628. Hotel Management
1629. Crime File Management System
1630. Cloud Cyber Attack
1631. Cloud Cost Management for Customer Sensitive Data
1632. Advance Web based Multimedia Answer Generation
1633. Commaunity Awareness
1634. E-Commerce Complaints
1635. Modern Agriculture Development System
1636. Plant Shopping on Web
1637. ONLINE VIDEO LOCKER
1638. ONLINE VIDEO LOCKER
1639. Reporting Online Media News Systems
1640. Online Plant Shopping
1641. Community Awareness
1642. Loan Online Application
1643. Modern Agriculture Development System
1644. Online Digital Library
1645. Geo Base Services
1646. Civil Supplies and Consumer Protection Department
1647. Citizen Opinions vs Government Policies
1648. Protecting Used Data Privacy for Attackers
1649. Web Hospital Management
1650. Easy SQL Query for Non-IT Manager
1651. Online Shopping with Fraud detection
1652. Efficient Spatial Query Processing
1653. Cryptographic Key Exchange Authentication
1654. Online Global Information Service Center
1655. Contracts Business Events Management
1656. Online Secure image Social Networks
1657. Outsourcing of Online Image Reconstruction
1658. Trust based Profile Matching Secure Social Network
1659. Secure and Distance based Online Social Network (OSN)
1660. Efficient Online Image Retrieval System
1661. Data Sharing In Cloud Storage by Using Key-Aggregate
1662. Multicast Key Management for Cloud
1663. Face-to-face contact on Mobile Social Networks
1664. Discovering the Gap between Web Site Designers' Expectations and Users' Behavior
1665. Dynamically Growing Online Survey for Behavioral Outcomes
1666. Advance Web based Multimedia Answer Generation
1667. College Result Analysis with Horizontally Distributed Databases
1668. Feedback Decision Support for mHealth monitoring
1669. Exchange Secrete Key for Data Producers and Consumers
1670. Efficient Information Retrieval Using Ranked Query (EIRQ)
1671. E-KNOWLEDGE WIRELESS HEALTH CARE SYSTEM
1672. Web Hosting On Cloud
1673. Web Usage Mining : A Survey on Pattern Extraction from Web Logs
1674. Web Server Security with Web Client Management System
1675. Web Parser on Sequence Alignment Techniques
1676. Web Page re-Ranking System for Library
1677. Web Eye
1678. Voting System for Web Library
1679. VIRTUAL CLASSROOM SYSTEM
1680. Unique Web Resources Utilization Monitoring System
1681. Transport Management System
1682. Pre-paid Recharging System on Banking
1683. Tollgate Management
1684. Time To Time Stock Market Updater and Monitoring System
1685. Sql Tuner
1686. SOCIAL NETWORK MULTIPARTY ACCESS MANAGEMENT
1687. SMS Based Mobile Banking with Security
1688. Sms Topup
1689. Vendor Information System For Shipping
1690. Sequential Anomaly Detection from User Behaviour
1691. Secure SMS Transaction System on banking
1692. Secure Online Documents Management System in Cloud
1693. Secure File Uploading Server with Advance Protecting System
1694. Secure File Monitoring System on Cloud
1695. Relational Logic Search Engine On Healthcare
1696. Recommendation System Based On Web Usage Mining and Semantic Web A Survey
1697. Quick Customer decision support on Web Sales Portal
1698. Query Response System for File Management
1699. Quality Visualization on Web TV
1700. Project Work Tracking System
1701. Product Market Manipulations on Asian stock market
1702. Predicting Top Company Share Based on High Utility Data
1703. Automation of Analysis and Development Management
1704. Pharmacy Information System
1705. Personalize Your News on Web
1706. Online University
1707. Online tagging for multimedia content
1708. Online Search Ranking On Multiple Domain
1709. Online Rental House Web Portal
1710. Online Recruitment System
1711. Online Real Estate Property Management
1712. Online Multi Type Documents Search Engine
1713. ONLINE MOBILE BILLING SYSTEM
1714. Online Jewelry Management
1715. Online Index Recommendations For High-Dimensional Databases Using Query Workloads
1716. Online Examination System
1717. Online Ensemble Learning Approach
1718. Online Banking With Fraud Detecting
1719. Online Auction Bit
1720. ONLINE ADVERTISING SYSTEM
1721. Nutraceuticals Management System
1722. Nearest Shopping Location Identification Systems
1723. Multilevel Images Authentication Systems
1724. Multi New Product Survey Management
1725. Movie Recommender Systems via User- Item Subgroups
1726. Movie Rating and Recommendation on Mobile
1727. Modern Municipal Corporation
1728. Mobile TV Quality Management
1729. Mobile Banking WAP
1730. Manifold Entrust Scheme
1731. Management System in Train
1732. Secure Mailing System
1733. Location-Based Spatial Query Processing in Wireless Broadcast Environments
1734. LEAVE MANAGEMENT SYSTEM FOR MNC
1735. Knowledge Based Decision Support System(KMS)
1736. Key Management for Content Integration
1737. Inter Bank Fund Transfer in Distributed Network
1738. Information and Knowledge Extracting from a large amount of data
1739. Industry Standard Authorization For Sensitive Resources
1740. Implementation and Validating Environmental and Health
1741. iKnoweb Extracting and Integrating Entity Information System
1742. HUMAN ASSURANCE ADMINISTRATION
1743. High_level network Security Using Packet Filtering
1744. High and Low Level SQL Query Executor
1745. GLOBAL COUNSELLING SYSTEM
1746. A Game Theory for Online Security
1747. Distributed Transaction Proxy
1748. Freelancer Job
1749. File Security With Multi Database System
1750. FILE SEARCH ENGINE
1751. Fertilizer Management System
1752. Fast Web Information Gathering with Alias Detection
1753. E-Tutor Online Jobs
1754. Enterprise Stock and Accounting System
1755. Ensuring Data Storage Security in Cloud Computing
1756. Encrypted IT Auditing on Cloud Computing
1757. Encrypted Data Storage Vs Data Against illegal Access
1758. Enabling Site Interaction In Social Community
1759. Enabling Public Verifiability and Data Dynamics for Storage in Cloud Computing
1760. E-Music world
1761. Employee Resource Management
1762. Employee Management System
1763. E-Learning
1764. E Fraud Prevention based on the Self Authentication of e Documents
1765. Distribution System for Discount Sales
1766. Distributed Data Integration on Electricity Board
1767. Disease Information Hiding on Publishing Healthcare Data
1768. Digital Documents Attestation Systems
1769. Defending Against Web Application Vulnerabilities
1770. Defects Analysis Systems
1771. Data theft detection mobile cloud computing
1772. Data Base Fraud Detection Systems
1773. Customer Information Hiding for Data Mismanagement in Banking
1774. Company Security Reporting System(CSRS)
1775. E -Crime File Management System
1776. Credit Card Management System
1777. Corporate Requirement System
1778. Consumer Sales Online Fake Product Detection and Deletion
1779. Company Information Tracking System
1780. Cloud Policy-Based File Assure Deletion
1781. Cloud Data Theft Attacks
1782. Cloud Cyber Attacks against Social Networks
1783. Cloud Cost Management for Customer Sensitive Data
1784. Client Favorite Photo Search Engine on Web
1785. Citizen Card System
1786. Card Management System
1787. Design &Development of Car Parking and Automation Billing Systems
1788. Customer Care Service
1789. BPO Call Center
1790. Automation of IT Process Management
1791. Modeling and Automated Containment of Worms
1792. Attribute Key Based Data Security System
1793. As Needed Basis Accountability for Cloud Data Sharing
1794. Annotation of short texts With Wikipedia pages
1795. AIRLINE RESERVATION SYSTEM
1796. Advance User Management on Social Website
1797. A Semantic Web Based Scientific News Aggregator


Dotnet Mini Projects
Mini Projects
1798. VALUE ADDED TAX (VAT)
1799. User Oriented Network Attacks
1800. Secure Back Up
1801. Screen Capture And Mouse I/O
1802. Sales Bill Printing System using Excel
1803. Password Security
1804. Online User Mobile Rating
1805. Online Sensex Graph System
1806. Online Book Publishing
1807. NEWS TICKER PROJECT
1808. Multi Storage file
1809. Message Chating
1810. Medical Equipment in WAP
1811. Login Authentication Scheme
1812. Information Alert System
1813. Image Encryption And Decryption
1814. Generic Business Portal
1815. Flight Booking Portal
1816. File Transfer using Cryptography Techniques
1817. File Splitting
1818. Excel Format in Report
1819. EB Management System
1820. Dynamic Web Form Creation
1821. Android Image Search


Struts Application Projects
Struts Apps
1822. Public Sentiment Analysis with Online Shopping Using Struts
1823. Modern distributed business for supply-chain management
1824. High Confidential Personal Disease Reporting System
1825. Distributor Sensitive Data Management Using Struts
1826. Development of Certificate Authority Services for Web Applications
1827. Access Control on User-To-User Interactions in Social Networks


Java Mini Projects
Mini Projects
1828. Website Tracking System
1829. Website Ranking System
1830. Treasure Warehouse
1831. Student Information System
1832. Storage security
1833. PRISON MANAGEMENT SYSTEM
1834. E-Licence Investigation System
1835. Online Secure File Transfer System
1836. Online Medicine Purchase
1837. ONLINE EDUCATION
1838. Online Agriculture System
1839. Mobile Survey
1840. ISSUE TRACKING SYSYTEM
1841. HOSPITAL MANAGEMENT SYSYTEMS
1842. HealthCare Management System
1843. Global Employee Acclaimer
1844. E-VOTING FOR ASSOCIATION
1845. Encrypted Register Form
1846. GLOBAL EMPLOYEE MANAGEMENT SYSTEM
1847. E INSURANCE
1848. Courier Tracking Systems
1849. corporate Transportation
1850. Collectorate Communication Systems
1851. Budget Approval System
1852. BLOOD BANK MANAGEMENT SYSTEMS
1853. ATTENDANCE MANAGEMENT SYSTEM
1854. Activity management


SOFT IDEA FOR DIGITAL SOCIETY
MODERN AGRICULTURE
1855. Sponsor For Agriculture
1856. Agriculture Assist
1857. Agriculture Marketing in Generation
1858. International Plant Import and Export
MODERN EDUCATION SYSTEM
1859. Old In Gold
1860. I School
1861. College Placement And Events
1862. Rural Area Educational Trouble Shooter
1863. Web Direct Recruitment Analysis
1864. Online Aquarum
1865. School Automation System
1866. Secure Online Course Automation
1867. Session Management System in It Industry
1868. Tools for Non IT Expert Developer
1869. Students Skills With Modern Industries
MODERN TECHNOLOGY
1870. Moderate Robatics System with Public Opinion
ONLINE CONSUMERS PROCESSING
1871. Customer Favarate Greeting Card Design
1872. GPS Transport Packers and Movers
1873. House Hold Appliancies Warranty Management
1874. Direct Q Less Reservation System in train
1875. Power Consumption Monitoring House Hold Electronic Device
1876. Apartment Maintenance
1877. Budget Home Design
1878. Online Buy And Sale Software
1879. Online Softskills Tracks
1880. Gps Consumers Complients
1881. Economic Usage of Solar Energy
Advance Health Care System
1882. Organizing medical camp for public health development
1883. LIVE WEB DOCTOR CONSULTATION
1884. World Wide Cloud Inter Hospital Acess Health Care System
1885. MAC Sensing Protocol
1886. Medical Record Authentication
1887. Raw Requried Online Medicine
1888. Consumer Legal Advicer
1889. Homeopathy Health Record
SPORTS
1890. Play Ground Booking
1891. Cricket Stadium Seat Booking
PUBLIC DATA ON CLOUD SYSTEM
1892. Cloud Storage Public Digital Certificate
ERP PROJECTS
1893. Corporate Trouble Shooter
1894. Entrepreneur Fault Analysis
1895. Organise Corporate Training For Client Projects
1896. Employment Knowledge Database
1897. GPS Employee Tracking System
1898. Non It People Performance
1899. Performance System Analysis In Industry
1900. Consultanting About the Foreign Peoples
1901. Recommend To Friend
1902. New Company Policy Clearance System
1903. ERP System (Enterprint Resource Plan
1904. Software Requirements Analysis for Client Side
1905. Select Your Age(Business Motivation all age group)
1906. Engnering Lab Maintenance
1907. Corporate Event Organisation
LATEST BANKING
1908. EyeBank Management System
1909. Advanced Banking System
OUR MODERN SOCIETY
1910. Trained Volunteers Create A Successful Social Campaign
1911. Finger thump Based Shopping Cart
1912. Railway Management Service
1913. Create a Successful Anti- Nuclear Campaign
1914. Crowding Funding Mobilization
1915. People Power of India
1916. Pets Care
1917. Feature in Best Potitical Leader in India
1918. Yell Help For Children
1919. Automation Transport Maintance
1920. It Park Media
1921. Online Painting Auction
1922. Election Commission Management
1923. Modern Finger Print Voting System


INSURANCE DOMAIN PROEJCTS
ONLINE INSURANCE
1924. ANDROID APPS FOR INSURANCE SYSTEM
1925. Detecting Fraud on Vehicle Insurance System -Dot Net, SQL Server
1926. Human Assurance Administration - INSURANCE (JAVA , JSP, MYSQL)


HEALTHCARE DOMAIN PROJECTS
HEALTHCARE PROJECTS
1927. ANDROID APPS FOR DOCTOR APPOINTMENT
1928. LIVE WEB DOCTOR CONSULTATION
1929. ANDROID APPS ON DOCTOR WITH NURSE
1930. HOSPITAL ANDROID APPS
1931. BLOOD BANK - ANDROID


AGRICULTURE DOMAIN PROJECTS
AGRICULTURE PROJECTS
1932. Fertilizer Management System -Java, JSP, MySQL
1933. Land Bank for Nursery -Java, JSP, MySQL
1934. Cotton Leaf Disease Identification using Pattern Recognition Techniques- DOT NET, SQL SERVER
1935. FORMER APPS - ANDROID
1936. Online Agriculture System-Java, JSP, MySQl


BANKING PROJECTS
BANKING APPLICATION
1937. Online Banking with Fraud Detecting- Java JSP, MySQL
1938. Opinion For Banking Service And Cashless Economy - Java JSP, MySQL
1939. MICRO CREDIT BANKING ON SMARTPHONE


Internet of things (IoT)
IoT Projects
1940. A Cloud-Based Smart-Parking System Based on Internet-of-Things Technologies
1941. EPLQ: Efficient Privacy-Preserving Location-based Query over Outsourced Encrypted Data
1942. FogRoute: DTN-based Data Dissemination Model in Fog Computing


RESTful Web services
REST API
1943. Big Scholarly Data: A Survey
1944. A Context-aware Service Evaluation Approach over Big Data for Cloud Applications


Call us : 09566137117 / 08870155867
Mail ID : chennaisunday@gmail.com
Skype ID : chennaisunday
Home   Full Project List   Contact Us
 
Copyrights Reserved